Sep23-summary
|
Page Content
Executive Summary Meeting of ITU-T SG17 'Security', Goyang, 29 August – 8 September 2023 Hot topics of this meeting (summarizing its input & output)- Software supply chain security
- Cybersecurity – Threat intelligence, Zero Trust
- AI security
- IoT security
- 5G security
- Cloud security
- Quantum based security
1 Meeting Output (meeting statistics see Annex E below)- Output standards (28, see Annex A):
- TAP approval (4): Details are in Annex A a).
- TAP not approved (3): Details are in Annex A b).
- TAP determined (8): 6 new and 1 revised Recommendations, and 1 Amendments. Details are in Annex A c).
- AAP consented (10): 5 new and 4 revised Recommendations, and 1 Corrigendum for AAP Last Call. Details are in Annex A d).
- Agreed (6): 1 new Supplement and 5 new Technical Report. Details are in Annex A e).
- New work items (28, see Annex C).
- Work item discontinued (1, see Annex D).
- ITU Workshop on “Zero trust and software supply chain security" was held successfully on 28 August 2023
- SG17 subgroups
- JCAs:
- JCA-IdM: continued with revised ToR, and held its 32nd meeting on Friday 1 Sep 2023
- JCA-COP: remain dormant
- Correspondence Groups
- CG-SG17-wtsa24-prep: continued
- CG-secapa (Correspondence Group on Security Capability and Architecture): continued with revised ToR
2 Next SG17 meetings 2.1 a virtual SG17 interim security coordination meeting (date to be decided, before 1st SG17 meeting in 2024)2.2 5th SG17 meeting: South Africa, Geneva Tuesday 20 February – Friday 1 March 2024 (dates to be confirmed by South Africa host) (9 working days, physical meeting with remote participation) - ITU workshop on “security and privacy for generative AI “, Monday 19 Feb 2024, 09:30-17:30
- Open and extended management team meeting on Monday 19 Feb 2024, 19:00-21:00.
- 33rd JCA-IdM meeting on Friday 23 Feb 2024, 14:30-16:00
- 25 Candidate texts for action, details see Annex B.
2.3 6th SG17 meeting: July Aug/Sep 2024, Geneva (dates and venue to be confirmed) 2.4 Interim RGMs 7 Questions plan to hold the following 10 RGMs before next SG17 meeting:
#
| Q | Date | Place/Host | Subject/objective | 1. | 2/17 | 15-16 November 2023 | MyWorkspace | - prepare texts for action in next SG17 meeting: X.5Gsec-netec, X.5Gsec-srocvs, TR.5Gsec-bsf and TR.zt-acp.
- review all work items and identify future topics for Q2/17
| 2. | 3/17 | 14 Nov 10:00-12:00 (CET) | MyWorkspace | | 3. | 3/17 | 29 Nov 11:00-13:00 (CET) | MyWorkspace | | 4. | 4/17 | tbc | MyWorkspace | - To work on X.stie and X.taeii texts (TD1262, TD1261) determined in this SG17 meeting, consider Russian Federation's written statements addressed to SG17 chairman for inclusion in SG17 meeting reports.
| 5. | 10/17 | 29 -30 November 2023 | Paris, France/SIA | - progress all the work of Q10/17
| 6. | 11/17 | 11-15 Dec 2023 | Nanning (China) | - Generic technologies (such as Directory, PKI, formal languages, object identifiers) to support secure applications.
| 7. | 13/17 | 23-24 November 2023 | Seoul / Korea (Republic of) (with remote participation) | - Prepare the final texts for X.itssec-5 and X.evtol-sec
- Address all work items and future topics.
