Executive Summary
Meeting of ITU-T SG17 'Security', Geneva, 20 February – 1 March 2024
Hot topics of this meeting (summarizing both input & output)
- AI/ML security
- Digital twin and metaverse
- Quantum based security, Post Quantum Cryptography
- 5G security
- Cloud security
- Cybersecurity, Cyber defence, Zero Trust, countering spam, prevention from cyber attack
- IoT security
- Software supply chain security
- Data protection
1 Meeting Output (meeting statistics see Annex E below)
- Output standards (22, see Annex A):
- TAP approval (5): Details are in Annex A a).
- TAP not approved (3): Details are in Annex A b).
- TAP determined (8): 8 new Recommendations. Details are in Annex A c).
- AAP consented (6): 4 new and 1 revised Recommendations, and 1 Amendment for AAP Last Call. Details are in Annex A d).
- Agreed (3): 1 new Supplement, 1 revised Technical Paper and 1 new Technical Report. Details are in Annex A e).
- New work items (54, see Annex C).
- OID registration authority for Republic of Haiti: {joint-iso-itu-t(2) country(16) ht(332)}
- ITU-T Workshop on Generative AI: Challenges and Opportunities for Security and Privacy on 19 February 2024 and ITU-T SG17 Mini-Workshop on ITU-T X.1060 Cyber Defence Center on 22 Feb 2024 were both well attended (270+/60+ participants)
- SG17 Mandate, scope and Question text for next study period reviewed.
- Tutorials on using tools to support standardization, new BSG program and digital rights were well appreciated.
- Delegates from Africa and Arab States gathered for preparation of SG17RG meetings and WTSA-24
- SG17 subgroups (JCAs and Correspondence Groups)
- JCA-IdM 33rd meeting on Friday 1 Sep 2023
- JCA-COP: remain as dormant.
- CG-SG17-wtsa24-prep: continued
- CG-secapa (Correspondence Group on Security Capability and Architecture): continued
- CG-COP (Child online protection): newly established, ToR in TD1811.
- CG-AIsec (Correspondence group on AI security): newly established, ToR in TD1949.
2 Next SG17 meetings
2.1 3rd virtual "ITU-T X.509 Day" event, 9 May 2024, focus on quantum challenges to PKI
2.2 2nd SG17 meeting in 2024
- 48 Candidate texts for action, details see Annex B.
Option 1: 2-week physical meeting outside Geneva, June/July 2024
If member state invites before 15th March 2024, a physical SG17 meeting with remote participation will take place in June/July 2024 for nine working days, preceded by a one-day ITU Workshop on security and privacy for digital twin and metaverse.
Option 2: 2-day e-plenary in July + 1-week physical meeting in September
- A two-day SG17 e-plenary, 11-12 July, 4-6 hours/day, to complete SG17 preparation for next study period
- One-week physical SG17 meeting with remote participation, Geneva, 2-6 September 2024, no workshop; Open and extended management team meeting on Sunday 1 Sept, 16:00-18:00.
