Work item | Question | Equiv. Num. | Status | Timing | Approval process | Version | Liaison relationship | Subject / Title | Priority |
TR.smpa | Q4/17 | | Under study | 2025-12 | Agreement | New | - | Technical Report: Security middle platform architecture | Medium |
TR.verm | Q4/17 | | Under study | 2025-12 | Agreement | New | - | Technical Report: Framework for verification of messages | Medium |
X.1221 (ex X.stie) | Q4/17 | OASIS STIX 2.1 | Under study 2023-09-08 | 2025-12 | TAP | New | - | Structured Threat Information Expression (STIE) | Medium |
X.1222 (ex X.taeii) | Q4/17 | OASIS TAXII 2.1 | Under study 2023-09-08 | 2025-12 | TAP | New | - | Trusted Automated Exchange of Intelligence Information (TAEII) | Medium |
X.1238 (ex X.sgc-rcs) | Q4/17 | | Under study | 2025-04 | TAP | New | - | Guidelines for countering spam over rich communication service (RCS) messaging | - |
X.1646 (ex X.SecaaS) | Q4/17 | X.SecaaS | Consented 2025-04-17 | 2025-04 | AAP | New | ITU-T SG13, CSA, ISO | Security threats to be identified in the domain of security as a service | Medium |
X.dtns | Q4/17 | | Under study | 2025-12 | AAP | New | SG13, SG20 | Guidelines of using digital twin of network for network security | Medium |
X.gcspcc | Q4/17 | | Under study | 2026-06 | TAP | New | - | Guidelines of developing of cybersecurity simulation platform based on cloud computing | Medium |
X.gpmr | Q4/17 | | Under study | 2026-06 | AAP | New | - | Guidelines and security measures for prevention and mitigation of ransomware | - |
X.icd-schemas (ex X.ics-schema) | Q4/17 | | Under study | 2025-12 | AAP | New | OASIS CTI TC; OASIS OpenC2 TC | Vendor agnostic security data schemas for integrated cyber defence solutions | Low |
X.MVSC | Q4/17 | | Under study | 2027-04 | AAP | New | - | Minimum viable security controls | Medium |
X.nspam | Q4/17 | | Under study | 2025-12 | AAP | New | - | Security framework for network storage protection against malware attacks | - |
X.sc-sscti | Q4/17 | | Under study | 2027-01 | TAP | New | ISO/IEC JTC1 SC27 WG4 and WG5 | Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry | Medium |
X.sf-dtea | Q4/17 | | Under study | 2025-12 | TAP | New | - | Security framework for detecting targeted email attacks | Medium |
X.sg-ressso | Q4/17 | | Under study | 2027-04 | AAP | New | - | Security guidelines for reporting email security status to security operations | Medium |
X.ssc-sa | Q4/17 | | Under study | 2026-06 | TAP | New | ISO/IEC JTC 1/SC 27 WG4 | Guidelines for software supply chain security audit | Medium |
X.st-ssc | Q4/17 | | Under study | 2025-12 | TAP | New | ISO/IEC JTC 1/SC 27, ETSI | Security threats of software supply chain | Medium |