Work item | Question | Equiv. Num. | Status | Timing | Approval process | Version | Liaison relationship | Subject / Title | Priority |
CRAMM Roadmap | Q1/17 | | Under study | 2026-Q4 | Agreement | New | SG2, SG15, SG20 | SG17 Cyber Security Reference Architectures, Models and Methodologies Strategy and Roadmap | Medium |
Security Compendium | Q1/17 | | Under study | 2025-04 | Agreement | Rev. | - | ICT Security Compendium | Medium |
Security standards roadmap | Q1/17 | | Under study | 2025-04 | Agreement | Rev. | - | ICT Security standards roadmap | Medium |
SG17 implementation of PP-22 Res | Q1/17 | | Under study | 2026-09 | Agreement | Rev. | - | SG17 activities and achievements in support of the most recent Resolutions of the ITU PP | Medium |
SG17 implementation of WTDC-21 Res | Q1/17 | | Under study | 2025-09 | Agreement | Rev. | - | SG17 activities and achievements in support of the most recent Resolutions of the WTDC | Medium |
SG17 implementation of WTSA-24 Res | Q1/17 | | Under study | 2025-09 | Agreement | Rev. | - | SG17 activities and achievements in support of the most recent Resolutions of the WTSA | Medium |
TR.cs-sc | Q1/17 | | Under study | 2025-Q4 | Agreement | New | ISO/IEC JTC1/SC27; ISO/IEC JTC1/WG13 | Technical Report: Collection of Security Concerns for extracting the Security Requirements for Cyber Security Reference Architecture | Medium |
TR.cs-uc | Q1/17 | | Under study | 2025-Q4 | Agreement | New | ISO/IEC JTC1/SC27; ISO/IEC JTC1/WG13 | Technical Report: Use cases for extracting the security requirements for cyber security reference architecture | Medium |
TR.se-ai | Q1/17 | | Under study | 2025-08 | Agreement | New | ITU-T SG13, ISO/IEC JTC 1/SC 27, ISO/IEC JTC 1/SC 42 | Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT | Medium |
TR.smpa | Q1/17 | | Under study | 04-2025 | Agreement | New | - | Technical Report: Security middle platform architecture | Medium |
TR.srsec | Q1/17 | | Under study | 04-2025 | Agreement | New | IETF, ITU-T SG13 | Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators | Medium |
TR.Sussrev | Q1/17 | | Under study | 04-2025 | Agreement | Rev. | - | Technical Report: Successful use of security standards | Medium |
X.arch-design | Q1/17 | | Under study | 2025-Q4 | AAP | New | ITU-D SG2 Q3, TSAG, ITU-T SG13 | Design principles and best practices for security architectures | Low |
X.cs-ra | Q1/17 | | Under study | 2025-Q4 | AAP | New | ISO/IEC JTC 1/SC 27, ISO/IEC JTC 1/WG13 | Cyber security reference architecture | Medium |
X.dtns | Q1/17 | | Under study | 2025-03 | AAP | New | SG13, SG20 | Guidelines of using digital twin of network for network security | Medium |
X.gcspcc | Q1/17 | | Under study | 2026-03 | TAP | New | - | Guidelines of developing of cybersecurity simulation platform based on cloud computing | Medium |
X.icd-schemas (ex X.ics-schema) | Q1/17 | | Under study | 2025-03 | AAP | New | OASIS CTI TC; OASIS OpenC2 TC | Vendor agnostic security data schemas for integrated cyber defence solutions | Low |
X.ig-dw | Q1/17 | | Under study | 2026-09 | TAP | New | SG16 | Implementation guidelines for digital watermarking | Medium |
X.pg-cla | Q1/17 | | Under study | 2025-08 | AAP | New | ITU-T SG13, ISO/IEC JTC1/SC 42, ETSI | Procedural guideline for continual learning to actively respond to network attacks | Medium |
X.rm-sup | Q1/17 | | Under study | 2026-09 | TAP | New | ISO/IEC JTC 1/SC 27 WG4 & WG5 | Risk management on the security of software supply-chain for telecommunication organizations | Medium |