Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.811
Study on Security aspects
of 5G Network Slicing Management

V15.0.0 (Wzip)  2018/06  19 p.
Rapporteur:
Dr. Lei, Zander (Zhongding)
HuaWei Technologies Co., Ltd

full Table of Contents for  TR 33.811  Word version:  15.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 5
1Scope  p. 6
2References  p. 6
3Definitions and abbreviations  p. 6
3.1Definitions  p. 6
3.2Abbreviations  p. 7
4Key issues  p. 8
4.1Key issue #1: Unauthorized access to Management Exposure Interface  p. 8
4.1.1Key issue details  p. 8
4.1.2Security threats  p. 8
4.1.3Potential security requirements  p. 8
4.2Key issue #2: Protecting the results of NSI supervision/reporting  p. 9
4.2.1Key issue details  p. 9
4.2.2Security threats  p. 9
4.2.3Potential security requirements  p. 9
4.3Key issue #3: Protecting Network Slice Subnet Template  p. 9
4.3.1Key issue details  p. 9
4.3.2Security threats  p. 9
4.3.3Potential security requirements  p. 10
4.4Key issue #4: Insecure procedure for capability negotiation  p. 10
4.4.1Key issue details  p. 10
4.4.2Security threats  p. 10
4.4.3Potential security requirements  p. 10
5Solutions  p. 11
5.1Solution #1.1: Security procedures for Management Exposure Interface  p. 11
5.1.1Introduction  p. 11
5.1.2Solution details  p. 11
5.1.2.1Security within operator's trust domain  p. 11
5.1.2.2Security when CSMF is outside the operator's trust domain  p. 11
5.1.2.2.1Mutual authentication  p. 11
5.1.2.2.2Security profiles  p. 11
5.1.2.2.3Authorization of CSMF's slicing management service requests  p. 11
5.1.3Evaluation  p. 11
5.2 Solution #2.1: OAuth based authorization for access to management functions  p. 12
5.2.1Introduction  p. 12
5.2.2Solution details  p. 12
5.2.3Evaluation  p. 13
5.3 Solution #3.1: Integrity protection of NSST  p. 13
5.3.1Introduction  p. 13
5.3.2Solution details  p. 13
5.3.3Evaluation  p. 15
5.4 Solution #3.2: Confidentiality protection of NSST  p. 15
5.4.1Introduction  p. 15
5.4.2Solution details  p. 15
5.4.3Evaluation  p. 17
5.5 Solution #2.2: Security procedures between network slicing management functions  p. 17
5.5.1Introduction  p. 17
5.5.2Solution details  p. 17
5.5.2.1Protection at the network or transport layer  p. 17
5.5.2.2Authorization between network slicing management functions  p. 17
5.5.3Evaluation  p. 17
6 Conclusions  p. 18
$Change History  p. 19

Up   Top