2.3 Interim RGMs
8 Questions plan to hold the following 11 RGMs before next SG17 meeting:
#
Q Date Place/Host Subject/objective
1. 1/17 17 May 2024 Seoul, Korea (Republic of) (physical with remote participation)/ Soonhunhyang University
- review the draft 8th edition of Security Manual
- review the draft 3rd edition of TR-Suss
- review all work items and identify future topics for Q1/17
2. 3/17 5 June, 2024
(10:00-12:00 CEST) MyWorkspace
3. 3/17 6 June, 2024
(10:00-12:00 CEST) MyWorkspace
4. 3/17 11-12 June, 2024
(10:00-12:00 CEST) MyWorkspace
- Sup-cdc, X.gsm-cdc, X.1060-rev
5. 4/17 24 May 2024, tbc MyWorkspace
- progress all the work of Q4/17
6. 7/17 21-22 May 2024 Hangzhou China (physical with remote participation) / Ant Group
7. 8/17 21-22 May 2024 Hangzhou China (physical with remote participation) / Ant Group
8. 10/17 One day between 16-27 May 2024 TBD
- progress all the work of Q10/17
9. 13/17 4 ~ 5 June 2024 e-meeting
- Prepare the final texts for X.evtol-sec and X.sup-cv2x-sec
- Question text
10. 15/17 11am-1pm on 4 & 6 June 2024 e-meeting
- Proposed new WIs and on-going WIs in incubation
11. 15/17 TBD July 2024 e-meeting
- Proposed new WIs and on-going WIs on QKD
Annex A
Actions taken on Recommendations, and other texts at SG17 closing plenary on 1 March 2024
a) TAP Recommendations approved (WTSA-20 Resolution 1)
# Q Acronym Title New / Revised Editor(s) Location of text A.5 or A.25 justification Equivalent
e.g., ISO/IEC
1. 6/17 Amendment of X.1352 Amendment of X.1352: Security requirements for Internet of things devices and gateways Rev Heung Youl YOUM
TD1771 - -
2. 7/17 X.1150
(X.saf-dfs) Security assurance framework for digital financial services New Jacques FRANCOEUR,
Jun Hyung PARK, Sungchae PARK, Heung Youl YOUM
TD1772 3. 10/17 X.1280
(X.oob-sa) Framework for out-of-band server authentication using mobile devices New Il Jin JUNG,
Sujung PARK, Heejun SHIN, Jonghyun WOO
R51 4. 10/17 X.1281
(X.osia) Open Standard Identity APIs (OSIA) specification version 6.1.0 New Abbie Barbir
TD1887 TD1298 OSIA 6.1.0
5. 13/17 X.1373rev Secure software update capability for intelligent transportation system communication devices Rev Aram CHO,
Sang-Woo LEE,
Koji NAKAO, Seungwook PARK
TD1806 - b) TAP Recommendations not approved (WTSA-20 Resolution 1)
- TAP approval of updated texts (as identified in TDs below) are deferred to next SG17 physical meeting
# Q Acronym Title New / Revised Editor(s) Location of Text Equivalent
e.g., ISO/IEC Start of work Determined
1 2/17 X.1818
(X.5Gsec-ctrl) Security controls for operation and maintenance of IMT-2020 network systems New Ayumu KUBOTA,
Koji NAKAO, Yutaka MIYAKE
TD1827 2022-08 2023-09
2 4/17 X.1221
(X.stie) Structured threat information expression New Michael ROSA, Duncan SPARRELL
TD1823 OASIS STIX Version 2.1 2022-08 2023-09
3 4/17 X.1222
(X.taeii) Trusted automated exchange of intelligence information New Michael ROSA, Duncan SPARRELL
TD1824 OASIS TAXII Version 2.1 2022-08 2023-09
c) TAP Recommendations determined (WTSA-20 Resolution 1)
# Q Acronym Title New / Revised Editor(s) Location of Text A.5 or A.25 justification Equivalent
e.g., ISO/IEC
1 2/17 X.1819
(X.5Gsec-netec) Security capabilities of network layer for IMT-2020/5G edge computing New Yifu WANG,
Chen ZHANG,
Bei ZHAO
TD1854 - -
2 2/17 X.1820
(X.5Gsec-srocvs) Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services New Feng GAO,
Ming HE,
Guorong LIU,
Jun SHEN
TD1794 TD1739 3 4/17 X.1237 (X.tsfpp) Technical security framework for personal identifiable information protection while countering mobile messaging spam New Feng GAO,
Wei LIU,
Junjie XIA,
Bo YU,
Chen ZHANG, Yanbin ZHANG
TD1804 4 6/17 X.1354
(X.sc-iot) Security controls for IoT systems New Lijun LIU,
Koji NAKAO
TD1875 5 6/17 X.1353
(X.ztd-iot)
Note 1 Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoT New Xin KANG, Haiguang WANG, Weidong WANG
TD1850 6 7/17 X.1471 (X.websec-7)
Note 2 Reference monitor for online analytics services New Hyungjin LIM,
Jae Hoon NAH, Jongyoul PARK, Junjie XIA
TD1790 7 10/17 X.1283 (X.gpwd) Threat Analysis and guidelines for securing password and password-less authentication solutions New Abbie BARBIR
TD1897 8 13/17 X.1384 (X.itssec-5) Security guidelines for vehicular edge computing New Sang-Woo LEE
TD1807 Note 1: TAP determined at SG17 Aug/Sep 2022 meeting, TAP re-determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined again in this SG17 Feb/Mar 2024 meeting.
