Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.875
Study on enhanced Security aspects of the
5G Service Based Architecture (SBA)

V18.1.0 (Wzip)  2023/09  84 p.
Rapporteur:
Miss Jerichow, Anja
Nokia Germany

full Table of Contents for  TR 33.875  Word version:  18.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 9
1Scope  p. 10
2References  p. 10
3Definitions of terms, symbols and abbreviations  p. 11
3.1Terms  p. 11
3.2Symbols  p. 11
3.3Abbreviations  p. 11
4Trust model  p. 11
4.0General  p. 11
4.1Actors  p. 12
4.2Deployment options  p. 12
4.3Description of the trust assumptions  p. 13
4.3.0General  p. 13
4.3.1Trust within one PLMN  p. 13
4.3.2Trust in Inter-PLMN communication  p. 14
5Key issues  p. 15
5.1Key issue #1: Authentication of NRF and NF Service Producer by the NF Service Consumer in indirect communication  p. 15
5.1.1Key issue details  p. 15
5.1.2Security threats  p. 15
5.1.3Potential security requirements  p. 15
5.2Key issue #2: Need for additional security at operational level among SCP domains  p. 15
5.2.1Key issue details  p. 15
5.2.2Security threats  p. 16
5.2.3Potential security requirements  p. 16
5.3Key Issue #3: Service access authorization in the "Subscribe-Notify" scenarios  p. 17
5.3.1Key issue details  p. 17
5.3.2Security threats  p. 18
5.3.3Potential security requirements  p. 18
5.4Key issue #4: Authorization of SCP to act on behalf of an NF or another SCP  p. 18
5.4.1Key issue details  p. 18
5.4.2Security threats  p. 19
5.4.3Potential security requirements  p. 19
5.5Key issue #5: End-to-end integrity protection of HTTP messages  p. 19
5.5.1Key issue details  p. 19
5.5.2Security threats  p. 19
5.5.3Potential security requirements  p. 19
5.6Key issue #6: Access token usage by all consumer NFs of an NF Set  p. 19
5.6.1Key issue details  p. 19
5.6.2Security threats  p. 20
5.6.3Potential security requirements  p. 21
5.7Key issue #7: Authorization mechanism determination  p. 21
5.7.1Key issue details  p. 21
5.7.2Security threats  p. 21
5.7.3Potential security requirements  p. 21
5.8Key issue #8: Service access authorization requirements in intra-PLMN scenarios for PLMN deploying multiple NRFs (in OAuth2.0 AS role)  p. 21
5.8.1Key issue details  p. 21
5.8.1.1Introduction  p. 21
5.8.1.2Hierarchical NRFs / Deployment model with local NRFs  p. 22
5.8.1.3Deployment model with NF Service Consumer directly accessing the NRF where the NF Service Producer is registered  p. 22
5.8.2Security threats  p. 23
5.8.3Potential security requirements  p. 23
5.9Key issue #9: Authorization for Inter-Slice Access  p. 24
5.9.1Key issue details  p. 24
5.9.2Security threats  p. 24
5.9.3Potential security requirements  p. 24
5.10Key issue #10: N32 security in mediated roaming scenarios  p. 24
5.10.1Introduction  p. 24
5.10.2Key issue details  p. 25
5.10.3Security requirements  p. 25
5.11Key issue #11: NRF validation of NFc for access token requests  p. 26
5.11.1Key issue details  p. 26
5.11.1.0General  p. 26
5.11.1.1NFc registration at NRF not mandatory (Problem 1a)  p. 26
5.11.1.2IEs mandated in SBA TLS certificate not sufficient for NFc validation (Problem 1b)  p. 26
5.11.1.3Questions from Problems 1a and 1b  p. 26
5.11.1.4TLS certificate or NF profile - precedence in NFc validation (Problem 2)  p. 26
5.11.1.5Questions from Problem 2  p. 26
5.11.2Security threats  p. 26
5.11.3Potential security requirements  p. 27
5.12Key issue #12: Security in Hosted SEPP scenarios  p. 27
