deployments of NGNs and must provide equivalent or better security than existing network solutions. In order to accomplish this goal, IMS security needs to be addressed in a comprehensive way to ensure that security needs are understood, standardized solutions are implemented, and security processes are in place to continually advance security as IMS evolves. ITU Telecommunications Standardization Sector (ITU-T) Recommendation X.805, "Security Architecture for Systems Providing End-to-End Communications," is an essential tool in understanding the security required for IMS. In this paper we examine IMS security standards and the use of ITU-T Recommendation X.805 in understanding the key aspects of IMS security that are essential for secure IMS deployments.We begin with a brief overview of the IMS architecture to serve as a reference point for our IMS