Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.117
Word version: 18.3.0
1…
4.2…
4.2.3…
4.2.3.4…
4.2.3.5…
4.2.4…
4.3…
4.3.4…
4.4…
4.2.3
Technical baseline
4.2.3.1
Introduction
4.2.3.2
Protecting data and information
4.2.3.2.1
Protecting data and information - general
4.2.3.2.2
Protecting data and information - Confidential System Internal Data
4.2.3.2.3
Protecting data and information in storage
4.2.3.2.4
Protecting data and information in transfer
4.2.3.2.5
Logging access to personal data
4.2.3.3
Protecting availability and integrity
4.2.3.3.1
System handling during overload situations
4.2.3.3.2
Boot from intended memory devices only
4.2.3.3.3
System handling during excessive overload situations
4.2.3.3.4
System robustness against unexpected input
4.2.3.3.5
Network Product software package integrity
...
4.2.3
Technical baseline
p. 20
4.2.3.1
Introduction
p. 20
4.2.3.2
Protecting data and information
p. 20
4.2.3.2.1
Protecting data and information - general
p. 20
4.2.3.2.2
Protecting data and information - Confidential System Internal Data
p. 20
4.2.3.2.3
Protecting data and information in storage
p. 21
4.2.3.2.4
Protecting data and information in transfer
p. 22
4.2.3.2.5
Logging access to personal data
p. 23
4.2.3.3
Protecting availability and integrity
p. 24
4.2.3.3.1
System handling during overload situations
p. 24
4.2.3.3.2
Boot from intended memory devices only
p. 24
4.2.3.3.3
System handling during excessive overload situations
p. 25
4.2.3.3.4
System robustness against unexpected input
p. 27
4.2.3.3.5
Network Product software package integrity
p. 27