5.12.1Key issue details  p. 27
5.12.1.1Background  p. 27
5.12.1.2Issues to be studied  p. 28
5.12.2Threats  p. 28
5.12.3Security requirements  p. 28
6Solutions  p. 30
6.0Mapping of solutions to key issues  p. 30
6.1Solution #1: Verification of the entity sending the service response in indirect communication without delegated discovery  p. 31
6.1.1Introduction  p. 31
6.1.2Solution details  p. 31
6.1.3Evaluation  p. 32
6.2Solution #2: Authorization between NFs and SCP  p. 33
6.2.1Introduction  p. 33
6.2.2Solution details  p. 33
6.2.3Evaluation  p. 34
6.3Solution #3: Using existing procedures for authorization of SCP to act on behalf of an NF Service Consumer  p. 34
6.3.1Introduction  p. 34
6.3.2Solution details  p. 35
6.3.2.1Request of access token on behalf of the consumer  p. 35
6.3.2.2Service request on behalf of the consumer  p. 35
6.3.2.4Protection of the NF Service Consumer's CCA  p. 36
6.3.3Evaluation  p. 37
6.4Solution #4: Service request authenticity verification in indirect communication  p. 37
6.4.1Introduction  p. 37
6.4.2Solution details  p. 37
6.4.3Evaluation  p. 38
6.5Solution #5: End-to-end integrity protection of HTTP body and method  p. 38
6.5.1Introduction  p. 38
6.5.2Solution details  p. 39
6.5.3Evaluation  p. 40
6.6Solution #6: Verification of Service Response from a NF Service Producer at the expected NF Set  p. 41
6.6.1Introduction  p. 41
6.6.2Solution details  p. 41
6.6.2.1For indirect communication without delegated discovery procedure  p. 41
6.6.2.2For indirect communication with delegated discovery  p. 42
6.6.2.3Client credentials assertion of NF Service Producer  p. 43
6.6.3Evaluation  p. 44
6.7Solution #7: Access token request for NF Set  p. 44
6.7.1Introduction  p. 44
6.7.2Solution details  p. 45
6.7.3Evaluation  p. 46
6.8Solution #8: Integrity protection of HTTP message in consideration of update by SCP  p. 47
6.8.1Introduction  p. 47
6.8.2Solution Details  p. 47
6.8.3Evaluation  p. 48
6.9Solution #9: Authorization mechanism negotiation  p. 48
6.9.1Introduction  p. 48
6.9.2Solution details  p. 48
6.9.3Evaluation  p. 49
6.10Solution #10: NRF deployment clarifications  p. 49
6.10.1Introduction  p. 49
6.10.2Solution details  p. 49
6.10.3Evaluation  p. 50
6.11Solution #11: Registered NF Profile changes for Inter-Slice Access  p. 50
6.11.1Introduction  p. 50
6.11.2Solution Details  p. 50
6.11.3Evaluation  p. 50
6.12Solution #12: Authorization of notification endpoint in "Subscribe-Notify" scenarios  p. 51
6.12.1Introduction  p. 51
6.12.2Solution details  p. 51
6.12.3Evaluation  p. 52
6.13Solution #13: Authentication of NF Service Producer in Indirect Communication  p. 53
6.13.1Introduction  p. 53
6.13.2Solution details  p. 53
6.13.3Evaluation  p. 54
6.14Solution #14: SCP trust domain or technical domain grouping  p. 54
6.14.1Introduction  p. 54
6.14.2Solution details  p. 54
6.14.3Evaluation  p. 56
6.15Solution #15: Authorization mechanism for the involved NFs in the delegated "Subscribe-Notify" scenario.  p. 56
6.15.1Introduction  p. 56
6.15.2Solution details  p. 56
6.15.3Evaluation  p. 58
6.16Solution #16: Selective End of End Protection of HTTP Request and Response in Indirect Communication  p. 58
6.16.1Introduction  p. 58
6.16.2Solution details  p. 58
6.16.3Evaluation  p. 59
6.17Solution #17: Authorization mechanism negotiation using existing methods  p. 59
6.17.1Introduction  p. 59
6.17.2Solution details  p. 59
