Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.180
Word version: 17.8.0
1…
4…
4.3.4
4.3.5
5…
5.1.3
5.1.4…
5.2…
5.2.3
5.2.4
5.2.5
5.2.6…
5.3…
5.4…
6…
7…
7.3…
8…
9…
9.4…
10…
A…
B…
C…
D…
E…
F…
J…
L…
10
Logging, Audit and Discreet Monitoring
10.1
Logging and audit of service metadata
10.2
Audit and Discreet Monitoring of user content
11
Interconnection, interworking and migration security
11.1
Interconnection
11.2
Interworking
...
10
Logging, Audit and Discreet Monitoring
|R15|
p. 113
10.1
Logging and audit of service metadata
p. 113
10.1.1
Overview
p. 113
10.1.2
User events
p. 114
10.1.2.1
Types of events
p. 114
10.1.2.2
Location of recording function
p. 114
10.1.2.3
Security content within user event logs
p. 114
10.1.2.4
Protection of user event logs
p. 115
10.2
Audit and Discreet Monitoring of user content
p. 115
10.2.1
Overview
p. 115
10.2.2
Collection of user media
p. 115
10.2.3
Storing of user media
p. 115
10.2.4
Decryption of user media
p. 115
11
Interconnection, interworking and migration security
|R15|
p. 116
11.1
Interconnection
p. 116
11.1.1
Overview
p. 116
11.1.2
Security procedures for interconnection
p. 116
11.1.2.1
General
p. 116
11.1.2.2
GMK transfer between MC systems
p. 116
11.1.3
Interconnection security with MC gateway server
|R16|
p. 117
11.2
Interworking
p. 118
11.2.1
General
p. 118
11.2.2
Transport of non-3GPP interworking security data (InterSD)
p. 119
11.2.3
Interworking key management enablement
|R16|
p. 119