Mar24-summary
|
Page Content Executive Summary Meeting of ITU-T SG17 'Security', Geneva, 20 February – 1 March 2024 Hot topics of this meeting (summarizing both input & output)- AI/ML security
- Digital twin and metaverse
- Quantum based security, Post Quantum Cryptography
- 5G security
- Cloud security
- Cybersecurity, Cyber defence, Zero Trust, countering spam, prevention from cyber attack
- IoT security
- Software supply chain security
- Data protection
1 Meeting Output (meeting statistics see Annex E below)- Output standards (22, see Annex A):
- TAP approval (5): Details are in Annex A a).
- TAP not approved (3): Details are in Annex A b).
- TAP determined (8): 8 new Recommendations. Details are in Annex A c).
- AAP consented (6): 4 new and 1 revised Recommendations, and 1 Amendment for AAP Last Call. Details are in Annex A d).
- Agreed (3): 1 new Supplement, 1 revised Technical Paper and 1 new Technical Report. Details are in Annex A e).
- New work items (54, see Annex C).
- OID registration authority for Republic of Haiti: {joint-iso-itu-t(2) country(16) ht(332)}
- ITU-T Workshop on Generative AI: Challenges and Opportunities for Security and Privacy on 19 February 2024 and ITU-T SG17 Mini-Workshop on ITU-T X.1060 Cyber Defence Center on 22 Feb 2024 were both well attended (270+/60+ participants)
- SG17 Mandate, scope and Question text for next study period reviewed.
- Tutorials on using tools to support standardization, new BSG program and digital rights were well appreciated.
- Delegates from Africa and Arab States gathered for preparation of SG17RG meetings and WTSA-24
- SG17 subgroups (JCAs and Correspondence Groups)
- JCA-IdM 33rd meeting on Friday 1 Sep 2023
- JCA-COP: remain as dormant.
- CG-SG17-wtsa24-prep: continued
- CG-secapa (Correspondence Group on Security Capability and Architecture): continued
- CG-COP (Child online protection): newly established, ToR in TD1811.
- CG-AIsec (Correspondence group on AI security): newly established, ToR in TD1949.
2 Next SG17 meetings 2.1 3rd virtual “ITU-T X.509 Day" event, 9 May 2024, focus on quantum challenges to PKI2.2 2nd SG17 meeting in 2024- 48 Candidate texts for action, details see Annex B.
Option 1: 2-week physical meeting outside Geneva, June/July 2024If member state invites before 15th March 2024, a physical SG17 meeting with remote participation will take place in June/July 2024 for nine working days, preceded by a one-day ITU Workshop on security and privacy for digital twin and metaverse. Option 2: 2-day e-plenary in July + 1-week physical meeting in September- A two-day SG17 e-plenary, 11-12 July, 4-6 hours/day, to complete SG17 preparation for next study period
- One-week physical SG17 meeting with remote participation, Geneva, 2-6 September 2024, no workshop; Open and extended management team meeting on Sunday 1 Sept, 16:00-18:00.
2.3 Interim RGMs 8 Questions plan to hold the following 11 RGMs before next SG17 meeting: #
| Q | Date | Place/Host | Subject/objective | 1. | 1/17 | 17 May 2024 | Seoul, Korea (Republic of) (physical with remote participation)/ Soonhunhyang University | - review the draft 8th edition of Security Manual - review the draft 3rd edition of TR-Suss
- review all work items and identify future topics for Q1/17 | 2. | 3/17 | 5 June, 2024 (10:00-12:00 CEST) | MyWorkspace | | 3. | 3/17 | 6 June, 2024 (10:00-12:00 CEST) | MyWorkspace | | 4. | 3/17 | 11-12 June, 2024 (10:00-12:00 CEST) | MyWorkspace | - Sup-cdc, X.gsm-cdc, X.1060-rev