Note 2: TAP determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined in this SG17 Feb/Mar 2024 meeting.
d) AAP Recommendations consented (Recommendation ITU-T A.8)
# Q/17 Acronym Title New/Rev Editor(s) Text A.5 or A.25 justification Equivalent
e.g., ISO/IEC
1 7/17 X.1144rev The revision of eXtensible Access Control Markup Language (XACML) 3.1 Rev Jae Hoon NAH,
Duncan SPARRELL
TD1846 XACML 3.1
2 7/17 X.1771
(X.guide-cdd) Security guidelines for combining de-identified data using trusted third party New Heung Youl YOUM, Sungchae PARK,
Jae Nam KO
TD1796 3 7/17 X.2011
(X.sg-dtn) Security Guidelines for Digital Twin Network New Meiling CHEN,
Jing SHAO,
Li SU,
Ke WANG
TD1792 4 7/17 X.1455
(X.smsrc) Security Measures for Smart Residential Community New Feng GAO,
Jae Hoon NAH,
Junjie XIA,
Longjun ZHAO,
Feng ZHANG
TD1926 5 15/17 X.1713
(X.sec-QKDN_tn) Security requirements for the protection of quantum key distribution node New Qiang HUANG,
Minghan LI,
Jiajun MA,
Hao QIN
TD1817 6 15/17 X.1715Amd Security requirements and measures for integration of quantum key distribution network and secure storage network New Kaoru KENYOSHI
TD1816
e) Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) agreed
# Q/17 Acronym Title New / Rev Editor(s) Text
1.
1/17 TP.inno-2.0 Technical Paper: Description of the incubation mechanism and ways to improve it
Rev Arnaud TADDEI
TD1874 2.
2/17 TR.zt-acp Guidelines for zero trust based access control platform in telecommunication network
New Jing HUANG,
Wei LIU,
Xu WANG,
Junzhi YAN,
Heung Youl YOUM
TD1838 3.
7/17 X.suppl.uc-dcc Supplement to X.1152: Use cases for digital COVID-19 certificates
New Daeun HYEON,
Sungchae PARK,
Heung Youl YOUM
TD1798
Annex B
Recommendations planned for action in 2nd SG17 meeting in 2024
1 TAP Recommendations planned for TAP approval (WTSA-20 Resolution 1)
# Q Acronym Title New / Revised Editor(s) Location of Text A.5 or A.25 justification Equivalent
e.g., ISO/IEC
1 2/17 X.1818
(X.5Gsec-ctrl)
Note 3 Security controls for operation and maintenance of IMT-2020 network systems New Ayumu KUBOTA,
Koji NAKAO, Yutaka MIYAKE
TD1827 2 2/17 X.1819
(X.5Gsec-netec) Security capabilities of network layer for IMT-2020/5G edge computing New
Yifu WANG,
Chen ZHANG,
Bei ZHAO
TD1854 - -
3 2/17 X.1820
(X.5Gsec-srocvs) Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services New
Feng GAO,
Ming HE,
Guorong LIU,
Jun SHEN
TD1794 TD1739 4 4/17 X.1221 (X.stie)
Note 3 Structured threat information expression New Michael ROSA, Duncan SPARRELL
TD1823 OASIS STIX Version 2.1
5 4/17 X.1222 (X.taeii)
Note 3 Trusted automated exchange of intelligence information New Michael ROSA, Duncan SPARRELL
TD1824 OASIS TAXII Version 2.1
6 4/17 X.1237 (X.tsfpp) Technical security framework for personal identifiable information protection while countering mobile messaging spam New Feng GAO,
Wei LIU,
Junjie XIA,
Bo YU,
Chen ZHANG, Yanbin ZHANG
TD1804 7 6/17 X.1354 (X.sc-iot) Security controls for IoT systems New Lijun LIU,
Koji NAKAO
TD1875 8 6/17 X.1353 (X.ztd-iot)
Note 1 Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoT New Xin KANG, Haiguang WANG, Weidong WANG
TD1850 9 7/17 X.1471 (X.websec-7)
Note 2 Reference monitor for online analytics services New Hyungjin LIM,
Jae Hoon NAH, Jongyoul PARK, Junjie XIA
TD1790 10 10/17 X.1283 (X.gpwd) Threat Analysis and guidelines for securing password and password-less authentication solutions New Abbie BARBIR
TD1897 11 13/17 X.1384 (X.itssec-5) Security guidelines for vehicular edge computing New Sang-Woo LEE
TD1807 Note 3: TAP approval deferred by SG17 Feb/Mar 2024 meeting.
