ITU-T X.805 — Security Architecture for End-to-End Communications
ITU-T Recommendation X.805 (2003, still actively referenced) defines a security architecture for systems providing end-to-end communications. It uses a layered approach across three security layers (infrastructure, services, applications), three security planes (management, control, end-user), and eight security dimensions (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy). Widely used as a telecom security reference architecture.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (3)
Security Dimensions
| Code | Title |
|---|---|
| X805-D1 | Access Control |
| X805-D2 | Authentication |
| X805-D3 | Non-repudiation |
| X805-D4 | Data Confidentiality |
| X805-D5 | Communication Security |
| X805-D6 | Data Integrity |
| X805-D7 | Availability |
| X805-D8 | Privacy |
Security Layers
| Code | Title |
|---|---|
| X805-L1 | Infrastructure Security Layer |
| X805-L2 | Services Security Layer |
| X805-L3 | Applications Security Layer |
Security Planes
| Code | Title |
|---|---|
| X805-SP1 | Management Plane |
| X805-SP2 | Control Plane |
| X805-SP3 | End-User Plane |
Maps to 519 other frameworks
Frequently Asked Questions
What is ITU-T X.805 — Security Architecture for End-to-End Communications?
ITU-T X.805 — Security Architecture for End-to-End Communications is a compliance framework from International (ITU-T) with 3 domains and 14 controls. ITU-T Recommendation X.805 (2003, still actively referenced) defines a security architecture for systems providing end-to-end communications. It uses a layered approach across three security layers (infrastructure, services, applications), three security planes (management, control, end-user), and eight security dimensions (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy). Widely used as a telecom security reference architecture. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ITU-T X.805 — Security Architecture for End-to-End Communications have?
ITU-T X.805 — Security Architecture for End-to-End Communications has 14 controls organised across 3 domains. The largest domains are Security Dimensions (8 controls), Security Layers (3 controls), Security Planes (3 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ITU-T X.805 — Security Architecture for End-to-End Communications map to?
ITU-T X.805 — Security Architecture for End-to-End Communications maps to 519 other compliance frameworks. The top mapping partners are EU Maritime Single Window Environment Regulation (EU 2019/1239) and EMSA Cybersecurity (29% coverage), ISO 27001:2022 (29% coverage), South Korea Cloud Security Assurance Program (CSAP) (29% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ITU-T X.805 — Security Architecture for End-to-End Communications compliance?
Start your ITU-T X.805 — Security Architecture for End-to-End Communications compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ITU-T X.805 — Security Architecture for End-to-End Communications requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 14 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required