| 8. | 15/17 | 22-24 November (tentative) | Tokyo (Japan) / NICT & Toshiba (with remote participation) | | 9. | 15/17 | 23 Oct 2023 (tentative) | MyWorkspace | - Comments resolution for X.sec_QKDN_tn
| 10. | 15/17 | 20 Dec 2023 | MyWorkspace | - Wis in the incubation queue
|
Annex A Actions taken on Recommendations, and other texts at SG17 closing plenary on 8 September 2023a) TAP Recommendations approved (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1. | 2/17 | X.1817 (X.5Gsec-message) | Security requirements for 5G message service | New | Hang DONG, Le YU, Hongyang ZHANG | TD1381 | TD934 | - | 2. | 6/17 | X.1333 Cor. 1 | Corrigendum 1 to X.1333: Security guidelines for use of remote access tools in Internet-connected control systems | Cor. | Gunhee LEE | R34 | - | - | 3. | 7/17 | X.1454 (X.sles)*
| Security Measures for Location Enabled Smart Office Services | New | Hang DONG, Feng GAO, Jae Hoon NAH, Junjie XIA | TD985 | | | 4. | 8/17 | X.1645 (X.nssa-cc) | Requirements of network security situational awareness platform for cloud computing | New | Maofei CHEN, Huamin JIN, Zhaoji LIN, Laifu WANG, Yi ZHANG | TD1323 | - | - |
Note: * TAP approval postponed from last SG17 meeting (Feb/Mar 2023).
b) TAP Recommendations not approved (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Determined | Decision | 1 | 6/17 | X.1353 (X.ztd-iot)* | Security methodology for zero-touch deployment in massive IoT based on blockchain | New | Xin KANG, Haiguang WANG, Weidong WANG | R35 | | 2020-09 | (2022-09 /) 2023-03
| For further study before any SG17 decision | 2 | 7/17 | X.1471 (X.websec-7) | Reference monitor for online analytics services | New | Jongyoul Park, Junjie Xia, Hyungjin Lim, Jah Hoon Nah | R36 | | 2014-09 | 2023-03 | For next SG17 meeting to consider re-determination | 3 | 7/17 | X.1771 (X.rdda) | Requirements for data de-identification assurance | New | Feng Gao, I Seok Kang, Soonseok Kim, Jihun Kim, Byunghoon Lee, Yunsik Park, Hyungjin Lim, Heung Youl Youm | R37 | | 2019-01 | 2023-03 | Agreed as X.Sup39 (see Table e) #3 below) |
Note: * TAP re-determined by last SG17 meeting (Feb/Mar 2023). c) TAP Recommendations determined (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1 | 2/17 | X.1818 (X.5Gsec-ctrl) | Security controls for operation and maintenance of IMT-2020 network systems | New | Ayumu KUBOTA, Koji NAKAO, Yutaka MIYAKE | TD1379 | - | - | 2 | 4/17 | X.1221 (X.stie) | Structured threat information expression | New | Michael ROSA, Duncan SPARRELL | TD1262 | TD808 | OASIS STIX Version 2.1 | 3 | 4/17 | X.1222 (X.taeii) | Trusted automated exchange of intelligence information | New | Michael ROSA, Duncan SPARRELL | TD1261 | TD808 | OASIS TAXII Version 2.1 | 4 | 6/17 | X.1352Amd | Amendment to X.1352: Security requirements for Internet of things devices and gateways | New | Heung Youl Youm | TD1451 | | | 5 | 7/17 | X.1150 (X.saf-dfs) | Security assurance framework for digital financial services | New | Jacques FRANCOEUR, Jun Hyung PARK, Sungchae PARK, Heung Youl YOUM | TD1389 | - | - | 6 | 10/17 | X.1280 (X.oob-sa) | Framework for out-of-band server authentication using mobile devices | New | Il Jin JUNG, Sujung PARK, Heejun SHIN, Jonghyun WOO | TD1424 | - | - | 7 | 10/17 | X.1281 (X.osia) | Open Standard Identity APIs (OSIA) specification version 6.1.0 | New | Abbie Barbir | TD1238 | TD1298 | OSIA 6.1.0 | 8 | 13/17 | X.1373rev | Secure software update capability for intelligent transportation system communication devices | Rev | Aram CHO, Sang-Woo LEE, Koji NAKAO, Seungwook PARK | TD1337 | - | - |