2 TAP Recommendations planned for TAP determination (WTSA-20 Resolution 1)
# Q Acronym Title New / Revised Editor(s) Location of Text Equivalent
e.g., ISO/IEC
1 4/17 X.sgc-rcs Guidelines for countering spam over RCS messaging New Huamin JIN,
Shuai WANG,
Haodi ZHANG, Yanbin ZHANG
TD1358 2 6/17 X.ra-iot Security risk analysis framework for IoT devices New Gunhee LEE,
Shinya SASA
TD1882 3 7/17 X.sgdfs-us Security guidelines for DFS applications based on USSD and STK New Vincent MWESIGWA
TD1973 4 8/17 X.gdsml Guidelines for data security using machine learning in big data infrastructure New Mi CAO,
Ye TAO,
Laifu WANG,
Lei XU
TD1845 5 8/17 X.gecds Guideline on edge computing data security New Lu CHEN,
Zhaoji LIN,
Ye TAO,
Shuai WANG
TD1857 6 8/17 X.sgcnp Security guidelines for cloud native PaaS New Wei LIU,
Nan MENG,
Ye TAO,
Laifu WANG,
Lei XU
TD1810 7 8/17 X.sgmc Security guidelines for multi-cloud New Wei LIU,
Nan MENG,
Ye TAO,
Lei XU,
Yi ZHANG
TD1809 8 8/17 X.soar-cc Framework of Security Orchestration, Automation and Response for cloud computing New Maofei CHEN, Dongxin LIU,
Ye TAO,
Laifu WANG,
Yi ZHANG
TD1872 9 10/17 X.1250rev Baseline capabilities for enhanced identity management and interoperability Rev Abbie BARBIR
TD1945 10 13/17 X.evtol-sec Security requirements and guidelines for telecommunications in an urban air mobility (UAM) environment New
Aram CHO,
Sang-Woo LEE,
Seungwook PARK
TD1866
3 AAP Recommendations planned for AAP consent (Recommendation ITU-T A.8)
# Q Acronym Title New / Revised Editor(s) Location of Text Equivalent
e.g., ISO/IEC
1 7/17 X.smdtsc Security Measures for Digital Twin System of Smart Cities New Feng GAO,
Jae Hoon NAH,
Junjie XIA,
Feng ZHANG,
Longjun ZHAO
TD1961 2 8/17 X.sa-ec Security architecture of edge cloud New Huamin JIN,
Zhaoji LIN,
Ye TAO,
Shuai WANG,
Haodi ZHANG
TD1873 3 8/17 X.sg-scmr Security guidelines for selecting computing methods and resources from Cloud Service Providers New Huizheng GENG,
Li LU,
Nan MENG,
Ke WANG
TD1946 4 10/17 X.tas Telebiometric authentication using speaker recognition Fatoumata SAMAKE,
Myung Geun CHUN
TD1892 5 11/17 X.508
(X.pki-em) Public-key infrastructure: Establishment and maintenance New Erik ANDERSEN
TD1290 ISO/IEC 9594-12
6 11/17 X.500Amd.1 The Directory: Overview of concepts, models and services Rev Erik ANDERSEN
TD1913 ISO/IEC 9594-1
7 11/17 X.501Amd.2 The Directory: Models Rev Erik ANDERSEN
TD1914 ISO/IEC 9594-2
8 11/17 X.509Amd.1 The Directory: Public-key and attribute certificate frameworks Rev Erik ANDERSEN,
Qin LI
TD1919 ISO/IEC 9594-8
9 11/17 X.510Amd.1 The Directory - Protocol specifications for secure operations Rev Erik ANDERSEN,
Qin LI
TD1921 ISO/IEC 9594-11
10 11/17 X.511Amd.1 The Directory: Abstract service definition Rev Erik ANDERSEN
TD1915 ISO/IEC 9594-2
11 11/17 X.518Amd.1 The Directory: Procedures for distributed operation Rev Erik ANDERSEN
TD1916 ISO/IEC 9594-4
12 11/17 X.519Amd.1 The Directory: Protocol specifications Rev Erik ANDERSEN
