Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 33.117 (SA3)
Catalogue of General Security Assurance Requirements

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.2.0 (Wzip)2019/09  99 p.
V15.4.0 (PDF)2019/09  93 p.
V14.6.02019/09  93 p.

Rapporteur:  Dr. Zugenmaier, Alf

The present document contains objectives, requirements and test cases that are deemed applicable, possibly after adaptation, to several network product classes.
It has been recognized that several network product classes will share very similar if not identical security requirements for some aspects. Therefore, these are collected in this "catalogue" document applicable to many network product classes. In addition to this catalogue, requirements specific to different network product classes will be captured in separate documents.

full Table of Contents for  TS 33.117  Word version:   16.2.0

 

Here   Top

 

1  ScopeWord-p. 6
2  References
3  Definitions and abbreviations
4  Catalogue of security requirements and related test cases
4.1  Introduction
4.2  Security functional requirements and related test casesUp
4.2.1  Introduction
4.2.2  Security functional requirements deriving from 3GPP specifications and related test casesWord-p. 9
4.2.3  Technical baselineWord-p. 13
4.2.3.1  Introduction
4.2.3.2  Protecting data and information
4.2.3.3  Protecting availability and integrityWord-p. 17
4.2.3.4  Authentication and authorizationWord-p. 22
4.2.3.5  Protecting sessionsWord-p. 39
4.2.3.6  LoggingWord-p. 41
4.2.4  Operating systemsWord-p. 44
4.2.5  Web ServersWord-p. 51
4.2.6  Network Devices
4.3  Security requirements and related test cases related to hardeningWord-p. 60
4.3.1  IntroductionUp
4.3.2  Technical BaselineWord-p. 61
4.3.3  Operating SystemsWord-p. 69
4.3.4  Web Servers
4.3.5  Network DevicesWord-p. 90
4.3.6  Network Functions in service-based architecture [R16]
4.4  Basic vulnerability testing requirementsWord-p. 93
A  Change historyWord-p. 99

Up   Top