Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.926  Word version:  19.1.0

Top   Top   Up   Prev   Next
1…   4…   5…   6…   A…   B…   C…   D…   E…   F…   G…   H…   I…   J…   K…   L…   M…   N…   O…   P…   Q…   R…   S…   T…   U…   V…   W…   X…   Y…

 

V  Aspects specific to the network product class MnF |R18|p. 100

V.1  Network product class description for the MnFp. 100

V.1.1  Introductionp. 100

The present document captures the network product class descriptions, threats and critical assets that have been identified in the course of the work on 3GPP security assurance specifications. The main body of the present document contains generic aspects that are believed to apply to more than one network product class, while this clause covers the aspects specific to the MnF network product class.
A 5G MnF NP implement 3GPP-defined functions from various releases. As specified in TS 28.533, a 5G MnF may support management services such as for performance management, configuration management or fault supervision services, etc.
By comparison to the Figure 4.3-1 (GNP model), a 5G MnF NP includes functions defined by 3GPP, other functions, operating system and hardware. According to clause 5.3 of TS 28.533, there are two types of MnFs: cross domain MnF and domain MnF. These MnF types differ slightly in the types of interfaces they support as explained below.
The generic interfaces supported by both MnF NP classes are interfaces for remote management, local console, towards digital portal, to central AAA, to MnF in other domain. The cross domain MnF specific interfaces are interfaces towards external consumer, towards BSS, to TN management system. The domain MnF specific interfaces are interfaces to NF in the same domain.
Up

V.1.2  Minimum set of functions defining the MnF network product classp. 100

According to TR 33.916, a network product class is a class of products that all implement a common set of 3GPP-defined functionalities. Therefore, in order to define the MnF network product class, it is necessary to define the common set of 3GPP-defined functionalities that is constitutive for a MnF. As part of the MnF network product, it is expected that the MnF contains MnF application, a set of running processes (typically more than one) executing the software package for the MnF functions and OAM functions that are specific to the MnF network product model. Functionalities specific to the MnF network product introduce additional critical assets and/or threats as described below. Related security requirements and test cases have been captured in TS 33.526.
Up

V.2  Assets and threats specific to the MnFp. 100

V.2.1  Critical assetsp. 100

In addition to the critical assets of a GNP described in clause 5.2 of the present document, the critical assets specific to the MnF to be protected are:
  • MnF Application
  • The interfaces of MnF to be protected and which are within SECAM scope: for example,
    • External Client access interface,
    • Interface between MnF and NF,
    • Interface between RAN/CN MnFs and Cross Domain MnFs,
    • Interface between MnF and AAA infrastructure, if any,
    • Service based interfaces, if any.
  • Management data: User account data, Performance data, Fault supervision data, Configuration data, Log data, etc.
Up

V.2.2  Threats related to MnF assetsp. 101

V.2.2.1  Over-Privileged Data Processesp. 101

  • Threat name: Over-Privileged Data Process.
  • Threat Category: Tampering of Data, Elevation of privilege.
  • Threat Description: If the MnF product does not evaluate the user privilege for access to data or can allow an attacker to obtain elevated priviledges, an attacker may operate the data with low privilege, this kind of mis-operation not only impacts on the MnF itself, but also the NFs that the MnF connects to.
  • Threatened Asset: Management data.
Up

V.2.2.2  Threats related to Management datap. 101

  • Threat name: Unprotected Management data during transmission.
  • Threat Category: Tampering, Information Disclosure.
  • Threat Description: Management information transported between Management Service (MnS) Producer and Consumer, if not confidentiality protected, can be subject to eavesdropping. Such information may be leaked to unauthorized parties. In addition, if there's no integrity protection for the management information, attackers can tamper with management information at will, leading to MnS consumers obtaining false management information. If there's no replay protection for the management information, attackers can insert historical legitimate data. This can lead to false network usage reported by MnF, and consequently result in incorrect management operations.
  • Threatened Asset: Management data.
Up

Up   Top   ToC