Directrices de seguridad para los sistemas de gestión de identidades |
|
En la Recomendación UIT-T X.1253 se proponen directrices de seguridad para los sistemas de gestión de identidades (IdM). Las directrices de seguridad indican cómo deben instalarse y utilizarse los sistemas IdM para ofrecer servicios de identidad seguros en las NGN (red de la próxima generación) o en el ciberespacio. Las directrices de seguridad consisten en consejos oficiales sobre cómo utilizar los diversos mecanismos de seguridad para proteger los sistemas IdM generales y, además, proporciona los procedimientos de seguridad adecuados para el interfuncionamiento de los sistemas IdM. |
|
Citation: |
https://handle.itu.int/11.1002/1000/11343 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1250-X.1299: Identity management (IdM) and Authentication |
Approval date: |
2011-09-02 |
Provisional name: | X.idmsg |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1253 (09/2011)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 7 (02/2009)
|
ITU-T X.1250 series – Supplement on overview of identity management in the context of cybersecurity
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|