TR 102 661 : 1.2.1
Current
The latest, up-to-date edition.
LAWFUL INTERCEPTION (LI); SECURITY FRAMEWORK IN LAWFUL INTERCEPTION AND RETAINED DATA ENVIRONMENT
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 The architecture
5 Inventory of assets
6 Security threats and vulnerabilities
7 Security measures
Annex A - List of security measures
Annex B - Building secure logging
Annex C - Protection of retained data
Annex D - Guide for selecting cryptographic
algorithms and minimum key sizes
in LI/DR systems
Annex E - Bibliography
Annex F - Change request history
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.