CSA ISO/IEC 18028-5 : 2006
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS
Hardcopy , PDF
06-09-2016
English
01-01-2006
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
3.1 Terms defined in other International Standards
3.2 Terms defined in this part of ISO/IEC 18028
4 Abbreviated terms
5 Overview of VPNs
5.1 Introduction
5.2 Types of VPN
5.3 VPN techniques
5.4 Security aspects
6 VPN security objectives
7 VPN security requirements
7.1 Confidentiality
7.2 Integrity
7.3 Authentication
7.4 Authorization
7.5 Availability
7.6 Tunnel Endpoints
8 Guidelines for the selection of secure VPNs
8.1 Regulatory and legislative aspects
8.2 VPN management aspects
8.3 VPN architectural aspects
9 Guidelines for the implementation of secure VPNs
9.1 VPN management considerations
9.2 VPN technical considerations
Annex A (informative) Technologies and protocols used to
implement VPNs
A.1 Introduction
A.2 Layer 2 VPNs
A.3 Layer 3 VPNs
A.4 Higher Layer VPNs
A.5 Comparison of typical VPN protocol security features
Bibliography
Gives detailed direction with respect to the security aspects of using Virtual Private Network (VPN) connections to inter-connect networks, and also to connect remote users to networks.
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
Canadian Standards Association
|
Status |
Withdrawn
|
Standards | Relationship |
ISO/IEC 18028-5:2006 | Identical |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 18028-4:2005 | Information technology Security techniques IT network security Part 4: Securing remote access |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 18043:2006 | Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
ISO/IEC 18028-2:2006 | Information technology Security techniques IT network security Part 2: Network security architecture |
ISO/IEC TR 15947:2002 | Information technology Security techniques IT intrusion detection framework |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/IEC TR 18044:2004 | Information technology Security techniques Information security incident management |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.