TD1917 ISO/IEC 9594-5
13 11/17 X.520Amd.1 The Directory: Selected attribute types Rev Erik ANDERSEN
TD1918 ISO/IEC 9594-6
14 11/17 X.521Amd.1 The Directory: Selected object classes Rev Erik ANDERSEN
TD1922 ISO/IEC 9594-7
15 11/17 X.525Amd.1 The Directory: Replication Rev Erik ANDERSEN
TD1920 ISO/IEC 9594-9
16 14/17 X.sc-dlt Security controls for distributed ledger technology Kadio KASSY, Youngjoo LEE, Kyeong Hee OH, Keundug PARK, Preetika SINGH, Sandeep Kumar VIJAIVERGIA
TD1835 17 15/17 X.sec_QKDN_AA Authentication and authorization in QKDN using quantum safe cryptography New Kaoru KENYOSHI, Kazunori TANIKAWA
TD1899 18 15/17 X.sec_QKDN_CM Security requirements and measures for quantum key distribution networks – control and management New Taesang CHOI, Hyungsoo KIM, Matthieu LEGRÉ, Kazunori TANIKAWA,
Chun Seok YOON
TD1900 19 15/17 X.secadef Security capabilities definitions New Arnaud TADDEI,
Chen ZHANG
TD2013 4 Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) planned for agreement
#
Q/17 Acronym Title New / Revised Editor(s) Location of text Equivalent
e.g., ISO/IEC
1 1/17 TR.sec-manual Technical Report: 8
th edition of Security Manual Rev Kyeong Hee OH
TD3104 2 1/17 TR.Suss Technical Report: 3
rd edition of Technical Report: Successful use of security standards Rev Abbie BARBIR
TD1040 3 2/17 TR.5Gsec-bsf Technical Report: Guidelines of built-in security framework for the telecommunications network New Xiaoting HUANG,
Li SU,
Ke WANG
TD1975 4 10/17 X.sup-ekyc-dfs Supplement to ITU-T X.1254: e-KYC use cases in digital financial services New Daeun HYEON,
Sungchae PARK,
Heung Youl YOUM
TD1956 5 10/17 X.sup-sat-dfs Supplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial services New Junhyung PARK,
Sungchae PARK,
Heung Youl YOUM
TD1944 6 13/17 X.sup-cv2x-sec Supplement to X.1813 – Security deployment scenarios for cellular vehicle -to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC) New Jeongwook GO,
Youngjae KIM,
Jae Eon OH,
Seongki SHIN,
Heung Youl YOUM
TD1831 7 15/17 TR.smpa Technical Report: Security middle platform architecture New Jingyang LI,
Ke WANG
Shuai WANG,
Haodi ZHANG
TD1942 8 15/17 TR.srsec Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators Gang DU,
Xuetao DU,
Chen ZHANG
TD1397
Annex C
New work items
The following 54 new work items were agreed to be added to the SG17 Work Programme:
# Q Work item Title Editor Timing TD C
1. Q1/17 TR.cs-uc** Technical report: Use cases for extracting the security requirements for cyber security reference architecture Da Eun HYEON,
Juhee KI,
Sungchae PARK,
Heung Youl YOUM 2025-Q4
TD1815 C583 2. Q1/17 TR.cs-sc** Technical report: Collection of Security Concerns to support X.cs-ra Cyber Security Reference Architecture N. Kishor NARANG,
Jitender PRAKASH,
Preetika SINGH,
Pushpendra Kumar SINGH 2025-Q4
TD1859 C639 3. Q1/17 CRAMM Roadmap** SG17 Cyber Security Reference Architectures, Models and Methodologies Roadmap Arnaud TADDEI 2026-Q4