d) AAP Recommendations consented (Recommendation ITU-T A.8) | Q/17 | Acronym | Title | New/Rev | Editor(s) | Text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1 | 4/17 | X.1220 (X.spmoh) | Security framework for storage protection against malware attacks on hosts | New | Bongchan KIM, Jonghyun KIM, Sujung PARK, Heejun SHIN, Jonghyun WOO | TD1333 | - | | 2 | 4/17 | X.1236 (X.sr-ctea) | Security requirements and countermeasures for targeted email attacks | New | Chunghan KIM, Jonghyun KIM, Sujung PARK | TD1330 | - | - | 3 | 7/17 | X.1282 (X.scpa) | Security measures for Countering Password Related Online Attacks | New | Hang DONG, Feng GAO, Jung Yeon HWANG, Lijun LIU, Jae Hoon NAH, Qin QIU | TD1353 | | | 4 | 10/17 | X.1095 (X.pet-auth) | Entity authentication service for pet animals using telebiometrics | New | Jae-Sung (Jason) Kim, Taeheon Kim | TD1387 | - | - | 5 | 11/17 | X.509 Cor. 2 | Information Technology – Open systems Interconnection – The Directory – Public-key and attribute certificate frameworks : Corrigendum 2 | Cor. | Erik Andersen | TD1320 | - | ISO/IEC 9594-8 | 6 | 11/17 | X.510rev | Information technology – Open Systems Interconnection – The Directory: Protocol specifications for secure operations | Rev | Erik Andersen | TD1288 | - | ISO/IEC 9594-11 | 7 | 11/17 | X.590 (X.jss) | JSON Signature Scheme (JSS) | New | Bret Jordan, Mark Mcfadden | TD1327 | TD1328 | | 8 | 11/17 | Z.161 | Methods for Testing and Specification (MTS); The Testing and Test Control Notation version 3; Part 1: TTCN-3 Core Language | Rev | Dieter Hogrefe | TD1269 | TD1270 | ETSI ES 201 873-1 V4.15.1 (2023-04) | 9 | 11/17 | Z.166 | Methods for Testing and Specification (MTS); The Testing and Test Control Notation version 3; Part 6: TTCN-3 Control Interface (TCI) | Rev | Dieter Hogrefe | TD1269 | TD1270 | ETSI ES 201 873-6 V4.14.1 (2023-04) | 10 | 11/17 | Z.171 | Methods for Testing and Specification (MTS); The Testing and Test Control Notation version 3; Part 11: Using JSON with TTCN-3 | Rev | Dieter Hogrefe | TD1269 | TD1270 | ETSI ES 201 873-11 V4.10.1 (2023-04) |
e) Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) agreed
# | Q/17 | Acronym | Title | New / Rev | Editor(s) | Text | 1
| 2/17 | TR.cpn-col-sec | Technical Report: Security consideration of collaboration of multiple computing power networks | New | Xiongwei JIA, Zhaoji LIN, Keng LI, Yuwei WANG | TD1342
| 2
| 6/17 | TR.ba-iot | Technical Report: Broadcast authentication schemes for IoT system
| New | Koji NAKAO | TD1455 | 3
| 7/17 | X.sup39 (ex X.rdda) | Supplement Recommendation ITU- T X.1148 - Requirements for data de-identification assurance | New | I Seok Kang, Heung Youl Youm, Soonseok Kim, Hyung Jin Lim | TD1456 | 4
| 7/17 | TR.sgfdm | Technical Report: FHE-based data collaboration in machine learning | New | Jihoon Cho, Jae Hoon Nah, Donggeon Yhee | TD1425 | 5
| 11/17 | TR.x509ac4sc | Technical Report: A use case of X.509 Attribute Certificate for Supply Chain | New | Takao Kojima | TD1377 | 6
| 14/17 | TR.qs-dlt | Technical Report: Guidelines for quantum-safe DLT system | New | Fuwen LIU, Ke WANG, Bo YANG, Heung Youl YOUM | TD1347
|
Annex B Recommendations planned for action in 1st SG17 meeting in 2024a) TAP Recommendations planned for TAP approval (WTSA-20 Resolution 1) - see Annex A Table c)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Timing | -
| 7/17 | X.1471 (X.websec-7) | Reference monitor for online analytics services
| New | Hyungjin LIM, J ae Hoon NAH, Jongyoul PARK, Junjie XIA | R36 |
| 2024-Q1 Note: This work item will need to be re-determined
