The 5G core network introduced a Service-Based Architecture (the so-called SBA). This brought fundamental impacts on the way new services are created and how the individual Network Functions (NF) communicate. A more open and adaptable system design necessitated to study different approaches to enforce the security requirements of 3GPP systems, whilst not impeding flexible service creation and future innovations. Along with these architectural challenges, SBA further introduced changes to the protocol stack and serialization format of the 5G core network.
The SBA security was set on providing solutions for authentication and authorization in direct communication scenarios as well as the N32 roaming security. Later on enhancements were introduced for indirect communication scenarios as well as the concept of Client Credential Assertion to allow NRF/NF Service Producer to directly authenticate a NF Service Consumer.
While the SBA provides a good level of security, several additional aspects have been identified that may bring new potential threats. This will be documented by the present document.
The present document studies enhanced security aspects of the 5G Service Based Architecture. It will analyse potential threats, study necessary security enhancements, and document decisions of solutions to be adopted or not adopted after evaluating the risks versus the complexity.
In particular, the following topics are addressed:
-
Need and mechanism of enabling end to end authentication in roaming case if no cross-certification between operators is enabled;
-
Need and mechanism of enabling NF Service Consumer authentication of NRF and the NF Service Producer;
-
Need for addressing potential security impact of different deployment scenarios including the several SCPs;
-
Verification of URI in subscription/notification;
-
Dynamic authorization between SCPs or NF and SCP;
-
End-to-End Critical HTTP headers/body parts integrity protection;
-
Access token usage in NF Sets;
-
Authorization mechanism determination;
-
Security of NRF service management;
-
Inter-Slice access authorization;
-
N32 roaming security considerations for deployment scenarios including roaming hub and hosted SEPP.