Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.518
5G Security Assurance Specification (SCAS) –
NF Repository Function (NRF)
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V19.0.0 (PDF)
2025/06 12 p.
V18.0.0
2023/06 13 p.
V17.0.0
2022/03 13 p.
V16.2.0
2020/06 13 p.
Rapporteur:
Mr. Orkopoulos, Stawros
Nokia Germany
full Table of Contents for
TS 33.518
Word version: 19.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 6
2
References
p. 6
3
Definitions of terms, symbols and abbreviations
p. 6
3.1
Terms
p. 6
3.2
Symbols
p. 6
3.3
Abbreviations
p. 6
4
NRF-specific security requirements and related test cases
p. 7
4.1
Introduction
p. 7
4.2
NRF-specific adaptations of security functional requirements and related test cases
p. 7
4.2.1
Introduction
p. 7
4.2.2
Security functional requirements on the NRF deriving from 3GPP specifications and related test cases
p. 7
4.2.2.1
Security functional requirements on the NRF deriving from 3GPP specifications - general approach
p. 7
4.2.2.2
NF discovery procedure
p. 7
4.2.2.2.1
NF discovery authorization for specific slice
p. 7
4.2.3
Technical Baseline
p. 8
4.2.3.1
Introduction
p. 8
4.2.3.2
Protecting data and information
p. 8
4.2.3.2.1
Protecting data and information - general
p. 9
4.2.3.2.2
Protecting data and information - unauthorized viewing
p. 9
4.2.3.2.3
Protecting data and information in storage
p. 9
4.2.3.2.4
Protecting data and information in transfer
p. 9
4.2.3.2.5
Logging access to personal data
p. 9
4.2.3.3
Protecting availability and integrity
p. 9
4.2.3.4
Authentication and authorization
p. 9
4.2.3.5
Protecting sessions
p. 9
4.2.3.6
Logging
p. 9
4.2.4
Operating Systems
p. 9
4.2.5
Web Servers
p. 9
4.2.6
Network Devices
p. 9
4.3
NRF-specific adaptations of hardening requirements and related test cases
p. 9
4.3.1
Introduction
p. 9
4.3.2
Technical baseline
p. 10
4.3.3
Operating systems
p. 10
4.3.4
Web servers
p. 10
4.3.5
Network devices
p. 10
4.3.6
Network functions in service-based architecture
p. 10
4.4
NRF-specific adaptations of basic vulnerability testing requirements and related test cases
p. 10
4.4.1
Introduction
p. 10
4.4.2
Port Scanning
p. 10
4.4.3
Vulnerability scanning
p. 10
4.4.4
Robustness and fuzz testing
p. 10
$
Change history
p. 11