TD1877 C652 4. Q2/17 TR.sg-lmcs Technical report: Security guidelines for DLT-based lifecycle management of computing services Lanfang REN,
Junzhi YAN,
Bo YANG,
Huachun ZHOU 2026-09
TD1870 C609 5. Q2/17 TR.sec-int-cpc Technical report: Security considerations for interconnection of computing power centers Xiang LIU,
Yu ZHANG,
Weizhe ZHANG,
Yu JIANG 2026-03
TD1885 C508 6. Q2/17 TR.sd-cnc Technical report: Security guidelines for data of coordination of networking and computing Tingting YANG,
Ke WANG,
Li SU 2026-09
TD1906 C573 7. Q2/17 X.ztmc* Guidelines for high level Zero trust model and its security capabilities in telecommunication networks Heung Youl YOUM,
Junhyung PARK 2026-09
TD1863 C526 8. Q3/17 X.cdc-csirt Relationships between Cyber Defence/Security Centre and Computer Security Incident Response Team Arnaud TADDEI 2026 Q4
TD1818 C613 9. Q3/17 X.1060-rev Framework for the creation and operation of a cyber defence/security centre Arnaud TADDEI
Shigenori TAKEI 2025 Q4
TD1878 C613 10. Q3/17 X.1058-rev* Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection Heung Youl YOUM,
ChangOh KIM,
Sungchae PARK,
Thaib MUSTAFA,
Jinghua MIN 2027
TD1955 TD1671 TD1746 11. Q4/17 X.nspam Security framework for network storage protection against malware attacks Jonghyun WOO,
Sungyong SHIN,
Bongchan KIM,
Jonghyun KIM,
Sujung PARK 2026-03
TD1822 C563 12. Q4/17 X.gpmr Guidelines and security measures for prevention and mitigation of ransomware Wenlei WANG,
Mufan CUI,
Zhihui HAN,
Feng GAO,
Minfeng QIU 2026-06
TD1852 C544 13. Q6/17 TR.st-iot** Technical report: Security threat scenarios in Internet of things Dalton C. G. VALADARES, Ernesto Marcos SILVEIRA 2025-8
TD1925 C616 14. Q6/17 X.sm-iot* Technical requirements of security situation monitoring for Internet of things (IoT) devices Lijun LIU,
Hang DONG,
Shuang ZHANG,
Le YU,
Xiaoqin HUANG 2026-03
TD1891 C610 15. Q6/17 X.gnssa-iot* Guidelines of implementing network security situational awareness for IoT systems Maofei CHEN,
Laifu WANG,
Dongxin LIU,
Zhaoji LIN 2027-02
TD1862 C579 16. Q7/17 X.fr-vsasi Functional requirements for visualization service of network security assets and security incidents based on digital twin Junjie XIA,
Feng GAO,
Mengxiang HAN,
Ke WANG 2025-3Q
TD1871 C634 17. Q7/17 X.ias Functional requirements for the unified authentication service of telecommunication operators Hang DONG,
Chen ZHANG,
Yunfa ZHU 2026-1Q
TD1867 C647 18. Q7/17 X.str-irs* Security threats and requirements for information recommendation service Yunwei ZHAO,
Zhiyuan HU,
Junzhi YAN 2027-1Q
TD1801 C546 19. Q7/17 X.sgrtem* Security guidelines for real-time event monitoring and integrated management in smart city platforms Junjie XIA,
Feng GAO,
Chang SONG 2026-1Q
TD1813 C633 20. Q8/17 X.FR-MSP Functional Requirements of Microsegmentation Platform in a cloud-based environment Shuai WANG,
Haodi ZHANG,
Huamin JIN 2027-03
TD1880 C623 21. Q8/17 X.ckrp Framework of cryptographic key resource pool for cloud computing Jun SHEN,
Ming HE,
