Work item | Question | Equiv. Num. | Status | Timing | Approval process | Version | Liaison relationship | Subject / Title | Priority |
TR.dpama | Q7/17 | | Under study | 2025-09 | Agreement | New | ISO/IEC JTC 1/SC 27, IEEE IEEE3079.3.2 | Technical Report on "Landscape analysis for data protection of avatars in metaverse applications" | Medium |
X.1456 (ex X.sgdfs-us) | Q7/17 | | Determined 2024-09-06 | 2024-09 | TAP | New | None | Security guidelines for DFS applications based on USSD and STK | Medium |
X.fr-vsasi | Q7/17 | | Under study | 2025-Q3 | AAP | New | - | Functional requirements for visualization service of network security assets and security incidents based on digital twin | - |
X.ias | Q7/17 | | Under study | 2026-03 | AAP | New | ISO/IEC JCT1 SC27 WG2&WG5, IETF Security OAuth | Functional requirements for the integrated authentication service of telecommunication operators | - |
X.sec-grp-mov | Q7/17 | | Under study | 2025-Q2 | TAP | New | - | Security guideline for group movement service platform | Low |
X.sgrtem | Q7/17 | | Under study | 2026-03 | TAP | New | ITU-T SG20, ITU-T SG16, ISO/IEC JTC 1/WG11 | Security guidelines for real-time event monitoring and integrated management in smart city platforms | Medium |
X.smdtf | Q7/17 | | Under study | 2025-Q1 | AAP | New | - | Security measures for digital twin federation in smart cities and communities | Medium |
X.srgsc | Q7/17 | | Under study | 2025-Q3 | TAP | New | ITU-T SG20, ISO/IEC JTC1 SC27 | Security requirements and guidelines of application and service for smart city platform | Medium |
X.srgsdcs | Q7/17 | | Under study | 2025-Q3 | TAP | New | ITU-T SG20 | Security requirements and guidelines of sensing and data collection system for city infrastructure | Medium |
X.srmpc | Q7/17 | | Under study | 2025-Q2 | AAP | New | - | Security requirements for monitoring physical city assets | Medium |
X.str-irs | Q7/17 | | Under study | 2027-03 | TAP | New | - | Security threats and requirements for information recommendation service | - |
X.tc-ifd | Q7/17 | | Under study | 2025-09 | TAP | New | - | Technical capabilities of interactive fraud detection | Low |
X.tg-fdma | Q7/17 | | Under study | 2025-Q2 | TAP | New | - | Technical guidelines for fraud detection of malicious applications in mobile devices | Medium |
X.vide | Q7/17 | | Under study | 2026-Q3 | AAP | New | ISO/IEC JTC 1/SC 27/WG5 | Guideline of visual feature protection and secure sharing mechanisms for de-identification | Medium |
TR.fcnsc | Q8/17 | | Under study | 2026-06 | Agreement | New | - | Technical Report: Framework for cloud native based security collaboration mechanism among cloud service providers | Medium |
X.1631rev | Q8/17 | ISO/IEC 27017 | Under study | 2025-09 | TAP | Rev. | ISO/IEC JTC 1/SC 27/WG 1 | Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services | - |
X.1648 (ex X.gecds) | Q8/17 | | Determined 2024-09-06 | 2024-09 | TAP | New | ITU-T SG13 | Guideline on edge computing data security | Medium |
X.asm-cc | Q8/17 | | Under study | 2025-09 | TAP | New | ITU-T SG13 | Requirements of attack surface management for cloud computing | Medium |
X.ckrp | Q8/17 | | Under study | 2026-02 | AAP | New | ISO, NIST, CSA | Framework of cryptographic key resource pool for cloud computing | Medium |
X.fr-msp | Q8/17 | | Under study | 2027-03 | AAP | New | - | Functional Requirements of Microsegmentation Platform in a cloud-based environment | - |