| 5. | 4/17 | 24 May 2024, tbc | MyWorkspace | - progress all the work of Q4/17
| 6. | 7/17 | 21-22 May 2024 | Hangzhou China (physical with remote participation) / Ant Group | | 7. | 8/17 | 21-22 May 2024 | Hangzhou China (physical with remote participation) / Ant Group | | 8. | 10/17 | One day between 16-27 May 2024 | TBD | - progress all the work of Q10/17
| 9. | 13/17 | 4 ~ 5 June 2024 | e-meeting | - Prepare the final texts for X.evtol-sec and X.sup-cv2x-sec
- Question text
| 10. | 15/17 | 11am-1pm on 4 & 6 June 2024 | e-meeting | - Proposed new WIs and on-going WIs in incubation
| 11. | 15/17 | TBD July 2024 | e-meeting | - Proposed new WIs and on-going WIs on QKD
|
Annex A Actions taken on Recommendations, and other texts at SG17 closing plenary on 1 March 2024a) TAP Recommendations approved (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1. | 6/17 | Amendment of X.1352 | Amendment of X.1352: Security requirements for Internet of things devices and gateways | Rev | Heung Youl YOUM | TD1771 | - | - | 2. | 7/17 | X.1150 (X.saf-dfs) | Security assurance framework for digital financial services | New | Jacques FRANCOEUR, Jun Hyung PARK, Sungchae PARK, Heung Youl YOUM | TD1772 | | | 3. | 10/17 | X.1280 (X.oob-sa) | Framework for out-of-band server authentication using mobile devices | New | Il Jin JUNG, Sujung PARK, Heejun SHIN, Jonghyun WOO | R51 | | | 4. | 10/17 | X.1281 (X.osia) | Open Standard Identity APIs (OSIA) specification version 6.1.0 | New | Abbie Barbir | TD1887 | TD1298 | OSIA 6.1.0 | 5. | 13/17 | X.1373rev | Secure software update capability for intelligent transportation system communication devices | Rev | Aram CHO, Sang-Woo LEE, Koji NAKAO, Seungwook PARK | TD1806 | | |
- b) TAP Recommendations not approved (WTSA-20 Resolution 1)
- TAP approval of updated texts (as identified in TDs below) are deferred to next SG17 physical meeting
# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Determined | 1 | 2/17 | X.1818 (X.5Gsec-ctrl) | Security controls for operation and maintenance of IMT-2020 network systems | New | Ayumu KUBOTA, Koji NAKAO, Yutaka MIYAKE | TD1827 | | 2022-08 | 2023-09 | 2 | 4/17 | X.1221 (X.stie) | Structured threat information expression | New | Michael ROSA, Duncan SPARRELL | TD1823 | OASIS STIX Version 2.1 | 2022-08 | 2023-09 | 3 | 4/17 | X.1222 (X.taeii) | Trusted automated exchange of intelligence information | New | Michael ROSA, Duncan SPARRELL | TD1824 | OASIS TAXII Version 2.1 | 2022-08 | 2023-09 |
c) TAP Recommendations determined (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1 | 2/17 | X.1819 (X.5Gsec-netec) | Security capabilities of network layer for IMT-2020/5G edge computing | New | Yifu WANG, Chen ZHANG, Bei ZHAO | TD1854 | - | - | 2 | 2/17 | X.1820 (X.5Gsec-srocvs) | Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services | New | Feng GAO, Ming HE, Guorong LIU, Jun SHEN | TD1794 | TD1739 | | 3 | 4/17 | X.1237 (X.tsfpp) | Technical security framework for personal identifiable information protection while countering mobile messaging spam | New | Feng GAO, Wei LIU, Junjie XIA, Bo YU, Chen ZHANG, Yanbin ZHANG | TD1804 | | | 4 | 6/17 | X.1354 (X.sc-iot) | Security controls for IoT systems | New | Lijun LIU, Koji NAKAO | TD1875 | | | 5 | 6/17 | X.1353 (X.ztd-iot) Note 1 | Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoT | New | Xin KANG, Haiguang WANG, Weidong WANG | TD1850 | | | 6 | 7/17 | X.1471 (X.websec-7) Note 2 | Reference monitor for online analytics services | New | Hyungjin LIM, Jae Hoon NAH, Jongyoul PARK, Junjie XIA | TD1790 | | | 7 | 10/17 | X.1283 (X.gpwd) | Threat Analysis and guidelines for securing password and password-less authentication solutions | New | Abbie BARBIR | TD1897 | | | 8 | 13/17 | X.1384 (X.itssec-5) | Security guidelines for vehicular edge computing | New | Sang-Woo LEE | TD1807 | | |
