This document relies on the underlying signaling protocols for its security, and the security considerations section seems to have appropriate references for that.