Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.805  Word version:  12.0.0

Top   Top   Up   Prev   Next
1…   4…   A…

 

4  3GPP network products and threat modelp. 11

4.1  Considerations on definition of the term "network products"p. 11

4.2  Sample 3GPP network products for the methodology studyp. 15

4.3  Threat and attacker model for the Security Assurance studyp. 16

4.4  3GPP network products subject to Security Assurance Specifications (SCAS)p. 17

4.5  Roles and processes applicable to all methodologiesp. 18

5  Proposed methodologiesp. 25

5.1  Methodology 1: Common Criteria (CC)p. 25

5.2  Methodology 2p. 36

5.2.1  Overviewp. 36

5.2.2  Methodology buildingp. 40

5.2.3  Vendors and third-party laboratories accreditationp. 53

5.2.4  Evaluation and evaluation reportp. 58

5.2.5  Self-declarationp. 67

5.2.6  Operator security acceptance decisionp. 67

5.2.7  Administration of the accreditations and dispute resolutionp. 67

5.2.8  Summary of SECAM deliverablesp. 68

5.2.9  General considerationsp. 69

6  Criteria for the evaluation of the methodologiesp. 70

7  Comparison of Proposed Methodologiesp. 71

8  Conclusionsp. 72


Up   Top   ToC