Note 1: TAP determined at SG17 Aug/Sep 2022 meeting, TAP re-determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined again in this SG17 Feb/Mar 2024 meeting. Note 2: TAP determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined in this SG17 Feb/Mar 2024 meeting. d) AAP Recommendations consented (Recommendation ITU-T A.8) # | Q/17 | Acronym | Title | New/Rev | Editor(s) | Text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1 | 7/17 | X.1144rev | The revision of eXtensible Access Control Markup Language (XACML) 3.1 | Rev | Jae Hoon NAH, Duncan SPARRELL | TD1846 | | XACML 3.1 | 2 | 7/17 | X.1771 (X.guide-cdd) | Security guidelines for combining de-identified data using trusted third party | New | Heung Youl YOUM, Sungchae PARK, Jae Nam KO | TD1796 | | | 3 | 7/17 | X.2011 (X.sg-dtn) | Security Guidelines for Digital Twin Network | New | Meiling CHEN, Jing SHAO, Li SU, Ke WANG | TD1792 | | | 4 | 7/17 | X.1455 (X.smsrc) | Security Measures for Smart Residential Community | New | Feng GAO, Jae Hoon NAH, Junjie XIA, Longjun ZHAO, Feng ZHANG | TD1926 | | | 5 | 15/17 | X.1713 (X.sec-QKDN_tn) | Security requirements for the protection of quantum key distribution node | New | Qiang HUANG, Minghan LI, Jiajun MA, Hao QIN | TD1817 | | | 6 | 15/17 | X.1715Amd | Security requirements and measures for integration of quantum key distribution network and secure storage network | New | Kaoru KENYOSHI | TD1816 | | |
e) Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) agreed # | Q/17 | Acronym | Title | New / Rev | Editor(s) | Text | 1.
| 1/17 | TP.inno-2.0 | Technical Paper: Description of the incubation mechanism and ways to improve it
| Rev | Arnaud TADDEI | TD1874 | 2.
| 2/17 | TR.zt-acp | Guidelines for zero trust based access control platform in telecommunication network
| New | Jing HUANG, Wei LIU, Xu WANG, Junzhi YAN, Heung Youl YOUM
| TD1838 | 3.
| 7/17 | X.suppl.uc-dcc | Supplement to X.1152: Use cases for digital COVID-19 certificates
| New | Daeun HYEON, Sungchae PARK, Heung Youl YOUM | TD1798 |
Annex B Recommendations planned for action in 2nd SG17 meeting in 20241 TAP Recommendations planned for TAP approval (WTSA-20 Resolution 1) # | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | A.5 or A.25 justification | Equivalent e.g., ISO/IEC | 1 | 2/17 | X.1818 (X.5Gsec-ctrl) Note 3 | Security controls for operation and maintenance of IMT-2020 network systems | New | Ayumu KUBOTA, Koji NAKAO, Yutaka MIYAKE | TD1827 | | | 2 | 2/17 | X.1819 (X.5Gsec-netec) | Security capabilities of network layer for IMT-2020/5G edge computing | New | Yifu WANG, Chen ZHANG, Bei ZHAO | TD1854 | - | - | 3 | 2/17 | X.1820 (X.5Gsec-srocvs) | Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services | New | Feng GAO, Ming HE, Guorong LIU, Jun SHEN | TD1794 | TD1739 | | 4 | 4/17 | X.1221 (X.stie) Note 3 | Structured threat information expression | New | Michael ROSA, Duncan SPARRELL | TD1823 | | OASIS STIX Version 2.1 | 5 | 4/17 | X.1222 (X.taeii) Note 3 | Trusted automated exchange of intelligence information | New | Michael ROSA, Duncan SPARRELL | TD1824 | | OASIS