|
b) TAP Recommendations planned for TAP determination (WTSA-20 Resolution 1)# | Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Timing | 1 | 2/17 | X.5Gsec-netec | Security capabilities of network layer for 5G edge computing | New | Yifu WANG, Chen ZHANG, Bei ZHAO | TD1396 | | 2024-Q1 | 2 | 2/17 | X.5Gsec-srocvs | Security requirements for the operation of 5G core network to support vertical services | New | Feng GAO, Ming HE, Guorong LIU, Jun SHEN | TD1329 | | 2024-Q1 | 3 | 4/17 | X.sgc_rcs | Guidelines for countering spam over RCS messaging | New | Huamin JIN, Shuai WANG, Haodi ZHANG, Yanbin ZHANG | TD1358 | | 2024-Q1 | 4 | 4/17 | X.tsfpp | Technical security framework for protection of users' personal information while countering mobile messaging spam | New | Feng GAO, Wei LIU, Junjie XIA, Bo YU, Chen ZHANG, Yanbin ZHANG | TD1339 | | 2024-Q1 | 5 | 6/17 | X.1353 (X.ztd-iot)*
| Security methodology for zero-touch deployment in massive IoT based on blockchain | New | Xin KANG, Haiguang WANG, Weidong WANG | TD1338 | | 2024-Q1 | 6
| 6/17 | X.sc-iot | Security Controls for Internet of Things (IoT) systems | New | Koji Nakao, Liu Lijun | TD1464 | | 2024-Q1 | 7
| 7/17
| X.1471 (X.websec-7)*
| Reference monitor for online analytics services
| New
| Hyungjin LIM, J ae Hoon NAH, Jongyoul PARK, Junjie XIA
| R36
|
| 2024-Q1
| 8 | 10/17 | X.1250rev | Baseline capabilities for enhanced global identity management and interoperability | Rev | Abbie BARBIR | TD1410 | | 2024-Q1 | 9 | 10/17 | X.gpwd | Threat Analysis and guidelines for securing password and password-less authentication solutions | New | Abbie BARBIR | TD1409 | | 2024-Q1 | 10 | 13/17 | X.evtol-sec | Security guidelines for an electric vertical take-off and landing vehicle (eVTOL) in an urban air mobility environment | New | Aram CHO, Sang-Woo LEE, Seungwook PARK | TD1345 | | 2024-Q1 | 11 | 13/17 | X.itssec-5 | Security guidelines for vehicular edge computing | New | Sang-Woo Lee | TD1365 | | 2024-Q1 |
Notes: (1) In case of joint Question activity, the lead Question is given without parentheses and other Questions are shown in parentheses; such entries are only shown in the table against the lead Question.
* for TAP re-determination.
c) AAP Recommendations planned for AAP consent (Recommendation ITU-T A.8)# | Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Timing | 1 | 7/17 | X.1144rev | The revision of eXtensible Access Control Markup Language (XACML) 3.0 | Rev | Jae Hoon NAH, Duncan Sparrell | TD1033 | | 2024-Q1 | 2 | 7/17 | X.guide-cdd | Security guidelines for combining de-identified data using trusted third party | New | Heung Youl Youm, Sungchae Park, Jae Nam Ko | TD1407 | | 2024-Q1 | 3 | 7/17 | X.sg-dtn | Security Guidelines for Digital Twin Network | New | Meiling CHEN, Jing SHAO, Li SU, Ke WANG | TD1362 | | 2024-Q1 | 4 | 7/17 | X.smsrc | Security Measures for Smart Residential Community | New | Feng GAO, Jae Hoon NAH, Junjie XIA, Longjun ZHAO, Feng ZHANG | TD1419 | | 2024-Q1 | 5 | 11/17 | X.508 (X.pki-em) | Public-key infrastructure: Establishment and maintenance | New | Erik Andersen | TD1290 | ISO/IEC 9594-12 | 2024-Q1 | 6 | 15/17 | X.1715Amd | Amendments to X.1715: Security requirements and measures for integration of quantum key distribution network and secure storage network | New | Kaoru KENYOSHI | TD1434 | | 2024-Q1 | 7 | 15/17 | X.sec_QKDN_AA | Authentication and authorization in QKDN using quantum safe cryptography | New | Kaoru KENYOSHI, Kazunori TANIKAWA | TD1435 | | 2024-Q1 | 8 | 15/17 | X.sec_QKDN_CM | Security requirements and measures for quantum key distribution networks – control and management | New | Taesang CHOI, Hyungsoo KIM, Matthieu LEGRÉ, Kazunori TANIKAWA, Chun Seok YOON | TD1436 | | 2024-Q1 | 9 | 15/17 | X.sec-QKDN-tn | Security requirements and designs for quantum key distribution networks – trusted node | New | Qiang Huang, Minghan Li, Jiajun Ma, Hao Qin | TD1438 | | 2024-Q1 |
d) Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) planned for agreement #
| Q/17 | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Timing | 1
| 2/17 | TR.5Gsec-bsf | Technical Report: Guidelines of Built-in Security Framework for the Telecommunications Network | New | Xiaoting HUANG, Li SU, Ke WANG | TD1475 | - | 2024-03 | 2 | 2/17 | TR.zt-acp | Technical Report: Guidelines for zero trust based access control platform in telecommunication network | New | Jing HUANG, Wei LIU, Xu WANG, Junzhi YAN, Heung Youl YOUM | TD1472 | - | 2024-03 | 3
| 7/17 | X.suppl.uc-dcc | Supplement to X.1152: Use cases for digital COVID-19 certificates | New | Daeun HYEON, Sungchae PARK, Heung Youl YOUM | TD1450 | - | 2024-03 | 4 | 15/17 | TP.inno-2.0 | Technical Paper: Description of the incubation mechanism and ways to improve it | Rev | Arnaud TADDEI | TD1458 | - | 2024-03 |
Annex C New work items
The following new work items were agreed to be added to the SG17 Work Programme: # | Orig. Q | Work item | Title | Editor | Timing | TD | C | 1. | Q1/17 | X.cs-ra | Cyber Security Reference Architecture | N. Kishor NARANG, Pushpendra Kumar SINGH, Preetika SINGH | 2025-Q4 | TD1401 | C330 | 2. | Q2/17 | X.5Gsec-asra* | Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis | Tian Tian, Jing Wang, Daoli Su, Qin Qiu | 2025-Q3 | TD1370 | C419 | 3. | Q3/17 | X.1053rev | Information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations | Chang Oh, Heung Youl Youm, Thaib Mustafa | 2025-09 | TD1433 | C392 | 4. | Q3/17 | X.gsm-cdc | Guidelines on Security Metrics for CDC | Hiroshi Takechi | 2025-04 | TD1452 | C400 | 5. | Q3/17 | X.shcd* | Framework for Security Human Capability Development | Thaib Mustafa, Lee Hwee Hsiung, Norkhadhra Nawawi, Khairul Ekhwan | 2025-09 | TD1437 | C426 | 6. | Q4/17 | X.sf-dtea* | Security framework for detecting targeted email attacks | Hyunmin Shin, Chunghan Kim, Jonghyun Kim, Sujung Park | 2025-09 | TD1334 | C387 | 7. | Q6/17 | X.sr-iiot* | Security requirements for the industrial Internet of things based smart manufacturing reference model | Jong-Hyouk Lee, Taeyang Lee, Jinsue Lee | 2025-09 | TD1368 | C446 | 8. | Q7/17 | X.tg-fdma* | Technical guidelines for fraud detection of malicious applications in mobile devices | Xiaoyuan BAI, Jin PENG, Weidong WANG, Zhiyuan HU, Wenbiao ZHAO | 2025-3Q | TD1349 | C438 | 9. | Q7/17 | X.srgsdcs* | Security requirements and guidelines of sensing and data collection system for city infrastructure | Junjie Xia, Feng Gao, Mengxiang Han, Jae Hoon Nah | 2025-3Q | TD1418 | C452 | 10. | Q7/17 | X.sgdfs-us* | Security guidelines for DFS applications based on USSD and STK | Vincent Mwesigwa | 2024-3Q | TD1421 | C404 | 11. | Q8/17 | X.scr-cna | Security requirements of sandboxed container runtime for cloud native applications | Zeya Zhu, Linze Wu, Shiqi Li, Ye Tao | 2026-09 | TD1470 | C411 | 12. | Q8/17 | X.sgsc | Security guidelines for serverless computing | Shiqi Li, Yong Feng, Ye Tao, Xiaoyuan Bai | 2025-09 | TD1376 | C340 | 13. | Q8/17 | X.sg-tc* | Security guidelines of trusted cloud services | Lu Chen, Ye Tao, Dongxin Liu | 2025-09 | TD1411 | C424 | 14. | Q8/17 | X.srapi-cc* | Security requirements of application