Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.518
5G Security Assurance Specification (SCAS) –
NF Repository Function (NRF)

V19.0.0 (PDF)  2025/06  12 p.
V18.0.0  2023/06  13 p.
V17.0.0  2022/03  13 p.
V16.2.0  2020/06  13 p.
Rapporteur:
Mr. Orkopoulos, Stawros
Nokia Germany

full Table of Contents for  TS 33.518  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 6
2References  p. 6
3Definitions of terms, symbols and abbreviations  p. 6
3.1Terms  p. 6
3.2Symbols  p. 6
3.3Abbreviations  p. 6
4NRF-specific security requirements and related test cases  p. 7
4.1Introduction  p. 7
4.2NRF-specific adaptations of security functional requirements and related test cases  p. 7
4.2.1Introduction  p. 7
4.2.2Security functional requirements on the NRF deriving from 3GPP specifications and related test cases  p. 7
4.2.2.1Security functional requirements on the NRF deriving from 3GPP specifications - general approach  p. 7
4.2.2.2NF discovery procedure  p. 7
4.2.2.2.1NF discovery authorization for specific slice  p. 7
4.2.3Technical Baseline  p. 8
4.2.3.1Introduction  p. 8
4.2.3.2Protecting data and information  p. 8
4.2.3.2.1Protecting data and information - general  p. 9
4.2.3.2.2Protecting data and information - unauthorized viewing  p. 9
4.2.3.2.3Protecting data and information in storage  p. 9
4.2.3.2.4Protecting data and information in transfer  p. 9
4.2.3.2.5Logging access to personal data  p. 9
4.2.3.3Protecting availability and integrity  p. 9
4.2.3.4Authentication and authorization  p. 9
4.2.3.5Protecting sessions  p. 9
4.2.3.6Logging  p. 9
4.2.4Operating Systems  p. 9
4.2.5Web Servers  p. 9
4.2.6Network Devices  p. 9
4.3NRF-specific adaptations of hardening requirements and related test cases  p. 9
4.3.1Introduction  p. 9
4.3.2Technical baseline  p. 10
4.3.3Operating systems  p. 10
4.3.4Web servers  p. 10
4.3.5Network devices  p. 10
4.3.6Network functions in service-based architecture  p. 10
4.4NRF-specific adaptations of basic vulnerability testing requirements and related test cases  p. 10
4.4.1Introduction  p. 10
4.4.2Port Scanning  p. 10
4.4.3Vulnerability scanning  p. 10
4.4.4Robustness and fuzz testing  p. 10
$Change history  p. 11

Up   Top