Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.794  Word version:  19.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Security Analysis and Considerationsp. 10

5.1  Use cases for security evaluation and monitoringp. 10

5.2  Security mechanism for dynamic policy enforcementp. 17

6  Key issuesp. 19

7  Solutionsp. 21

7.1  Solution #1: Network assisted potential data collection and exposure for security evaluation and monitoringp. 21

7.2  Solution #2: Potential data collection and direct exposure for security evaluation and monitoringp. 24

7.3  Solution #3: New Data Collection NFsp. 26

7.4  Solution #4: Security data collection and exposure to enable detection of compromised NFs in SBA layerp. 30

7.5  Solution #5: Security log events and counter collection for evaluation and monitoring.p. 32

7.6  Solution #6: Data Collection using DCCFp. 33

7.7  Solution #7: Security data collection and exposure to enable detection of API security risksp. 36

7.8  Solution #8: Using security log events, counters and protocol signaling monitoringp. 38

7.9  Solution #9: Security Policy enforcement in SBAp. 39

7.10  Solution #10: Enhancement of SBA access control decision mechanismsp. 41

7.11  Solution #11: Dynamic Security Policy Enforcement Frameworkp. 43

7.12  Solution #12: Policy enforcement using NRF configuration and short access token lifetimep. 45

8  Conclusionsp. 50

A  Known API Security Risksp. 51

$  Change historyp. 54


Up   Top