TAXII Version 2.1 | 6 | 4/17 | X.1237 (X.tsfpp) | Technical security framework for personal identifiable information protection while countering mobile messaging spam | New | Feng GAO, Wei LIU, Junjie XIA, Bo YU, Chen ZHANG, Yanbin ZHANG | TD1804 | | | 7 | 6/17 | X.1354 (X.sc-iot) | Security controls for IoT systems | New | Lijun LIU, Koji NAKAO | TD1875 | | | 8 | 6/17 | X.1353 (X.ztd-iot) Note 1 | Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoT | New | Xin KANG, Haiguang WANG, Weidong WANG | TD1850 | | | 9 | 7/17 | X.1471 (X.websec-7) Note 2 | Reference monitor for online analytics services | New | Hyungjin LIM, Jae Hoon NAH, Jongyoul PARK, Junjie XIA | TD1790 | | | 10 | 10/17 | X.1283 (X.gpwd) | Threat Analysis and guidelines for securing password and password-less authentication solutions | New | Abbie BARBIR | TD1897 | | | 11 | 13/17 | X.1384 (X.itssec-5) | Security guidelines for vehicular edge computing | New | Sang-Woo LEE | TD1807 | | |
Note 3: TAP approval deferred by SG17 Feb/Mar 2024 meeting. 2 TAP Recommendations planned for TAP determination (WTSA-20 Resolution 1)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | 1 | 4/17 | X.sgc-rcs | Guidelines for countering spam over RCS messaging | New | Huamin JIN, Shuai WANG, Haodi ZHANG, Yanbin ZHANG | TD1358 | | 2 | 6/17 | X.ra-iot | Security risk analysis framework for IoT devices | New | Gunhee LEE, Shinya SASA | TD1882 | | 3 | 7/17 | X.sgdfs-us | Security guidelines for DFS applications based on USSD and STK | New | Vincent MWESIGWA | TD1973 | | 4 | 8/17 | X.gdsml | Guidelines for data security using machine learning in big data infrastructure | New | Mi CAO, Ye TAO, Laifu WANG, Lei XU | TD1845 | | 5 | 8/17 | X.gecds | Guideline on edge computing data security | New | Lu CHEN, Zhaoji LIN, Ye TAO, Shuai WANG | TD1857 | | 6 | 8/17 | X.sgcnp | Security guidelines for cloud native PaaS | New | Wei LIU, Nan MENG, Ye TAO, Laifu WANG, Lei XU | TD1810 | | 7 | 8/17 | X.sgmc | Security guidelines for multi-cloud | New | Wei LIU, Nan MENG, Ye TAO, Lei XU, Yi ZHANG | TD1809 | | 8 | 8/17 | X.soar-cc | Framework of Security Orchestration, Automation and Response for cloud computing | New | Maofei CHEN, Dongxin LIU, Ye TAO, Laifu WANG, Yi ZHANG | TD1872 | | 9 | 10/17 | X.1250rev | Baseline capabilities for enhanced identity management and interoperability | Rev | Abbie BARBIR | TD1945 | | 10 | 13/17 | X.evtol-sec | Security requirements and guidelines for telecommunications in an urban air mobility (UAM) environment | New | Aram CHO, Sang-Woo LEE, Seungwook PARK | TD1866 |
|
3 AAP Recommendations planned for AAP consent (Recommendation ITU-T A.8)# | Q | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | 1 | 7/17 | X.smdtsc | Security Measures for Digital Twin System of Smart Cities | New | Feng GAO, Jae Hoon NAH, Junjie XIA, Feng ZHANG, Longjun ZHAO | TD1961 | | 2 | 8/17 | X.sa-ec | Security architecture of edge cloud | New | Huamin JIN, Zhaoji LIN, Ye TAO, Shuai WANG, Haodi ZHANG | TD1873 | | 3 | 8/17 | X.sg-scmr | Security guidelines for selecting computing methods and resources from Cloud Service Providers | New | Huizheng GENG, Li LU, Nan MENG, Ke WANG | TD1946 | | 4 | 10/17 | X.tas | Telebiometric authentication using speaker recognition | | Fatoumata SAMAKE, Myung Geun CHUN | TD1892 | | 5 | 11/17 | X.508 (X.pki-em) | Public-key infrastructure: Establishment and maintenance | New | Erik ANDERSEN | TD1290 | ISO/IEC 9594-12 | 6 | 11/17 | X.500Amd.1 | The Directory: Overview of concepts, models and services | Rev | Erik ANDERSEN | TD1913