6.17.3Evaluation  p. 61
6.18Solution #18: Avoiding slice isolation violation  p. 61
6.18.1Introduction  p. 61
6.18.2Solution details  p. 61
6.18.3Evaluation  p. 62
6.19Solution #19: Hosted SEPP requirements  p. 62
6.19.1Introduction  p. 62
6.19.2Solution details  p. 62
6.19.3Evaluation  p. 63
6.20Solution #20: PRINS for Roaming Hubs  p. 63
6.20.1Introduction  p. 63
6.20.2Solution details  p. 64
6.20.3RH Proxy Resolves pSEPP Well-Known FQDN  p. 67
6.20.4Evaluation  p. 67
6.21Solution #21: Certificate solution for NRF validation of NFc for access token requests  p. 68
6.21.1Introduction  p. 68
6.21.2Solution details  p. 68
6.21.2.1NF Service Consumer information to validate at Service Request Authorization  p. 68
6.21.2.2Certificates  p. 68
6.21.2.3NRF validation solution  p. 68
6.21.3Evaluation  p. 69
6.22Solution #22: Combined certificate and profile solution for NRF validation of NFc for access token requests  p. 69
6.22.1Introduction  p. 69
6.22.2Solution details  p. 69
6.22.2.1NF Service Consumer information to validate at Service Request Authorization  p. 69
6.22.2.2O&M Provisioning solution  p. 69
6.22.2.3Certificates  p. 69
6.22.2.4NRF validation solution  p. 70
6.22.3Evaluation  p. 70
6.23Solution #23: SCP authorization check by NRF  p. 70
6.23.1Introduction  p. 70
6.23.2Solution details  p. 70
6.23.2.1Enabling NRF to check on SCP information  p. 70
6.23.2.2Including service request information into the CCA  p. 71
6.23.3Evaluation  p. 72
6.24Solution #24: Authorization negotiation with bootstrapping mechanism  p. 72
6.24.1Introduction  p. 72
6.24.2Solution details  p. 72
6.24.3Evaluation  p. 73
6.25Solution #25: Solution on N32 security profiles  p. 73
6.25.1Introduction  p. 73
6.25.2Solution details  p. 74
6.25.3Evaluation  p. 74
6.26Solution #26: Authorization of NF Service Consumer accessing Nnrf_AccessToken service  p. 75
6.26.1Introduction  p. 75
6.26.2Solution details  p. 75
6.26.3Evaluation  p. 75
7Conclusions  p. 77
7.1KI#1: Authentication of NRF and NF Service Producer in indirect communication  p. 77
7.1.1Analysis  p. 77
7.1.2Conclusion  p. 77
7.2KI#2: Need for additional security at operational level among SCP domains  p. 78
7.2.1Analysis  p. 78
7.2.2Conclusion  p. 78
7.3KI#3: Service access authorization in the "Subscribe-Notify" scenarios  p. 78
7.3.1Analysis  p. 78
7.3.2Conclusion  p. 78
7.4KI#4: Authorization of SCP to act on behalf of an NF or another SCP  p. 78
7.4.1Analysis  p. 78
7.4.2Conclusion  p. 79
7.5KI #5: End-to-end integrity protection of HTTP messages  p. 79
7.5.1Analysis  p. 79
7.5.2Conclusion  p. 80
7.6KI#6: Access token usage by all NFs of an NF set  p. 80
7.6.1Analysis  p. 80
7.6.2Conclusion  p. 80
7.7KI#7: Authorization mechanism determination  p. 80
7.7.1Analysis  p. 80
7.7.2Conclusion  p. 81
7.8KI#8: Service access authorization requirements in intra-PLMN scenarios for PLMN deploying multiple NRFs (in OAuth2.0 AS role)  p. 81
7.8.1Analysis  p. 81
7.8.2Conclusion  p. 81
7.9KI #9: Authorization for Inter-Slice Access  p. 81
7.9.1Analysis  p. 81
7.9.2Conclusion  p. 82
7.10KI #10: N32 security in mediated roaming scenarios  p. 82
7.10.1Analysis  p. 82
7.10.2Conclusion  p. 82
7.11KI #11: NRF validation of NFc for access token  p. 82
7.11.1Analysis  p. 82
7.11.2Conclusion  p. 83
7.12KI #12: Security in Hosted SEPP scenarios  p. 83
7.12.1Analysis  p. 83
7.12.2Conclusion  p. 83
$Change history  p. 84

Up   Top