Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.180
Word version: 18.1.0
1…
4…
4.3.4
4.3.5
5…
5.1.3
5.1.4…
5.2…
5.2.3
5.2.4
5.2.5
5.2.6…
5.3…
5.4…
6…
7…
7.3…
8…
9…
9.4…
10…
A…
B…
C…
D…
E…
F…
J…
L…
10
Logging, Audit and Discreet Monitoring
10.1
Logging and audit of service metadata
10.2
Audit and Discreet Monitoring of user content
11
Interconnection, interworking and migration security
11.1
Interconnection
11.2
Interworking
...
10
Logging, Audit and Discreet Monitoring
|R15|
p. 114
10.1
Logging and audit of service metadata
p. 114
10.1.1
Overview
p. 114
10.1.2
User events
p. 115
10.1.2.1
Types of events
p. 115
10.1.2.2
Location of recording function
p. 115
10.1.2.3
Security content within user event logs
p. 115
10.1.2.4
Protection of user event logs
p. 116
10.2
Audit and Discreet Monitoring of user content
p. 116
10.2.1
Overview
p. 116
10.2.2
Collection of user media
p. 116
10.2.3
Storing of user media
p. 116
10.2.4
Decryption of user media
p. 116
11
Interconnection, interworking and migration security
|R15|
p. 117
11.1
Interconnection
p. 117
11.1.1
Overview
p. 117
11.1.2
Security procedures for interconnection
p. 117
11.1.2.1
General
p. 117
11.1.2.2
GMK transfer between MC systems
p. 117
11.1.3
Interconnection security with MC gateway server
|R16|
p. 118
11.2
Interworking
p. 119
11.2.1
General
p. 119
11.2.2
Transport of non-3GPP interworking security data (InterSD)
p. 120
11.2.3
Interworking key management enablement
|R16|
p. 120