| ISO/IEC 9594-1 | 7 | 11/17 | X.501Amd.2 | The Directory: Models | Rev | Erik ANDERSEN | TD1914 | ISO/IEC 9594-2 | 8 | 11/17 | X.509Amd.1 | The Directory: Public-key and attribute certificate frameworks | Rev | Erik ANDERSEN, Qin LI | TD1919 | ISO/IEC 9594-8 | 9 | 11/17 | X.510Amd.1 | The Directory - Protocol specifications for secure operations | Rev | Erik ANDERSEN, Qin LI | TD1921 | ISO/IEC 9594-11 | 10 | 11/17 | X.511Amd.1 | The Directory: Abstract service definition | Rev | Erik ANDERSEN | TD1915 | ISO/IEC 9594-2 | 11 | 11/17 | X.518Amd.1 | The Directory: Procedures for distributed operation | Rev | Erik ANDERSEN | TD1916 | ISO/IEC 9594-4 | 12 | 11/17 | X.519Amd.1 | The Directory: Protocol specifications | Rev | Erik ANDERSEN | TD1917 | ISO/IEC 9594-5 | 13 | 11/17 | X.520Amd.1 | The Directory: Selected attribute types | Rev | Erik ANDERSEN | TD1918 | ISO/IEC 9594-6 | 14 | 11/17 | X.521Amd.1 | The Directory: Selected object classes | Rev | Erik ANDERSEN | TD1922 | ISO/IEC 9594-7 | 15 | 11/17 | X.525Amd.1 | The Directory: Replication | Rev | Erik ANDERSEN | TD1920 | ISO/IEC 9594-9 | 16 | 14/17 | X.sc-dlt | Security controls for distributed ledger technology | | Kadio KASSY, Youngjoo LEE, Kyeong Hee OH, Keundug PARK, Preetika SINGH, Sandeep Kumar VIJAIVERGIA | TD1835 | | 17 | 15/17 | X.sec_QKDN_AA | Authentication and authorization in QKDN using quantum safe cryptography | New | Kaoru KENYOSHI, Kazunori TANIKAWA | TD1899 | | 18 | 15/17 | X.sec_QKDN_CM | Security requirements and measures for quantum key distribution networks – control and management | New | Taesang CHOI, Hyungsoo KIM, Matthieu LEGRÉ, Kazunori TANIKAWA, Chun Seok YOON | TD1900 | | 19 | 15/17 | X.secadef | Security capabilities definitions | New | Arnaud TADDEI, Chen ZHANG | TD2013 | |
4 Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) planned for agreement #
| Q/17 | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | 1 | 1/17 | TR.sec-manual | Technical Report: 8th edition of Security Manual | Rev | Kyeong Hee OH | TD3104
| | 2 | 1/17 | TR.Suss | Technical Report: 3rd edition of Technical Report: Successful use of security standards | Rev | Abbie BARBIR | TD1040
| | 3 | 2/17 | TR.5Gsec-bsf | Technical Report: Guidelines of built-in security framework for the telecommunications network | New | Xiaoting HUANG, Li SU, Ke WANG | TD1975 | | 4 | 10/17 | X.sup-ekyc-dfs | Supplement to ITU-T X.1254: e-KYC use cases in digital financial services | New | Daeun HYEON, Sungchae PARK, Heung Youl YOUM | TD1956 | | 5 | 10/17 | X.sup-sat-dfs | Supplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial services | New | Junhyung PARK, Sungchae PARK, Heung Youl YOUM | TD1944 | | 6 | 13/17 | X.sup-cv2x-sec | Supplement to X.1813 – Security deployment scenarios for cellular vehicle -to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC) | New | Jeongwook GO, Youngjae KIM, Jae Eon OH, Seongki SHIN, Heung Youl YOUM | TD1831 | | 7 | 15/17 | TR.smpa | Technical Report: Security middle platform architecture | New | Jingyang LI, Ke WANG Shuai WANG, Haodi ZHANG | TD1942 | | 8 | 15/17 | TR.srsec | Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators | | Gang DU, Xuetao DU, Chen ZHANG | TD1397 | |
Annex C New work itemsThe following 54 new work items were agreed to be added to the SG17 Work Programme: # | Q | Work item | Title | Editor | Timing | TD | C | 1. | Q1/17 | TR.cs-uc** | Technical report: Use cases for extracting the security requirements for cyber security reference architecture | Da Eun HYEON, Juhee KI, Sungchae PARK, Heung Youl YOUM | 2025-Q4
