| 5.1 | Introduction p. 15
|
| 5.2 | Key Issue #1: Establishment of trust domains for Network Functions p. 15
| 5.2.1 | Key issue detail p. 15
|
| 5.2.2 | Security threats p. 15
|
| 5.2.3 | Potential security requirements p. 15
|
|
| 5.3 | Key Issue #2: Confidentiality of sensitive data p. 16
| 5.3.1 | Key issue detail p. 16
|
| 5.3.2 | Security threats p. 16
|
| 5.3.3 | Potential security requirements p. 16
|
|
| 5.4 | Key Issue #3: Availability of Network Functions p. 16
| 5.4.1 | Key issue detail p. 16
|
| 5.4.2 | Security threats p. 16
|
| 5.4.3 | Potential security requirements p. 17
|
|
| 5.5 | Key Issue #4: Common Software Environment p. 17
| 5.5.1 | Key issue detail p. 17
|
| 5.5.2 | Security threats p. 17
|
| 5.5.3 | Potential security requirements p. 17
|
|
| 5.6 | Key Issue #5: Data Location and Lifecycle p. 18
| 5.6.1 | Key issue detail p. 18
|
| 5.6.2 | Security threats p. 18
|
| 5.6.3 | Potential security requirements p. 18
|
|
| 5.7 | Key Issue #6: Function Isolation p. 18
| 5.7.1 | Key issue detail p. 18
|
| 5.7.2 | Security threats p. 19
|
| 5.7.3 | Potential security requirements p. 19
|
|
| 5.8 | Key Issue #7: Memory Introspection p. 19
| 5.8.1 | Key issue detail p. 19
|
| 5.8.2 | Security threats p. 19
|
| 5.8.3 | Potential security requirements p. 19
|
|
| 5.9 | Key Issue #8: Test Isolation and Assurance p. 20
| 5.9.1 | Key issue detail p. 20
|
| 5.9.2 | Security threats p. 20
|
| 5.9.3 | Potential security requirements p. 21
|
|
| 5.10 | Key Issue #9: Trust domain and Slice Isolation p. 21
| 5.10.1 | Key issue detail p. 21
|
| 5.10.2 | Security threats p. 21
|
| 5.10.3 | Potential security requirements p. 21
|
|
| 5.11 | Key Issue 10: Single Administrator Domain p. 22
| 5.11.1 | Key issue detail p. 22
|
| 5.11.2 | Security threats p. 22
|
| 5.11.3 | Potential security requirements p. 22
|
|
| 5.12 | Key Issue #11: Where are my Keys and Confidential Data p. 22
| 5.12.1 | Key issue detail p. 22
|
| 5.12.2 | Security threats p. 22
|
| 5.12.3 | Potential security requirements p. 23
|
|
| 5.13 | Key Issue #12: Where the is my function p. 23
| 5.13.1 | Key issue detail p. 23
|
| 5.13.2 | Security threats p. 23
|
| 5.13.3 | Potential security requirements p. 23
|
|
| 5.14 | Key Issue #13: Attestation at 3GPP Function level p. 24
| 5.14.1 | Key issue detail p. 24
|
| 5.14.2 | Security threats p. 24
|
| 5.14.3 | Potential security requirements p. 24
|
|
| 5.15 | Key Issue #14: VNF Host Spanning p. 24
| 5.15.1 | Key issue detail p. 24
|
| 5.15.2 | Security threats p. 25
|
| 5.15.3 | Potential security requirements p. 25
|
|
| 5.16 | Key Issue #15: Encrypted Data Processing p. 25
| 5.16.1 | Key issue detail p. 25
|
| 5.16.2 | Security threats p. 25
|
| 5.16.3 | Potential security requirements p. 25
|
|
| 5.17 | Key Issue #16: Mixed Virtual and Legacy PNF Deployments p. 26
| 5.17.1 | Key issue detail p. 26
|
| 5.17.2 | Security threats p. 26
|
| 5.17.3 | Potential security requirements p. 26
|
|
| 5.18 | Key Issue #17: Software Catalogue Image Exposure p. 27
| 5.18.1 | Key issue detail p. 27
|
| 5.18.2 | Security threats p. 27
|
| 5.18.3 | Potential security requirements p. 27
|
|
| 5.19 | Key Issue #18: The Startup Paradox p. 28
| 5.19.1 | Key issue detail p. 28
|
| 5.19.2 | Security threats p. 28
|
| 5.19.3 | Potential security requirements p. 28
|
|
| 5.20 | Key Issue #19: Time Manipulation p. 28
| 5.20.1 | Key issue detail p. 28
|
| 5.20.2 | Security threats p. 28
|
| 5.20.3 | Potential security requirements p. 28
|
|
| 5.21 | Key Issue #20: 3rd Party Hosting Environments p. 29
| 5.21.1 | Key issue detail p. 29
|
| 5.21.2 | Security threats p. 29
|
| 5.21.3 | Potential security requirements p. 29
|
|
| 5.22 | Key Issue #21: VM and Hypervisor Breakout p. 29
| 5.22.1 | Key issue detail p. 29
|
| 5.22.2 | Security threats p. 29
|
| 5.22.3 | Potential security requirements p. 30
|
|
| 5.23 | Key Issue #22: MANO Single Point of Failures p. 30
| 5.23.1 | Key issue detail p. 30
|
| 5.23.2 | Security threats p. 30
|
| 5.23.3 | Potential security requirements p. 30
|
|
| 5.24 | Key Issue #23: IP layer vs Application layer Security p. 30
| 5.24.1 | Key issue detail p. 30
|
| 5.24.2 | Security threats p. 31
|
| 5.24.3 | Potential security requirements p. 31
|
|
| 5.25 | Key Issue #24: Data synchronicity through network p. 31
| 5.25.1 | Key issue detail p. 31
|
| 5.25.2 | Security threats p. 31
|
| 5.25.3 | Potential security requirements p. 31
|
|
| 5.26 | Key Issue #25: Container Security p. 31
| 5.26.1 | Key issue detail p. 31
|
| 5.26.2 | Security threats p. 32
|
| 5.26.3 | Potential security requirements p. 32
|
|
| 5.27 | Key Issue #26: Container breakout p. 32
| 5.27.1 | Key issue detail p. 32
|
| 5.27.2 | Security threats p. 33
|
| 5.27.3 | Potential security requirements p. 33
|
|
| 5.28 | Key Issue #27: Secrets in NF container images p. 33
| 5.28.1 | Key issue detail p. 33
|
| 5.28.2 | Security threats p. 33
|
| 5.28.3 | Potential security requirements p. 34
|
|
| 5.29 | Key Issue #28: Management APIs p. 34
| 5.29.1 | Key issue detail p. 34
|
| 5.29.2 | Security threats p. 34
|
| 5.29.3 | Potential security requirements p. 34
|
|
| 5.30 | Key Issue #29: Image Snapshot and VNF Mobility p. 35
| 5.30.1 | Key issue detail p. 35
|
| 5.30.2 | Security threats p. 35
|
| 5.30.3 | Potential security requirements p. 35
|
|