Table of Contents
1Scope
1.1X.805principles
1.2Assumptions
1.3Overview
2References
3Definitionsandabbreviations
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
3.3Abbreviationsandacronyms
4Securitythreatsandrisks
5Securitytrustmodel
5.1Singlenetworktrustmodel
5.2Peeringnetworktrustmodel
6Securityarchitecture
6.1FunctionalNGNarchitecturereference
6.2MappingtoNGNfunctionalarchitecture
6.3IdentificationofNGNresourcesforsecurityprotection
7Objectivesandrequirements
7.1Generalsecurityobjectives
7.2Objectivesforsecurityacrossmultiplenetwork
providerdomains
7.3Requirementsspecificforsecuritydimensions
8Specificsecurityrequirements
8.1CommonsecurityrequirementsforNGNelements
8.2RequirementsforNGNelementsinthetrustedzone
8.3RequirementsforNGNborderelementsinthe
"trusted-but-vulnerable"domain
8.4RequirementsforTEborderelementsinthe
"un-trusted"domain
8.5Securityrecommendationsforterminalequipmentin
the"un-trusted"domain
AppendixI-Securityobjectivesandguidelinesfor
interconnectionofemergencytelecommunications
services
I.1Background
I.2Scope/purpose
I.3Generalobjectives
I.4Generalsecuritycapabilities
I.5Authentication,authorizationandaccesscontrol
I.6Confidentialityandprivacy
I.7Dataintegrity
I.8Communication
I.9Availability
Bibliography Abstract
Covers security requirements for next generation networks (NGNs) and its interfaces (e.g., UNIs, NNIs and ANIs) by applying ITU-T Rec. X.805, Security architecture for systems providing end-to-end communications to ITU-T Recs. Y.2201, NGN release 1 requirements and Y.2012, Functional requirements and architecture of the NGN release 1.