| TD1815 | C583 | 2. | Q1/17 | TR.cs-sc** | Technical report: Collection of Security Concerns to support X.cs-ra Cyber Security Reference Architecture | N. Kishor NARANG, Jitender PRAKASH, Preetika SINGH, Pushpendra Kumar SINGH | 2025-Q4 | TD1859 | C639 | 3. | Q1/17 | CRAMM Roadmap** | SG17 Cyber Security Reference Architectures, Models and Methodologies Roadmap | Arnaud TADDEI | 2026-Q4 | TD1877 | C652 | 4. | Q2/17 | TR.sg-lmcs | Technical report: Security guidelines for DLT-based lifecycle management of computing services | Lanfang REN, Junzhi YAN, Bo YANG, Huachun ZHOU | 2026-09 | TD1870 | C609 | 5. | Q2/17 | TR.sec-int-cpc | Technical report: Security considerations for interconnection of computing power centers | Xiang LIU, Yu ZHANG, Weizhe ZHANG, Yu JIANG | 2026-03 | TD1885 | C508 | 6. | Q2/17 | TR.sd-cnc | Technical report: Security guidelines for data of coordination of networking and computing | Tingting YANG, Ke WANG, Li SU | 2026-09 | TD1906 | C573 | 7. | Q2/17 | X.ztmc* | Guidelines for high level Zero trust model and its security capabilities in telecommunication networks | Heung Youl YOUM, Junhyung PARK | 2026-09 | TD1863 | C526 | 8. | Q3/17 | X.cdc-csirt | Relationships between Cyber Defence/Security Centre and Computer Security Incident Response Team | Arnaud TADDEI | 2026 Q4 | TD1818 | C613 | 9. | Q3/17 | X.1060-rev | Framework for the creation and operation of a cyber defence/security centre | Arnaud TADDEI Shigenori TAKEI | 2025 Q4 | TD1878 | C613 | 10. | Q3/17 | X.1058-rev* | Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection | Heung Youl YOUM, ChangOh KIM, Sungchae PARK, Thaib MUSTAFA, Jinghua MIN | 2027 | TD1955 | TD1671 TD1746 | 11. | Q4/17 | X.nspam | Security framework for network storage protection against malware attacks | Jonghyun WOO, Sungyong SHIN, Bongchan KIM, Jonghyun KIM, Sujung PARK | 2026-03 | TD1822 | C563 | 12. | Q4/17 | X.gpmr | Guidelines and security measures for prevention and mitigation of ransomware | Wenlei WANG, Mufan CUI, Zhihui HAN, Feng GAO, Minfeng QIU | 2026-06 | TD1852 | C544 | 13. | Q6/17 | TR.st-iot** | Technical report: Security threat scenarios in Internet of things | Dalton C. G. VALADARES, Ernesto Marcos SILVEIRA | 2025-8 | TD1925 | C616 | 14. | Q6/17 | X.sm-iot* | Technical requirements of security situation monitoring for Internet of things (IoT) devices | Lijun LIU, Hang DONG, Shuang ZHANG, Le YU, Xiaoqin HUANG | 2026-03 | TD1891 | C610 | 15. | Q6/17 | X.gnssa-iot* | Guidelines of implementing network security situational awareness for IoT systems | Maofei CHEN, Laifu WANG, Dongxin LIU, Zhaoji LIN | 2027-02 | TD1862 | C579 | 16. | Q7/17 | X.fr-vsasi | Functional requirements for visualization service of network security assets and security incidents based on digital twin | Junjie XIA, Feng GAO, Mengxiang HAN, Ke WANG | 2025-3Q | TD1871 | C634 | 17. | Q7/17 | X.ias | Functional requirements for the unified authentication service of telecommunication operators | Hang DONG, Chen ZHANG, Yunfa ZHU | 2026-1Q | TD1867 | C647 | 18. | Q7/17 | X.str-irs* | Security threats and requirements for information recommendation service | Yunwei ZHAO, Zhiyuan HU, Junzhi YAN | 2027-1Q | TD1801 | C546 | 19. | Q7/17 | X.sgrtem* | Security guidelines for real-time event monitoring and integrated management