Leyi ZHANG 2026-02
TD1840 C597 22. Q8/17 X.mbaas-cs-sec Security requirements and framework of collaboration service for multiple blockchain as a service platforms Xiongwei JIA,
Keng LI,
Kyeong Hee OH,
Yuwei WANG 2025-12
TD1842 C581 23. Q8/17 X. gapci* Guidelines on Anti-DDoS protection for cloud infrastructure Lin CHEN,
Yue SHI,
Nan MENG,
Hang DONG 2026-02 TD1886
C541 24. Q10/17 X.1254rev* Entity authentication assurance framework Abbie BARBIR,
Sylvan TRAN 2026-03
TD1969 C483 25. Q10/17 X.oob-pacs Framework for out-of-band physical access control systems using beacon-initiated mutual authentication Jonghyun WOO,
Heejun SHIN,
Il Jin JUNG,
Tail LEE,
Youngjoo LEE,
Sujung PARK 2026-03
TD1964 C562 26. Q10/17 X.tis Telebiometric authentication based on information splitting Myung Geun CHUN 2025-09
TD1934 C565 27. Q10/17 TR.divs** Technical report: Rationale and initial approach of a decentralized identity verification system (DIVS) based on verifiable data Heung Youl YOUM,
Sungchae PARK 2025-09
TD1948 C570 28. Q10/17 TR.SIMRegBio** Technical report: Guidelines for SIM Identity and Biometrics Registration.
Kwadwo Gyamfi OSAFO-MAAFO,
Opeolu OYEBANJI,
Shamsuddeen SABO, Pushpendra Kumar SINGH
2026-09
TD1933 C645 29. Q11/17 X.500Amd.1 The Directory: Overview of concepts, models and services Erik ANDERSEN 2024-09
TD1913 C490 30. Q11/17 X.501Amd.2 The Directory: Models Erik ANDERSEN 2024-09
TD1914 C491 31. Q11/17 X.509Amd.1 The Directory: Public-key and attribute certificate frameworks Erik ANDERSEN,
Qin LI 2024-09
TD1919 C492 32. Q11/17 X.510Amd.1 The Directory - Protocol specifications for secure operations Erik ANDERSEN,
Qin LI 2024-09
TD1921 C493 33. Q11/17 X.511Amd.1 The Directory: Abstract service definition Erik ANDERSEN
2024-09
TD1915 C494 34. Q11/17 X.518Amd.1 The Directory: Procedures for distributed operation Erik ANDERSEN 2024-09
TD1916 C495 35. Q11/17 X.519Amd.1 The Directory: Protocol specifications Erik ANDERSEN 2024-09
TD1917 C496 36. Q11/17 X.520Amd.1 The Directory: Selected attribute types Erik ANDERSEN 2024-09
TD1918 C497 37. Q11/17 X.521Amd.1 The Directory: Selected object classes Erik ANDERSEN 2024-09
TD1922 C498 38. Q11/17 X.525Amd.1 The Directory: Replication Erik ANDERSEN 2024-09
TD1920 C499 39. Q13/17 X.aamd-sec* Security guidelines for categorized data in advanced air mobility (AAM) Seungwook PARK,
Changhun JUNG,
Yousik LEE,
Sang-woo LEE
2027-03
TD1820 C560 40. Q14/17 X.qsdlt-ca* Guidelines for building crypto-agility and migration for quantum-safe DLT systems Fuwen LIU,
Ke WANG,
WeiDong WANG
,Li SU,
Heung Youl YOUM 2026-3
TD1869 C582 41. Q14/17 TR.dw-lasf** Technical report: A landscape analysis and security features for a digital wallet Kyeong Hee OH,
Dong Bin CHOI,
Xiaoyuan BAI,
Xiongwei JIA 2026-3
TD1802 C564 42. Q14/17 X.1400rev Terms and definitions for distributed ledger technology
Heung Youl YOUM,
Sungchae PARK,
Jae Nam KO
2025-3
TD1799 C552 43. Q14/17 X.sr-dpts* Security requirements for DLT data on permissioned DLT-based distributed power trading systems Jong-Hyouk LEE,
