Table of Contents
1Scope
1.1Purpose
1.2RelationshipwithX.805SecurityArchitecture
1.3RelationshipwithE.408telecommunicationnetworks
securityrequirements
2References
3Termsanddefinitions
4Abbreviationsandacronyms
5Conventions
6Securityrequirements
6.1Verificationofidentities
6.2Controlledaccessandauthorization
6.3Protectionofconfidentiality
6.4Protectionofdataintegrity
6.5Accountability
6.6Securityloggingandaudit
6.7Securityalarmreporting
6.8ProtectionoftheDCN
AnnexA-Mappingofsecurityrequirements,servicesand
mechanisms
AppendixI-Additionalsecurityconsiderations
I.1Applicabilitytoenterpriseoperations,administration,
maintenanceandprovisioning
I.2Commonobjectrequestbrokerarchitecture,simple
networkmanagementprotocol,extensiblemarkuplanguage,
andsimpleobjectaccessprotocol
I.3Lawfullyauthorizedelectronicsurveillance
I.4Physicalsecurityconsiderations
I.5Developmentprocess
AppendixII-Frameworkanddesignguidelines
II.1Frameworkandmodel
II.2Designguidelines
AppendixIII-SemanticsoftermsusedintheM.3016.xseries
BIBLIOGRAPHY Abstract
Identifies the security requirements for the management plane in telecommunication management. It focuses specifically on the security aspect of the management plane for network elements (NE) and management systems (MS), which are part of the telecommunication infrastructure.