ETR 336 : 20001
Current
The latest, up-to-date edition.
TELECOMMUNICATION MANAGEMENT NETWORK (TMN)
Hardcopy , PDF
English
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Rationale
4.1 Why security is needed for TMN?
4.2 Why security for TMN should be standardized?
5 Objectives for TMN security standardization
6 Methodology applied
6.1 TMN system description (clause 7)
6.2 Security objectives for TMN (clause 8)
6.3 Legislation issues (clause 9)
6.4 Threat analysis and risk assessment for TMN (clause 10)
6.5 Security requirements for TMN (clause 11)
6.6 Security services and mechanisms for TMN (clause 12)
6.7 Methodology for TMN security standardization (clause 13)
6.8 Identification of existing security standards (annex A
and B)
6.9 Subjects for TMN security standardization (annex C)
7 System description
7.1 TMN functional architecture
7.2 TMN information architecture
7.3 TMN physical architecture
7.4 How to apply the TMN architecture models
7.5 Architectural scoping
7.6 Actors and roles
7.7 Security domains
8 Generic security objectives for TMN
8.1 Security objectives derived from ITU-T Recommendation
M.3010
8.2 Formulation of security objectives for TMN
9 Legislation issues
9.1 Introduction
9.2 Applicable legislation areas
9.3 Sources of legislation
9.4 Possible consequences for TMN security standardization
10 Threat analysis and risk assessment
11 Requirements
11.1 Introduction
11.2 Classification of requirements
11.3 Security requirements
11.4 Priority of requirements
11.5 Existing results
12 Security services, functional classes and security management
12.1 Introduction
12.2 Security requirements and security services
12.3 Functional classes and security sub-profiles
12.4 Security management
13 Methodology for security standard elaboration
13.1 Description of TMN Scenarios
13.2 Identification of existing relevant standards for TMN
and security
13.3 Identification of security services and mechanisms
13.4 Analysis of relevant standards
13.5 Specification and classification of security services,
mechanisms and algorithms
13.6 Security management and security API
13.7 Application of specifications to TMN scenarios
13.8 Feedback to standardization bodies
Annex A: Relevant standards
Annex B: Bibliography
Annex C: Scope of the first phase of standardization work in
ETSI and EWOS
C.1 Introduction
C.2 Security service
C.3 Mapping of security services on TMN architecture
C.4 Application protocols
C.5 Security mechanisms
C.6 Conclusions
History
Identifies the requirements for security of Telecommunications Management Network (TMN) and specifies the scope and priorities for future work on security of TMN - such future work may include identification of existing standards (formal or industry) and development of new standards.
Committee |
NA 4
|
DocumentType |
Standard
|
Pages |
48
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
EG 201 620 : 1.1.1 | INTELLIGENT NETWORKS (IN) - SECURITY STUDIES FOR CORDLESS TERMINAL MOBILITY (CTM) |
ETR 340 : 20001 | TELECOMMUNICATIONS SECURITY |
SR 002 298 : 1.1.1 | RESPONSE FROM CEN AND ETSI TO THE "COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS: NETWORK AND INFORMATION SECURITY: PROPOSAL FOR A EUROPEAN POLICY APPROACH" |
TS 102 285 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); TIPHON/UMTS HARMONIZATION: GENERAL ASPECTS |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.
Logging out.