CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Security management system (SMS) overview      
        6.1     Security management concepts relationship to next generation networks      
        6.2     Security management relationship to [ITU-T X.800] and [ITU-T X.805] security concepts     
        6.3     Security management concepts relationship to ITU-T Recommendations M.3016‑series     
        6.4     Security management concepts relationship to ITU-T management Recommendations         
 7     Security management system functional requirements        
        7.1     Administrator interface FG 
        7.2     Administrator account management FG      
        7.3     Credentials management FG          
        7.4     Configuration management FG       
        7.5     Fault management FG        
        7.6     Security policy management FG     
        7.7     Verification and validation management FG
        7.8     Corrective action management FG 
        7.9     Security management information FG         
       7.10     Communications interface FG       
Annex A – Proforma – M.3410 – SMS requirements     
        A.1     Basis of profile proforma for security requirements 
        A.2     Guidelines and instructions for proforma specification         
        A.3     Proforma  
Appendix I – Relationship of security management concepts to [ITU-T X.800]     
        I.1        Trust domains      
        I.2        Security management information bases    
        I.3        Trust domain SMIB content         
        I.4        Communication of security management information          
        I.5        Distributed security management administration     
        I.6        Security mechanism management  
Appendix II – SMS relationship with the role of security in other TSP management frameworks and systems     
       II.1     SMS relationship to ITU-T management Recommendations
       II.2     Security of legacy/existing management systems      
Appendix III – TSP infrastructure and security service managed elements     
      III.1     TSP NGN security service managed elements        
      III.2     Framework and topology of the NGN        
      III.3     NGN decomposition          
      III.4     Security mechanisms within an NGN          
      III.5     NGN computing platform security mechanisms       
Bibliography