Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.529
5G Security Assurance Specification (SCAS)
for Short Message Service Function (SMSF)
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V19.1.0 (PDF)
2025/06 17 p.
Rapporteur:
Prof. Hanawal, Manjesh Kumar
IIT Bombay
full Table of Contents for
TS 33.529
Word version: 19.1.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 6
2
References
p. 6
3
Definitions of terms, symbols and abbreviations
p. 6
3.1
Terms
p. 6
3.2
Symbols
p. 7
3.3
Abbreviations
p. 7
4
SMSF-specific security requirements and related test cases
p. 7
4.1
Introduction
p. 7
4.2
SMSF-specific security functional requirements and related test cases
p. 7
4.2.1
Introduction
p. 7
4.2.2
Security functional requirements on the SMSF deriving from 3GPP specifications and related test cases
p. 7
4.2.3
Technical Baseline
p. 7
4.2.3.1
Introduction
p. 7
4.2.3.2
Protecting data and information
p. 8
4.2.3.3
Protecting availability and integrity
p. 8
4.2.3.4
Authentication and authorization
p. 8
4.2.3.5
Protecting sessions
p. 8
4.2.3.6
Logging
p. 8
4.2.4
Operating Systems
p. 8
4.2.5
Web Servers
p. 8
4.2.6
Network Devices
p. 8
4.2.7
Security functional requirements on the SMSF - Non Service-Based Interfaces
p. 8
4.2.7.1
Protection on SGd Diameter Interface between SMSF and the Diameter application node
p. 8
4.2.7.2
Protection of Diameter Session on SGd Interface
p. 9
4.2.7.3
Protecting availability and integrity on Diameter-based SGd interface
p. 10
4.2.7.4
Protecting from unknown peers on Diameter-based SGd interface
p. 12
4.2.7.5
Protecting availability and integrity on Map-based SS7 interface
p. 13
4.3
SMSF-specific adaptations of hardening requirements and related test cases
p. 15
4.3.1
Introduction
p. 15
4.3.2
Technical Baseline
p. 15
4.3.3
Operating Systems
p. 15
4.3.4
Web Servers
p. 15
4.3.5
Network Devices
p. 15
4.3.6
Network Functions in service-based architecture
p. 15
4.4
SMSF-specific adaptations of basic vulnerability testing requirements and related test cases
p. 15
4.4.1
Introduction
p. 15
4.4.2
Port Scanning
p. 15
4.4.3
Vulnerability scanning
p. 15
4.4.4
Robustness and fuzz testing
p. 16
$
Change history
p. 17