TR 102 780 : 1.1.1
Current
The latest, up-to-date edition.
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
2.1 Normative references
2.2 Informative references
3 Definitions, symbols and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Security design guidelines
4.1 Introduction
4.2 Standards and requirements
4.3 Communications security
4.4 Primary security technologies
4.5 Secondary security attributes
4.6 Security associations
5 Risk analysis
5.1 Attacks and attack vectors
6 Security boundary analysis and establishment
7 Countermeasure patterns and specialization
8 Cryptographic selection and design
8.1 Specification of algorithms and other cryptographic
processes
8.2 Attacks on cryptographic implementations
9 Security testing
9.1 Protocol testing
9.2 Penetration testing
Annex A: Review of US Standards Development Organizations
relating to ICT Security Requirements
A.1 ANSI
A.2 IEEE
A.3 NIST
A.4 TIA
A.5 IETF
History
Describes existing process documents and illustrates their use in order to provide a unified method for the preparation of security documents (guides, standards, algorithms).
Committee |
MTS
|
DocumentType |
Standard
|
Pages |
24
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TS 133 203 : 13.1.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; ACCESS SECURITY FOR IP-BASED SERVICES (3GPP TS 33.203 VERSION 14.1.0 RELEASE 14) |
TS 102 165-2 : 4.2.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 10181-7:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework |
ES 202 382 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
FIPS PUB 140 : 0001 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ES 202 383 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
TR 187 011 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
EG 200 234 : 1.2.2 | TELECOMMUNICATIONS SECURITY; A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS |
ISO/IEC 10181-3:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 10181-5:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 10181-6:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
EG 202 387 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
EG 202 238 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); EVALUATION CRITERIA FOR CRYPTOGRAPHIC ALGORITHMS |
ETR 332 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
EN 300 392-7 : 3.3.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.