programming interface (API) for cloud computing | Laifu Wang, Maofei Chen, Dongxin Liu | 2026-02 | TD1390 | C406 | 15. | Q8/17 | TR.fcnsc** | Framework for cloud native based security collaboration mechanism among cloud service providers | Linghao Zhang, Xuan Zha, Zhengwei Chang, Lin Chen | 2026-06 | TD1403 | C472 | 16. | Q10/17 | X.sup-sat-dfs** | Supplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial services | Heung Youl Youm, Sungchae Park, Junhyung Park | 2024-9 | TD1394 | C365 | 17. | Q10/17 | X.sup-ekyc-dfs** | Supplement to ITU-T X.1254: e-KYC use cases in digital financial services | Heung Youl Youm, Sungchae Park, Daeun Hyeon | 2024-9 | TD1417 | C364 | 18. | Q10/17 | X.afotak* | Authentication framework based on One-Time Authentication Key using Distributed Ledger Technology | Hyungseung Ko, Seung Ju Jeon, Heung Youl Youm, Sungchae Park, Hun Joo Chang | 2025-9 | TD1463 | C349 | 19. | Q13/17 | X.af-sec* | Evaluation methodologies for anonymization techniques using face images in autonomous vehicles | Yousik Lee, Sang-Woo Lee, Jaehoon Nah | 2026-09 | TD1351 | C394 | 20. | Q13/17 | X.fod-sec* | Security guidelines for feature on demand (FoD) service in a connected vehicle environment | Changhun Jung, Jiyong Han, Seungwook Park | 2026-09 | TD1341 | C378 | 21. | Q10/17 (,Q14/17) | X.accsadlt* | Access security authentication based on DLT | Thaib Mustafa, Norkhadhra Nawawi, Radhilufti Madehi, Ariff Olan Kholid | 2025-9 | TD1457 | C402 | 22. | Q14/17 | X.dlt-share | Security requirements for data application software based on DLT to achieve statistics | Gaoshan Zhang, Qiuli Mei, Hang Dong | 2025-9 | TD1399 | C398 | 23. | Q14/17 | X.DLT-dgi | Security requirements of DLT gateway for interoperability | Youngjin Kim, Jung Yeon Hwang, Xiongwei Jia | 2025-9 | TD1367 | C348 | 24. | Q15/17 | X.1715Amd | Amendment to X.1715: Security requirements and measures for integration of quantum key distribution network and secure storage network | Kaoru Kenyoshi | 2024-Q1 | TD1434 | | 25. | Q15/17 | TR.kdc_qkdn** | Key distribution center based approaches in the service layer to manage keys supplied by QKDN | Fuwen Liu | 2025-08 | TD1479 | C430 | 26. | Q15/17 | X.sr-ai* | Security requirements for AI systems | Heung Youl Youm | 2026-09 | TD1348 | C357 | 27. | Q15/17 | X.ssc-sra* | Guidelines for Software Supply Chain Security Audit | Lizhu Su | 2026-09 | TD1384 | C416 | 28. | Q15/17 | X.rm-sup* | Risk management on the security of software supply-chain for telecommunication organizations | Chen ZHANG | 2026-09 | TD1400 | C448 |
Annex D Work items discontinuedQuestion | Acronym | Title | 10/17
| X.1251rev
| Framework for user control of digital identity |
Annex E SG17 meeting Statistics | participants | countries | Member States | Sector Members | SG17 Associates | Academia | Invited Experts | Announced | 480 | 52 | 46 | | | | | Final | 356 | 43 | 37 | 35 | 4 | 6 | 6 |
- Meeting input and organization
Table of SG17 statistics of this and some past meetings | 2023-09 | 2023-03 | 2022-09 | 2022-05* | C | 153 | 119 | 104 | 101 | LS/i | 60 | 70 | 55 | 72 | LS/o | 25 | 23 | 20 | 20 | TD | 415 | 394 | 342 | 331 |
Note * - fully virtual meeting - Contributions: 153 – record high, DDP: 98%.
- APT 136 (89%) (= China 58.5 + Korea 53.5 + Japan 14 + India 7 + Singapore 1 + Malaysia 2)
- Americas 12 (8%)) (= US 9 + Brazil 2 + Canada 1)
- AFR 4 (South Africa 2 + Mali 1+ Uganda 1)
- RCC 1 (= Russia 1)
- EUR (0), LAM (0), ARAB (0).
- LS: matrix in TD1100
- incoming 60 - stable
- Outgoing 25 - stable
- TDs: 415 –higher than normal
|
|
|
|
|