Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.250
Word version: 18.0.0
1…
4…
4
PGW-specific security requirements and related test cases
4.1
Introduction
4.2
PGW-specific security functional adaptations of requirements and related test cases
4.3
PGW-specific adaptations of hardening requirements and related test cases
4.4
PGW-specific adaptations of basic vulnerability testing requirements and related test cases
$
Change History
4
PGW-specific security requirements and related test cases
p. 6
4.1
Introduction
p. 6
4.2
PGW-specific security functional adaptations of requirements and related test cases
p. 6
4.2.1
Introduction
p. 6
4.2.2
Security functional requirements on the PGW deriving from 3GPP specifications and related test cases
p. 6
4.2.2.1
Security functional requirements on the PGW deriving from 3GPP specifications - General approach
p. 6
4.2.2.2
Per-user based packet filtering
p. 6
4.2.2.3
Charging ID Uniqueness
p. 7
4.2.2.4
TEID UNIQUENESS
p. 8
4.2.2.5
Mobility binding
|R15|
p. 9
4.2.2.6
Inactive emergency PDN connection release
|R15|
p. 10
4.2.3
Technical baseline
p. 11
4.2.3.1
Introduction
p. 11
4.2.3.2
Protecting data and information
p. 11
4.2.3.2.1
Protecting data and information - general
p. 11
4.2.3.2.2
Protecting data and information - unauthorized viewing
p. 11
4.2.3.2.3
Protecting data and information in storage
p. 11
4.2.3.2.4
Protecting data and information in transfer
p. 11
4.2.3.2.5
Logging access to personal data
p. 11
4.2.3.3
Protecting availability and integrity
p. 11
4.2.3.4
Authentication and authorization
p. 11
4.2.3.5
Protecting sessions
p. 11
4.2.3.5.1
Unpredictable GTP TEID
p. 11
4.2.3.6
Logging
p. 12
4.2.4
Operating systems
p. 12
4.2.5
Web servers
p. 12
4.2.6
Network devices
p. 12
4.2.6.1
Protection of Data and Information
p. 12
4.2.6.2
Protecting availability and integrity
p. 12
4.2.6.3
IP Address reallocation interval
p. 12
4.2.6.4
MS/UE-Mutual Access Prevention
p. 13
4.3
PGW-specific adaptations of hardening requirements and related test cases
p. 14
4.3.1
Introduction
p. 14
4.3.2
Technical baseline
p. 14
4.3.3
Operating systems
p. 14
4.3.4
Web servers
p. 14
4.3.5
Network devices
p. 14
4.3.5.1
Traffic separation
p. 14
4.3.5.2
User Plane Traffic Differentiation
p. 15
4.4
PGW-specific adaptations of basic vulnerability testing requirements and related test cases
p. 16
$
Change History
p. 17