Tech-invite   World Map
3GPPspecs     Glossaries     IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TR 33.805 (SA3)
Study on Security Assurance methodology
for 3GPP network products

ToC      3GPP‑Page      Help       
V12.0.0 (Wzip)    2013/12    106 p.

Rapporteur:  Mr. Habermacher, Loic
See also:  SECAM-related TS/TR

The present document studies methodologies for specifying network product security assurance and hardening requirements, with associated test cases when feasible, of 3GPP network products. Network product security assurance and hardening refers to protection against unwanted access to a 3GPP network product, its Operating System, and main running Application(s). The suitability of industry standard methodologies and the potential need for collaboration with bodies such as GSMA, CCRA, ISO and ITU will be assessed. The study will also consider regulatory aspects and the potential need for security certification. The suitability of the candidate methodologies will be assessed with reference to real world examples.

Part of the scope of this work is to conclude which 3GPP network products, if not all, would be subject to 3GPP network product security assurance and hardening requirements. There is likely to be a long list with the result that prioritisation will be required. LTE network product classes will be the first priority. The work will also study exactly what should constitute a 3GPP network product in the context of this study e.g. whether it should be an individual 3GPP functional entity, a group of 3GPP functional entities or some other realisation.

The study will also include assessing the extent to which individual 3GPP network products need to be hardened beyond a common baseline and should take into consideration network vs. environment.


Here        Top        None        None        Next
1…      8…     



1   Scope   Word-p. 7
2   References
3   Definitions and abbreviations   Word-p. 8
4   3GPP network products and threat model   Word-p. 11
5   Proposed methodologies   Word-p. 25
5.1   Methodology 1: Common Criteria (CC)
5.2   Methodology 2   Word-p. 36
5.2.1   Overview
5.2.2   Methodology building   Word-p. 40
5.2.3   Vendors and third-party laboratories accreditation
5.2.4   Evaluation and evaluation report   Word-p. 58
5.2.5   Self-declaration   Word-p. 67      Up
5.2.6   Operator security acceptance decision
5.2.7   Administration of the accreditations and dispute resolution
5.2.8   Summary of SECAM deliverables   Word-p. 68
5.2.9   General considerations   Word-p. 69
6   Criteria for the evaluation of the methodologies   Word-p. 70      Up
7   Comparison of Proposed Methodologies   Word-p. 71

Up        Top        ToC