Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.501  Word version:  19.0.0

Top   Top   Up   Prev   Next
1…   4…   5…   5.3…   5.9…   5.10…   6…   6.1.3…   6.1.4…   6.2…   6.2.2…   6.3…   6.4…   6.5…   6.6…   6.7…   6.8…   6.9…   6.10…   6.11   6.12…   6.13   6.14…   6.15…   6.16…   7…   7A…   7A.2.3…   7B…   8…   9…   10…   11…   12…   13…   13.2.2…   13.2.4…   13.3…   13.4…   14…   15…   16…   A…   B…   C…   D…   E…   F…   G…   I…   I.9…   J…   K…   M…   N…   O…   P…   R   S…   T…   U…   V…   W…   X…   Y…   Z…

 

5.3  Requirements on the gNBp. 34

5.3.1  Generalp. 34

The security requirements given in this clause apply to all types of gNBs. More stringent requirements for specific types of gNBs may be defined in other 3GPP specifications.

5.3.2  User data and signalling data confidentialityp. 34

The gNB shall support ciphering of user data between the UE and the gNB.
The gNB shall activate ciphering of user data based on the security policy sent by the SMF.
The gNB shall support ciphering of RRC-signalling.
The gNB shall implement the following ciphering algorithms:
NEA0, 128-NEA1, 128-NEA2 as defined in Annex D of the present document.
The gNB may implement the following ciphering algorithm:
128-NEA3 as defined in Annex D of the present document.
Confidentiality protection of user data between the UE and the gNB is optional to use.
Confidentiality protection of the RRC-signalling is optional to use.
Confidentiality protection should be used whenever regulations permit.
Up

5.3.3  User data and signalling data integrityp. 34

The gNB shall support integrity protection and replay protection of user data between the UE and the gNB.
The gNB shall activate integrity protection of user data based on the security policy sent by the SMF.
The gNB shall support integrity protection and replay protection of RRC-signalling.
The gNB shall support the following integrity protection algorithms:
NIA0, 128-NIA1, 128-NIA2 as defined in Annex D of the present document.
The gNB may support the following integrity protection algorithm:
128-NIA3 as defined in Annex D of the present document.
Integrity protection of the user data between the UE and the gNB is optional to use, and shall not use NIA0.
All RRC signalling messages except those explicitly listed in TS 38.331 as exceptions shall be integrity-protected with an integrity protection algorithm different from NIA0, except for unauthenticated emergency calls.
NIA0 shall be disabled in gNB in the deployments where support of unauthenticated emergency session is not a regulatory requirement.
Up

5.3.4  Requirements for the gNB setup and configurationp. 35

Setting up and configuring gNBs by O&M systems shall be authenticated and authorized by gNB so that attackers shall not be able to modify the gNB settings and software configurations via local or remote access.
  • The certificate enrolment mechanism specified in TS 33.310 for base station should be supported for gNBs. The decision on whether to use the enrolment mechanism is left to operators.
  • Communication between the O&M systems and the gNB shall be confidentiality, integrity and replay protected from unauthorized parties. The security associations between the gNB and an entity in the 5G Core or in an O&M domain trusted by the operator shall be supported. These security association establishments shall be mutually authenticated. The security associations shall be realized according to TS 33.210 and TS 33.310.
  • The gNB shall be able to ensure that software/data change attempts are authorized.
  • The gNB shall use authorized data/software.
  • Sensitive parts of the boot-up process shall be executed with the help of the secure environment.
  • Confidentiality of software transfer towards the gNB shall be ensured.
  • Integrity protection of software transfer towards the gNB shall be ensured.
  • The gNB software update shall be verified before its installation (cf. subclause 4.2.3.3.5 of TS 33.117).
Up

5.3.5  Requirements for key management inside the gNBp. 35

The 5GC provides subscription specific session keying material for the gNBs, which also hold long term keys used for authentication and security association setup purposes. Protecting all these keys is important. The following requirements apply:
  • Any part of a gNB deployment that stores or processes keys in cleartext shall be protected from physical attacks. If not, the whole entity is placed in a physically secure location, then keys in cleartext shall be stored and processed in a secure environment. Keys stored inside a secure environment in any part of the gNB shall never leave the secure environment except when done in accordance with this or other 3GPP specifications.
Up

5.3.6  Requirements for handling user plane data for the gNBp. 35

The following requirements apply:
  • Any part of a gNB deployment that stores or processes user plane data in cleartext shall be protected from physical attacks. If not, the whole entity is placed in a physically secure location, then user plane data in cleartext shall be stored and processed in a secure environment.

5.3.7  Requirements for handling control plane data for the gNBp. 35

The following requirements apply:
  • Any part of a gNB deployment that stores or processes control plane data in cleartext shall be protected from physical attacks. If not, the whole entity is placed in a physically secure location, then control plane data in cleartext shall be stored and processed in a secure environment.

