Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.529
5G Security Assurance Specification (SCAS)
for Short Message Service Function (SMSF)

V19.1.0 (PDF)  2025/06  17 p.
Rapporteur:
Prof. Hanawal, Manjesh Kumar
IIT Bombay

full Table of Contents for  TS 33.529  Word version:  19.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 6
2References  p. 6
3Definitions of terms, symbols and abbreviations  p. 6
3.1Terms  p. 6
3.2Symbols  p. 7
3.3Abbreviations  p. 7
4SMSF-specific security requirements and related test cases  p. 7
4.1Introduction  p. 7
4.2SMSF-specific security functional requirements and related test cases  p. 7
4.2.1Introduction  p. 7
4.2.2Security functional requirements on the SMSF deriving from 3GPP specifications and related test cases  p. 7
4.2.3Technical Baseline  p. 7
4.2.3.1Introduction  p. 7
4.2.3.2Protecting data and information  p. 8
4.2.3.3Protecting availability and integrity  p. 8
4.2.3.4Authentication and authorization  p. 8
4.2.3.5Protecting sessions  p. 8
4.2.3.6Logging  p. 8
4.2.4Operating Systems  p. 8
4.2.5Web Servers  p. 8
4.2.6Network Devices  p. 8
4.2.7Security functional requirements on the SMSF - Non Service-Based Interfaces  p. 8
4.2.7.1Protection on SGd Diameter Interface between SMSF and the Diameter application node  p. 8
4.2.7.2Protection of Diameter Session on SGd Interface  p. 9
4.2.7.3Protecting availability and integrity on Diameter-based SGd interface  p. 10
4.2.7.4Protecting from unknown peers on Diameter-based SGd interface  p. 12
4.2.7.5Protecting availability and integrity on Map-based SS7 interface  p. 13
4.3SMSF-specific adaptations of hardening requirements and related test cases  p. 15
4.3.1Introduction  p. 15
4.3.2Technical Baseline  p. 15
4.3.3Operating Systems  p. 15
4.3.4Web Servers  p. 15
4.3.5Network Devices  p. 15
4.3.6Network Functions in service-based architecture  p. 15
4.4SMSF-specific adaptations of basic vulnerability testing requirements and related test cases  p. 15
4.4.1Introduction  p. 15
4.4.2Port Scanning  p. 15
4.4.3Vulnerability scanning  p. 15
4.4.4Robustness and fuzz testing  p. 16
$Change history  p. 17

Up   Top