Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.514
Security Assurance Specification (SCAS)
for the UDM Network Product Class

V19.1.0 (PDF)  2025/06  17 p.
V18.3.0  2024/06  20 p.
V17.1.0  2024/06  17 p.
V16.5.0  2024/06  15 p.
Rapporteur:
Dr. Yoshizawa, Taka
NEC Europe Ltd

full Table of Contents for  TS 33.514  Word version:  19.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 6
2References  p. 6
3Definitions of terms, symbols and abbreviations  p. 6
3.1Terms  p. 6
3.2Symbols  p. 6
3.3Abbreviations  p. 7
4UDM-specific security requirements and related test cases  p. 7
4.1Introduction  p. 7
4.2Security functional requirements on the UDM derived from 3GPP specifications and related test cases  p. 7
4.2.0General  p. 7
4.2.1User Privacy Procedure  p. 7
4.2.1.1De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI  p. 7
4.2.1.2Rejection of SUCIs using an ECIES protection scheme with an invalid public key.  p. 8
4.2.1.3Rejection of SUCIs using an uncompressed point with Profile B.  p. 9
4.2.2Authentication and key agreement procedure  p. 10
4.2.2.1Synchronization failure handling  p. 10
4.2.2.2Storing of authentication status of UE by UDM  p. 11
4.2.3Technical Baseline  p. 12
4.2.3.1Introduction  p. 12
4.2.3.2Protecting data and information  p. 12
4.2.3.2.1Protecting data and information - general  p. 12
4.2.3.2.2Protecting data and information - unauthorized viewing  p. 12
4.2.3.2.3Protecting data and information in storage  p. 12
4.2.3.2.4Protecting data and information in transfer  p. 12
4.2.3.2.5Logging access to personal data  p. 12
4.2.3.3Protecting availability and integrity  p. 12
4.2.3.4Authentication and authorization  p. 12
4.2.3.5Protecting sessions  p. 12
4.2.3.6Logging  p. 12
4.2.4Operating Systems  p. 12
4.2.5Web Servers  p. 12
4.2.6Network Devices  p. 13
4.2.7User plane security procedures  p. 13
4.2.7.1UP Security enforcement configuration for TSC service  p. 13
4.2.8User plane security procedures  p. 14
4.2.8.1UP security policy configuration for 5G LAN service  p. 14
4.3UDM-specific adaptations of hardening requirements and related test cases  p. 15
4.3.1Introduction  p. 15
4.3.2Technical baseline  p. 15
4.3.3Operating systems  p. 15
4.3.4Web servers  p. 15
4.3.5Network devices  p. 15
4.3.6Network functions in service-based architecture  p. 15
4.4UDM-specific adaptations of basic vulnerability testing requirements and related test cases  p. 15
4.4.1Introduction  p. 15
4.4.2Port scanning  p. 15
4.4.3Vulnerability scanning  p. 16
4.4.4Robustness and fuzz testing  p. 16
$Change history  p. 17

Up   Top