Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.875
Study on enhanced Security aspects of the
5G Service Based Architecture (SBA)

3GPP‑Page  
V18.1.0 (Wzip)  2023/09  84 p.
Rapporteur:
Miss Jerichow, Anja
Nokia Germany

full Table of Contents for  TR 33.875  Word version:  18.1.0

Here   Top

 

0  Introductionp. 9

The 5G core network introduced a Service-Based Architecture (the so-called SBA). This brought fundamental impacts on the way new services are created and how the individual Network Functions (NF) communicate. A more open and adaptable system design necessitated to study different approaches to enforce the security requirements of 3GPP systems, whilst not impeding flexible service creation and future innovations. Along with these architectural challenges, SBA further introduced changes to the protocol stack and serialization format of the 5G core network.
The SBA security was set on providing solutions for authentication and authorization in direct communication scenarios as well as the N32 roaming security. Later on enhancements were introduced for indirect communication scenarios as well as the concept of Client Credential Assertion to allow NRF/NF Service Producer to directly authenticate a NF Service Consumer.
While the SBA provides a good level of security, several additional aspects have been identified that may bring new potential threats. This will be documented by the present document.
Up

1  Scopep. 10

The present document studies enhanced security aspects of the 5G Service Based Architecture. It will analyse potential threats, study necessary security enhancements, and document decisions of solutions to be adopted or not adopted after evaluating the risks versus the complexity.
In particular, the following topics are addressed:
  • Need and mechanism of enabling end to end authentication in roaming case if no cross-certification between operators is enabled;
  • Need and mechanism of enabling NF Service Consumer authentication of NRF and the NF Service Producer;
  • Need for addressing potential security impact of different deployment scenarios including the several SCPs;
  • Verification of URI in subscription/notification;
  • Dynamic authorization between SCPs or NF and SCP;
  • End-to-End Critical HTTP headers/body parts integrity protection;
  • Access token usage in NF Sets;
  • Authorization mechanism determination;
  • Security of NRF service management;
  • Inter-Slice access authorization;
  • N32 roaming security considerations for deployment scenarios including roaming hub and hosted SEPP.
Up

2  Referencesp. 10

3  Definitions of terms, symbols and abbreviationsp. 11

3.1  Termsp. 11

3.2  Symbolsp. 11

3.3  Abbreviationsp. 11

4  Trust modelp. 11

5  Key issuesp. 15

5.1  Key issue #1: Authentication of NRF and NF Service Producer by the NF Service Consumer in indirect communicationp. 15

5.2  Key issue #2: Need for additional security at operational level among SCP domainsp. 15

5.3  Key Issue #3: Service access authorization in the "Subscribe-Notify" scenariosp. 17

5.4  Key issue #4: Authorization of SCP to act on behalf of an NF or another SCPp. 18

5.5  Key issue #5: End-to-end integrity protection of HTTP messagesp. 19

5.6  Key issue #6: Access token usage by all consumer NFs of an NF Setp. 19

5.7  Key issue #7: Authorization mechanism determinationp. 21

5.8  Key issue #8: Service access authorization requirements in intra-PLMN scenarios for PLMN deploying multiple NRFs (in OAuth2.0 AS role)p. 21

5.9  Key issue #9: Authorization for Inter-Slice Accessp. 24

5.10  Key issue #10: N32 security in mediated roaming scenariosp. 24

5.11  Key issue #11: NRF validation of NFc for access token requestsp. 26

5.12  Key issue #12: Security in Hosted SEPP scenariosp. 27

6  Solutionsp. 30

6.0  Mapping of solutions to key issuesp. 30

6.1  Solution #1: Verification of the entity sending the service response in indirect communication without delegated discoveryp. 31

6.2  Solution #2: Authorization between NFs and SCPp. 33

6.3  Solution #3: Using existing procedures for authorization of SCP to act on behalf of an NF Service Consumerp. 34

6.4  Solution #4: Service request authenticity verification in indirect communicationp. 37

6.5  Solution #5: End-to-end integrity protection of HTTP body and methodp. 38

6.6  Solution #6: Verification of Service Response from a NF Service Producer at the expected NF Setp. 41

6.7  Solution #7: Access token request for NF Setp. 44

6.8  Solution #8: Integrity protection of HTTP message in consideration of update by SCPp. 47

6.9  Solution #9: Authorization mechanism negotiationp. 48

6.10  Solution #10: NRF deployment clarificationsp. 49

6.11  Solution #11: Registered NF Profile changes for Inter-Slice Accessp. 50

6.12  Solution #12: Authorization of notification endpoint in "Subscribe-Notify" scenariosp. 51

6.13  Solution #13: Authentication of NF Service Producer in Indirect Communicationp. 53

6.14  Solution #14: SCP trust domain or technical domain groupingp. 54

6.15  Solution #15: Authorization mechanism for the involved NFs in the delegated "Subscribe-Notify" scenario.p. 56

6.16  Solution #16: Selective End of End Protection of HTTP Request and Response in Indirect Communicationp. 58

6.17  Solution #17: Authorization mechanism negotiation using existing methodsp. 59

6.18  Solution #18: Avoiding slice isolation violationp. 61

6.19  Solution #19: Hosted SEPP requirementsp. 62

6.20  Solution #20: PRINS for Roaming Hubsp. 63

6.21  Solution #21: Certificate solution for NRF validation of NFc for access token requestsp. 68

6.22  Solution #22: Combined certificate and profile solution for NRF validation of NFc for access token requestsp. 69

6.23  Solution #23: SCP authorization check by NRFp. 70

6.24  Solution #24: Authorization negotiation with bootstrapping mechanismp. 72

6.25  Solution #25: Solution on N32 security profilesp. 73

6.26  Solution #26: Authorization of NF Service Consumer accessing Nnrf_AccessToken servicep. 75

7  Conclusionsp. 77

7.1  KI#1: Authentication of NRF and NF Service Producer in indirect communicationp. 77

7.2  KI#2: Need for additional security at operational level among SCP domainsp. 78

7.3  KI#3: Service access authorization in the "Subscribe-Notify" scenariosp. 78

7.4  KI#4: Authorization of SCP to act on behalf of an NF or another SCPp. 78

7.5  KI #5: End-to-end integrity protection of HTTP messagesp. 79

7.6  KI#6: Access token usage by all NFs of an NF setp. 80

7.7  KI#7: Authorization mechanism determinationp. 80

7.8  KI#8: Service access authorization requirements in intra-PLMN scenarios for PLMN deploying multiple NRFs (in OAuth2.0 AS role)p. 81

7.9  KI #9: Authorization for Inter-Slice Accessp. 81

7.10  KI #10: N32 security in mediated roaming scenariosp. 82

7.11  KI #11: NRF validation of NFc for access tokenp. 82

7.12  KI #12: Security in Hosted SEPP scenariosp. 83

$  Change historyp. 84


Up   Top