in smart city platforms | Junjie XIA, Feng GAO, Chang SONG | 2026-1Q | TD1813 | C633 | 20. | Q8/17 | X.FR-MSP | Functional Requirements of Microsegmentation Platform in a cloud-based environment | Shuai WANG, Haodi ZHANG, Huamin JIN | 2027-03 | TD1880 | C623 | 21. | Q8/17 | X.ckrp | Framework of cryptographic key resource pool for cloud computing | Jun SHEN, Ming HE, Leyi ZHANG | 2026-02 | TD1840 | C597 | 22. | Q8/17 | X.mbaas-cs-sec | Security requirements and framework of collaboration service for multiple blockchain as a service platforms | Xiongwei JIA, Keng LI, Kyeong Hee OH, Yuwei WANG | 2025-12 | TD1842 | C581 | 23. | Q8/17 | X. gapci* | Guidelines on Anti-DDoS protection for cloud infrastructure | Lin CHEN, Yue SHI, Nan MENG, Hang DONG | 2026-02 | TD1886 | C541 | 24. | Q10/17 | X.1254rev* | Entity authentication assurance framework | Abbie BARBIR, Sylvan TRAN | 2026-03 | TD1969 | C483 | 25. | Q10/17 | X.oob-pacs | Framework for out-of-band physical access control systems using beacon-initiated mutual authentication | Jonghyun WOO, Heejun SHIN, Il Jin JUNG, Tail LEE, Youngjoo LEE, Sujung PARK | 2026-03 | TD1964 | C562 | 26. | Q10/17 | X.tis | Telebiometric authentication based on information splitting | Myung Geun CHUN | 2025-09 | TD1934 | C565 | 27. | Q10/17 | TR.divs** | Technical report: Rationale and initial approach of a decentralized identity verification system (DIVS) based on verifiable data | Heung Youl YOUM, Sungchae PARK | 2025-09 | TD1948 | C570 | 28. | Q10/17 | TR.SIMRegBio** | Technical report: Guidelines for SIM Identity and Biometrics Registration. | Kwadwo Gyamfi OSAFO-MAAFO, Opeolu OYEBANJI, Shamsuddeen SABO, Pushpendra Kumar SINGH | 2026-09 | TD1933 | C645 | 29. | Q11/17 | X.500Amd.1 | The Directory: Overview of concepts, models and services | Erik ANDERSEN | 2024-09 | TD1913
| C490 | 30. | Q11/17 | X.501Amd.2 | The Directory: Models | Erik ANDERSEN | 2024-09 | TD1914 | C491 | 31. | Q11/17 | X.509Amd.1 | The Directory: Public-key and attribute certificate frameworks | Erik ANDERSEN, Qin LI | 2024-09 | TD1919 | C492 | 32. | Q11/17 | X.510Amd.1 | The Directory - Protocol specifications for secure operations | Erik ANDERSEN, Qin LI | 2024-09 | TD1921 | C493 | 33. | Q11/17 | X.511Amd.1 | The Directory: Abstract service definition | Erik ANDERSEN
| 2024-09 | TD1915 | C494 | 34. | Q11/17 | X.518Amd.1 | The Directory: Procedures for distributed operation | Erik ANDERSEN | 2024-09 | TD1916 | C495 | 35. | Q11/17 | X.519Amd.1 | The Directory: Protocol specifications | Erik ANDERSEN | 2024-09 | TD1917 | C496 | 36. | Q11/17 | X.520Amd.1 | The Directory: Selected attribute types | Erik ANDERSEN | 2024-09 | TD1918 | C497 | 37. | Q11/17 | X.521Amd.1 | The Directory: Selected object classes | Erik ANDERSEN | 2024-09 | TD1922 | C498 | 38. | Q11/17 | X.525Amd.1 | The Directory: Replication | Erik ANDERSEN | 2024-09 | TD1920 | C499 | 39. | Q13/17 | X.aamd-sec* | Security guidelines for categorized data in advanced air mobility (AAM) | Seungwook PARK, Changhun JUNG, Yousik LEE, Sang-woo LEE | 2027-03 | TD1820 | C560 | 40. | Q14/17 | X.qsdlt-ca* | Guidelines for building crypto-agility and migration for quantum-safe DLT systems | Fuwen LIU, Ke WANG, WeiDong WANG, Li SU, Heung Youl YOUM | 2026-3 | TD1869 | C582 | 41. | Q14/17 | TR.dw-lasf** | Technical report: A landscape analysis and security features for a digital wallet | Kyeong Hee OH, Dong Bin CHOI, Xiaoyuan BAI, Xiongwei JIA | 2026-3 | TD1802 | C564 | 42. | Q14/17 | X.1400rev | Terms and definitions for distributed ledger technology | Heung Youl YOUM, Sungchae PARK, Jae Nam KO | 2025-3 | TD1799 | C552 | 43. | Q14/17 | X.sr-dpts* | Security requirements for DLT data on permissioned DLT-based distributed power trading systems | Jong-Hyouk LEE, Taeyang LEE, Haneul LEE | 2025-9 | TD1836 | C566 | 44. | Q14/17 | X.sg-dcs* | Security guidelines for DLT-based digital collection services | Jong-Hyouk LEE, Jihye KIM | 2025-9 | TD1837 | C509 | 45. | Q14/17 | TR.gscim-dlt** | Technical report: Guidelines for security consideration for incident management by DLT service provider | Yunwei ZHAO, Yue CHEN, Han HAN, Ke WANG, Junzhi YAN, | 2026-9 | TD1828 | C548 | 46. | Q15/17 | X.sr-da-gai* | Security threats and requirements for data annotation service of generative artificial intelligence" | Yunwei ZHAO, Zhiyuan HU, Luhua WANG, Hong ZHANG, Junjie XIA | 2027-03 | TD1819 | C545 | 47. | Q15/17 | X.sgGenAI* | Security Guidelines for Generative Artificial Intelligence Application Service | Huifang LI, Yang CHEN, Ye TAO, Sungchae PARK
| 2026- Q3 | TD1834 | C635 | 48. | Q15/17 | X.ig-dw* | Implementation guidelines for digital watermarking | Shiqi LI, Yong SUN, Weiwei SUN | 2026-09 | TD1972 | C542 | 49. | Q15/17 | X.sc-sscti* | Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry | Baoqi YAN, Jia XIE, Yuanying XIAO | 2027-Q1 | TD1974 | C567 | 50. | Q15/17 | TR.se-ai** | Technical report: Security Evaluation on Artificial Intelligence Technology in ICT | Quanchao LIU, Ke WANG, Jia CHEN, Yong SUN | 2025-08 | TD2002 | C584 | 51. | Q15/17 | X.srm-fml* | Security requirements and measures of federated machine learning | Qiuli MEI, Xiongwei JIA, Jianing CHEN | 2026-02 | TD1994 | C605 | 52. | Q15/17 | X.pg-cla: | Procedural guideline for continual learning to actively respond to network attacks | Jongyoul PARK, Jae Hoon NAH | August 2025 | TD2005 | C500 | 53. | Q15/17 | TR.ac-pqc** | Technical report: Guidance on use of advanced cryptography based on PQC | Koji NAKAO | 2025-09 | TD1990 | C654 | 54. | Q15/17 | TR.QKDN-SP** | Technical report: Overview of security profile for Quantum Key Distribution Networks in hybrid mod | Venkata Rama Raju CHELLE, Ravindra Pratap SINGH, Prabhakar KRISHNAN, Soumya DAS | 2025 | TD1970 | C658 |
Note: * marked items are for approval by TAP; ** marked items are for approval by agreement; Items without any mark are for approval by AAP.
Annex D Work items discontinued
Annex E SG17 meeting Statistics | Participants | # of Countries | # of Member States | # of Sector Members | # of SG17 Associates | # of Academia | # of Invited Experts | Announced | 433 | 61 | 53 | | | | | Final | 333 | 55 | 49 | 32 | 3 | 6 | 11 |
- Meeting input and organization
Table of SG17 statistics of this and some past meetings
| 2024-03 | 2023-09 | 2023-03 | 2022-09 | 2022-05* | C | 187 | 153 | 119 | 104 | 101 | LS/i | 89 | 60 | 70 | 55 | 72 | LS/o | 41 | 25 | 23 | 20 | 20 | TD | 520 | 415 | 394 | 342 | 331 |
Note * - fully virtual meeting - Contributions: 187 – New record, DDP: 98%.
- APT 154 (82%) (= China 77 + Korea 54 + Japan 10 + India 9 + Malaysia 2+ Singapore 1+ Iran 1)
- EUR 18 (10%) (Denmark 11 + UK 7)
- Americas 9 (5%) (= US 8 + Brazil 1)
- AFR 5 (3%) (South Africa 1.25 + Uganda 1.25 + Ghana 1.25 + Mali 1 + Nigeria 0.25)
- RCC 1 (= Russia 1)
- LAM (0), ARAB (0).
- LSi/o (matrix in TD1515) (past meetings: 60/25, 61/22, 55/21, 72/21)
- Incoming 89 – New record
- Outgoing 41 - New record
|
|
|
|
|