OtherInternational (ITU-T)
ITU-T X.805 — Security Architecture for End-to-End Communications
ITU-T Recommendation X.805 (2003, still actively referenced) defines a security architecture for systems providing end-to-end communications. It uses a layered approach across three security layers (infrastructure, services, applications), three security planes (management, control, end-user), and eight security dimensions (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy).
Domains
Security Planes
Security Layers
Security Dimensions
Compare ITU-T X.805 — Security Architecture for End-to-End Communications
ITU-T X.805 — Security Architecture for End-to-End Communications vs ISO 27001:2022View comparison →ITU-T X.805 — Security Architecture for End-to-End Communications vs SOC 2View comparison →ITU-T X.805 — Security Architecture for End-to-End Communications vs NIST CSF 2.0View comparison →ITU-T X.805 — Security Architecture for End-to-End Communications vs GDPRView comparison →ITU-T X.805 — Security Architecture for End-to-End Communications vs HIPAAView comparison →ITU-T X.805 — Security Architecture for End-to-End Communications vs PCI DSS 4.0View comparison →
ITU-T X.805 — Security Architecture for End-to-End Communications by Industry
ITU-T X.805 — Security Architecture for End-to-End Communications for Healthcare→ITU-T X.805 — Security Architecture for End-to-End Communications for Financial Services→ITU-T X.805 — Security Architecture for End-to-End Communications for Technology→ITU-T X.805 — Security Architecture for End-to-End Communications for Government→ITU-T X.805 — Security Architecture for End-to-End Communications for Manufacturing→ITU-T X.805 — Security Architecture for End-to-End Communications for Energy→ITU-T X.805 — Security Architecture for End-to-End Communications for Retail→ITU-T X.805 — Security Architecture for End-to-End Communications for Education→
ITU-T X.805 — Security Architecture for End-to-End Communications by Role
ITU-T X.805 — Security Architecture for End-to-End Communications for CISOs→ITU-T X.805 — Security Architecture for End-to-End Communications for Compliance Officers→ITU-T X.805 — Security Architecture for End-to-End Communications for Risk Managers→ITU-T X.805 — Security Architecture for End-to-End Communications for IT Directors→ITU-T X.805 — Security Architecture for End-to-End Communications for DPOs→ITU-T X.805 — Security Architecture for End-to-End Communications for Auditors→
Frequently Asked Questions
What is ITU-T X.805?
ITU-T Recommendation X.805 (2003, still actively referenced) defines a security architecture for systems providing end-to-end communications. It uses a layered approach across three security layers (infrastructure, services, applications), three security planes (management, control, end-user), and eight security dimensions (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy).
How many controls does ITU-T X.805 have?
ITU-T X.805 contains 14 controls organized across 3 domains.
Where does ITU-T X.805 apply?
ITU-T X.805 is applicable in International (ITU-T). Organizations operating in or serving customers in this jurisdiction should evaluate its requirements.
What frameworks does ITU-T X.805 map to?
ITU-T X.805 has control-to-control mappings with 330 other compliance frameworks in our database. Use our compliance platform to explore these mappings interactively.
How do I get started with ITU-T X.805 compliance?
Start by understanding the framework's key controls and domains. Our compliance platform provides AI-powered gap analysis and mapping tools to help you assess your current posture and build a remediation plan.
How ready are you for ITU-T X.805 — Security Architecture for End-to-End Communications?
Answer 25 questions and get a professional readiness report with gap analysis, maturity scores, and prioritised action items. Results in 5 minutes.