Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.516
5G Security Assurance Specification (SCAS) –
Authentication Server Function (AUSF)
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V19.0.0 (PDF)
2025/09 12 p.
V18.0.0
2023/06 12 p.
V17.0.0
2022/03 12 p.
V16.2.0
2020/12 12 p.
Rapporteur:
Dr. Jost, Christine
Ericsson LM
full Table of Contents for
TS 33.516
Word version: 19.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 6
2
References
p. 6
3
Definitions of terms, symbols and abbreviations
p. 6
3.1
Terms
p. 6
3.2
Symbols
p. 6
3.3
Abbreviations
p. 7
4
AUSF-specific security requirements and related test cases
p. 7
4.1
Introduction
p. 7
4.2
AUSF-specific adaptations of security functional requirements and related test cases
p. 7
4.2.1
Introduction
p. 7
4.2.2
Security functional requirements on the AUSF deriving from 3GPP specifications and related test cases
p. 7
4.2.3
Technical Baseline
p. 7
4.2.3.1
Introduction
p. 7
4.2.3.2
Protecting data and information
p. 7
4.2.3.2.1
Protecting data and information - general
p. 7
4.2.3.2.2
Protecting data and information - unauthorized viewing
p. 7
4.2.3.2.3
Protecting data and information in storage
p. 8
4.2.3.2.4
Protecting data and information in transfer
p. 8
4.2.3.2.5
Logging access to personal data
p. 8
4.2.3.3
Protecting availability and integrity
p. 8
4.2.3.4
Authentication and authorization
p. 8
4.2.3.5
Protecting sessions
p. 8
4.2.3.6
Logging
p. 8
4.2.4
Operating Systems
p. 8
4.2.5
Web Servers
p. 8
4.2.6
Network Devices
p. 8
4.3
AUSF-specific adaptations of hardening requirements and related test cases
p. 8
4.3.1
Introduction
p. 8
4.3.2
Technical baseline
p. 8
4.3.3
Operating systems
p. 8
4.3.4
Web servers
p. 9
4.3.5
Network devices
p. 9
4.3.6
Network functions in service-based architecture
p. 9
4.4
AUSF-specific adaptations of basic vulnerability testing requirements and related test cases
p. 9
4.4.1
Introduction
p. 9
4.4.2
Port Scanning
p. 9
4.4.3
Vulnerability scanning
p. 9
4.4.4
Robustness and fuzz testing
p. 9
$
Change History
p. 10