5.3.8  Requirements for secure environment of the gNBp. 35

The secure environment is logically defined within the gNB. It ensures protection and secrecy of all sensitive information and operations from any unauthorized access or exposure. The following list defines the requirements of the secure environment:
  • The secure environment shall support secure storage of sensitive data, e.g. long-term cryptographic secrets and vital configuration data.
  • The secure environment shall support the execution of sensitive functions, e.g. en-/decryption of user data and the basic steps within protocols which use long term secrets (e.g. in authentication protocols).
  • The secure environment shall support the execution of sensitive parts of the boot process.
  • The secure environment's integrity shall be assured.
  • Only authorised access shall be granted to the secure environment, i.e. to data stored and used within it, and to functions executed within it.
Up

5.3.9  Requirements for the gNB F1 interfacesp. 36

Requirements given below apply to gNBs with split DU-CU implementations using F1 interface defined in TS 38.470. Signalling traffic (i.e. both F1-C interface management traffic defined in TS 38.470 and F1-C signalling bearer defined in TS 38.472) and user plane data can be sent on the F1 interface between a given DU and its CU.
  • F1-C interface shall support confidentiality, integrity and replay protection.
  • All management traffic carried over the CU-DU link shall be integrity, confidentiality and replay protected.
  • The gNB shall support confidentiality, integrity and replay protection on the gNB DU-CU F1-U interface [33] for user plane.
  • F1-C and management traffic carried over the CU-DU link shall be protected independently from F1-U traffic.
Up

5.3.10  Requirements for the gNB E1 interfacesp. 36

Requirements given below apply to gNBs with split DU-CU implementations, particularly with an open interface between CU-CP and CU-UP using the E1 interface defined in TS 38.460.
  • The E1 interface between CU-CP and CU-UP shall be confidentiality, integrity and replay protected.

5.4  Requirements on the ng-eNBp. 36

The security requirements for ng-eNB are as specified for eNB in TS 33.401 with the following additional requirement:
  • ng-eNB shall support the use of integrity protection with the UE over the Uu interface.

5.5  Requirements on the AMFp. 36

5.5.1  Signalling data confidentialityp. 36

The AMF shall support ciphering of NAS-signalling.
The AMF shall support the following ciphering algorithms:
NEA0, 128-NEA1, 128-NEA2 as defined in Annex D of the present document.
The AMF may support the following ciphering algorithm:
128-NEA3 as defined in Annex D of the present document.
Confidentiality protection NAS-signalling is optional to use.
Confidentiality protection should be used whenever regulations permit.
Up

5.5.2  Signalling data integrityp. 37

The AMF shall support integrity protection and replay protection of NAS-signalling.
The AMF shall support the following integrity protection algorithms:
NIA-0, 128-NIA1, 128-NIA2 as defined in Annex D of the present document.
The AMF may support the following integrity protection algorithm:
128-NIA3 as defined in Annex D of the present document.
NIA0 shall be disabled in AMF in the deployments where support of unauthenticated emergency session is not a regulatory requirement.
All NAS signalling messages except those explicitly listed in TS 24.501 as exceptions shall be integrity-protected with an algorithm different to NIA-0 except for emergency calls.
Up

5.5.3  Subscriber privacyp. 37

The AMF shall support to trigger primary authentication using the SUCI.
The AMF shall support assigning 5G-GUTI to the UE.
The AMF shall support reallocating 5G-GUTI to UE.
The AMF shall be able to confirm SUPI from UE and from home network. The AMF shall deny service to the UE if this confirmation fails.

5.6  Requirements on the SEAFp. 37

The security anchor function (SEAF) provides the authentication functionality via the AMF in the serving network. The SEAF shall fulfil the following requirements:
The SEAF shall support primary authentication using SUCI.

5.7Void

5.8  Requirements on the UDMp. 37

5.8.1  Generic requirementsp. 37

The long-term key(s) used for authentication and security association setup purposes shall be protected from physical attacks and shall never leave the secure environment of the UDM/ARPF unprotected.

5.8.2  Subscriber privacy related requirements to UDM and SIDFp. 37

The SIDF is responsible for de-concealment of the SUCI and shall fulfil the following requirements:
  • The SIDF shall be a service offered by UDM.
  • The SIDF shall resolve the SUPI from the SUCI based on the protection scheme used to generate the SUCI.
The Home Network Private Key used for subscriber privacy shall be protected from physical attacks in the UDM.
The UDM shall hold the Home Network Public Key Identifier(s) for the private/public key pair(s) used for subscriber privacy.
The algorithm used for subscriber privacy shall be executed in the secure environment of the UDM.
Up

5.8a  Requirements on AUSFp. 38

The Authentication server function (AUSF) shall handle authentication requests for both, 3GPP access and non-3GPP access.
The AUSF shall provide SUPI to the VPLMN only after authentication confirmation if authentication request with SUCI was sent by VPLMN.
The AUSF shall inform the UDM that a successful or unsuccessful authentication of a subscriber has occurred.

Up   Top   ToC