Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.537
Security Assurance Specification (SCAS) for the
Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF)
3GPP‑Page
ETSI‑search
fToC
↓
Partial Content
→
V19.0.0 (PDF)
2025/06 12 p.
V18.2.0
2023/09 14 p.
Rapporteur:
Miss Huang, Xiaoting
China Mobile Com. Corporation
full Table of Contents for
TS 33.537
Word version: 19.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 6
2
References
p. 6
3
Definitions of terms, symbols and abbreviations
p. 6
3.1
Terms
p. 6
3.2
Symbols
p. 6
3.3
Abbreviations
p. 6
4
AAnF-specific security requirements and related test cases
p. 7
4.1
Introduction
p. 7
4.2
AAnF-specific adaptations of security functional requirements and related test cases
p. 7
4.2.1
Introduction
p. 7
4.2.2
Security functional requirements on the AAnF deriving from 3GPP specifications and related test cases
p. 7
4.2.2.0
General
p. 7
4.2.2.1
AKMA key storage and update
p. 7
4.2.3
Technical Baseline
p. 8
4.2.3.1
Introduction
p. 8
4.2.3.2
Protecting data and information
p. 8
4.2.3.2.1
Protecting data and information - general
p. 8
4.2.3.2.2
Protecting data and information - unauthorized viewing
p. 8
4.2.3.2.3
Protecting data and information in storage
p. 8
4.2.3.2.4
Protecting data and information in transfer
p. 8
4.2.3.2.4.1
Confidentiality, integrity and replay protections over SBA interface
p. 8
4.2.3.2.4.2
Confidentiality, integrity and replay protections over SBA interface
p. 9
4.2.3.2.5
Logging access to personal data
p. 9
4.2.3.3
Protecting availability and integrity
p. 10
4.2.3.4
Authentication and authorization
p. 10
4.2.3.5
Protecting sessions
p. 10
4.2.3.6
Logging
p. 10
4.2.4
Operating systems
p. 10
4.2.5
Web servers
p. 10
4.2.6
Network devices
p. 10
4.3
AAnF-specific adaptations of hardening requirements and related test cases.
p. 10
4.3.1
Introduction
p. 10
4.3.2
Technical Baseline
p. 10
4.3.3
Operating Systems
p. 10
4.3.4
Web Servers
p. 10
4.3.5
Network Devices
p. 10
4.3.6
Network Functions in service-based architecture
p. 10
4.4
AAnF-specific adaptations of basic vulnerability testing requirements and related test cases
p. 11
4.4.1
Introduction
p. 11
4.4.2
Port scanning
p. 11
4.4.3
Vulnerability scanning
p. 11
4.4.4
Robustness and fuzz testing
p. 11
$
Change history
p. 12