Taeyang LEE,
Haneul LEE 2025-9
TD1836 C566 44. Q14/17 X.sg-dcs* Security guidelines for DLT-based digital collection services Jong-Hyouk LEE,
Jihye KIM 2025-9
TD1837 C509 45. Q14/17 TR.gscim-dlt** Technical report: Guidelines for security consideration for incident management by DLT service provider Yunwei ZHAO,
Yue CHEN,
Han HAN,
Ke WANG,
Junzhi YAN, 2026-9
TD1828 C548 46. Q15/17 X.sr-da-gai* Security threats and requirements for data annotation service of generative artificial intelligence" Yunwei ZHAO,
Zhiyuan HU,
Luhua WANG,
Hong ZHANG,
Junjie XIA 2027-03
TD1819 C545 47. Q15/17 X.sgGenAI* Security Guidelines for Generative Artificial Intelligence Application Service
Huifang LI,
Yang CHEN,
Ye TAO,
Sungchae PARK
2026- Q3
TD1834 C635 48. Q15/17 X.ig-dw* Implementation guidelines for digital watermarking Shiqi LI,
Yong SUN,
Weiwei SUN 2026-09
TD1972 C542 49. Q15/17 X.sc-sscti* Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry Baoqi YAN,
Jia XIE,
Yuanying XIAO 2027-Q1
TD1974 C567 50. Q15/17 TR.se-ai** Technical report: Security Evaluation on Artificial Intelligence Technology in ICT Quanchao LIU,
Ke WANG,
Jia CHEN,
Yong SUN 2025-08
TD2002 C584 51. Q15/17 X.srm-fml* Security requirements and measures of federated machine learning Qiuli MEI,
Xiongwei JIA,
Jianing CHEN 2026-02
TD1994 C605 52. Q15/17 X.pg-cla: Procedural guideline for continual learning to actively respond to network attacks Jongyoul PARK,
Jae Hoon NAH August 2025
TD2005 C500 53. Q15/17 TR.ac-pqc** Technical report: Guidance on use of advanced cryptography based on PQC Koji NAKAO 2025-09
TD1990 C654 54. Q15/17 TR.QKDN-SP** Technical report: Overview of security profile for Quantum Key Distribution Networks in hybrid mod Venkata Rama Raju CHELLE,
Ravindra Pratap SINGH,
Prabhakar KRISHNAN,
Soumya DAS 2025
TD1970 C658
Note: * marked items are for approval by TAP; ** marked items are for approval by agreement; Items without any mark are for approval by AAP.
Annex D
Work items discontinued
Question Acronym Title
None
Annex E
SG17 meeting Statistics
Participants # of Countries # of Member States # of Sector Members # of SG17 Associates # of Academia # of Invited Experts
Announced 433 61 53
Final 333 55 49 32 3 6 11
- Meeting input and organization
Table of SG17 statistics of this and some past meetings
2024-03
2023-09
2023-03
2022-09
2022-05*
C
187
153
119
104
101
LS/i
89
60
70
55
72
LS/o
41
25
23
20
20
TD
520
415
394
342
331
Note * - fully virtual meeting
- Contributions: 187 – New record, DDP: 98%.
- APT 154 (82%) (= China 77 + Korea 54 + Japan 10 + India 9 + Malaysia 2+ Singapore 1+ Iran 1)
- EUR 18 (10%) (Denmark 11 + UK 7)
- Americas 9 (5%) (= US 8 + Brazil 1)
- AFR 5 (3%) (South Africa 1.25 + Uganda 1.25 + Ghana 1.25 + Mali 1 + Nigeria 0.25)
- RCC 1 (= Russia 1)
- LAM (0), ARAB (0).
- LSi/o (matrix in TD1515) (past meetings: 60/25, 61/22, 55/21, 72/21)
- Incoming 89 – New record
- Outgoing 41 - New record