Indian Telecom Security Assurance Requirements (ITSAR) : 5G Aggregated GNB NSA Option - 3, 7 & 4
Indian Telecom Security Assurance Requirements (ITSAR) : 5G Aggregated GNB NSA Option - 3, 7 & 4
National Centre for communication Security (NCCS), with headquarters at Bengaluru was set
up in 2018 with the objective to establish and operationalize a framework of security testing
and certification within the country. Security Assurance Standards (SAS) division of NCCS is
mandated to prepare Telecom security requirements/standards called Indian Telecom
Security Assurance Requirements (ITSAR) that addresses the country specific security needs
in telecommunication landscape and notify the same.
Page 1
Document History
Page 2
Contents
A) Outline: 8
B) Scope: 8
C) Conventions: 8
Chapter 1 – Overview 9
Chapter 2 – COMMON SECURITY REQUIREMENTS 15
Section 2.1: Access and Authorization 15
2.1.1 Management Protocols Mutual Authentication 15
2.1.2 Management Traffic Protection 15
2.1.3 Role-based access control policy 15
2.1.4 User Authentication – Local/Remote 16
2.1.5 Remote login restrictions for privileged users 16
2.1.6 Authorization Policy 17
2.1.7 Unambiguous identification of the user & group accounts removal 17
Section 2.2: Authentication Attribute Management 18
2.2.1 Authentication Policy 18
2.2.2 Authentication Support – External 18
2.2.3 Protection against brute force and dictionary attacks 18
2.2.4 Enforce Strong Password 19
2.2.5 Inactive Session timeout 20
2.2.6 Password Changes 20
2.2.7 Protected Authentication feedback 21
2.2.8 Removal of predefined or default authentication attributes 21
2.2.9 Logout function 22
2.2.10 Policy regarding consecutive failed login attempts 22
Section 2.3: Software Security 23
2.3.1 Secure Update 23
2.3.2 Secure Upgrade 23
2.3.3 Source code security assurance 24
2.3.4 Known Malware and backdoor Check 24
2.3.5 No unused software 24
2.3.6 Unnecessary Services Removal 25
2.3.7 Restricting System Boot Source 25
2.3.8 Secure Time Synchronization 26
2.3.9 Restricted reachability of services 26
Page 3
2.3.10 Self Testing 26
Section 2.4: System Secure Execution Environment 27
2.4.1 No unused functions 27
2.4.2 No unsupported components 27
2.4.3 Avoidance of Unspecified mode of Access 27
Section 2.5: User Audit 28
2.5.1 Audit trail storage and protection 28
2.5.2 Audit Event Generation 28
2.5.3 Secure Log Export 33
Section 2.6: Data Protection 34
2.6.1 Cryptographic Based Secure Communication 34
2.6.2 Cryptographic Module Security Assurance 34
2.6.3 Cryptographic Algorithms implementation Security Assurance 35
2.6.4 Protecting data and information – Confidential System Internal Data 35
2.6.5. Protecting data and information in storage 35
2.6.6 Protection against Copy of Data 36
2.6.7 Protection against Data Exfiltration - Overt Channel 36
2.6.8 Protection against Data Exfiltration - Covert Channel 36
Section 2.7: Network Services 37
2.7.1 Traffic Filtering – Network Level Requirement: 37
2.7.2 Traffic Separation 37
2.7.3 Traffic Protection –Anti-Spoofing: 38
2.7.4 GTP-U Filtering 38
Section 2.8: Attack Prevention Mechanisms 38
2.8.1 Network Level and application-level DDoS 39
2.8.2 Excessive Overload Protection 39
2.8.3 Manipulated packets that are sent to an address of the network device shall not lead to
an impairment of availability. 39
Section 2.9: Vulnerability Testing Requirements 40
2.9.1 Fuzzing – Network and Application Level 40
2.9.2 Port Scanning 40
2.9.3 Vulnerability Scanning 41
Section 2.10: Operating System 41
2.10.1 Growing Content Handling 41
2.10.2 Handling of ICMP 41
2.10.3 Authenticated Privilege Escalation only 43
Page 4
2.10.4 System account identification 43
2.10.5 OS Hardening - Minimized kernel network functions. 43
2.10.6 No automatic launch of removable media 43
2.10.7 Protection from buffer overflows 44
2.10.8 External file system mount restrictions 44
2.10.9 File-system Authorization privileges 44
2.10.10 SYN Flood Prevention 45
2.10.11 Handling of IP options and extensions 45
2.10.12 Restrictions on running Scripts / Batch-processes 45
2.10.13 Restrictions on Soft-Restart 45
Section 2.11: Web Servers 46
2.11.1 HTTPS 46
2.11.2 Webserver logging 46
2.11.3 HTTPS input validation 46
2.11.4 No system privileges 47
2.11.5 No unused HTTPS methods 47
2.11.6 No unused add-ons 47
2.11.7 No compiler, interpreter, or shell via CGI or other server-side scripting 47
2.11.8 No CGI or other scripting for uploads 47
2.11.9 No execution of system commands with SSI 48
2.11.10 Access rights for web server configuration 48
2.11.11 No default content 48
2.11.12 No directory listings 48
2.11.13 Web server information in HTTPS headers 49
2.11.14 Web server information in error pages 49
2.11.15 Minimized file type mappings 49
2.11.16 Restricted file access 49
2.11.17 Execute rights exclusive for CGI/Scripting directory 50
2.11.18 HTTP User session 50
Section 2.12: Other Security requirements 51
2.12.1 No System Password Recovery 51
2.12.2 Secure System Software Revocation 51
2.12.3 Software Integrity Check –Installation 51
2.12.4 Software Integrity Check – Boot 51
2.12.5 Unused Physical and Logical Interfaces Disabling 52
2.12.6 No Default Profile 52
Page 5
Chapter 3: Specific Security Requirements – Option 3 (NR NodeB) 53
3.1 Integrity protection of RRC-signalling 53
3.2 Integrity protection of user plane data between the en-gNB and the UE 53
3.3 RRC integrity check failure 53
3.4 UP integrity check failure 53
3.5 Ciphering of RRC-signalling 54
3.6 Ciphering of user plane data between the en-gNB and the UE 54
3.7 Replay protection of user plane data between the en-gNB and the UE 54
3.8 Replay protection of RRC-signalling 55
3.9 Key refresh at the en-gNB [Sen-gNB] 55
3.10 AS protection algorithm selection in Dual Connectivity 55
3.11 Key update at the en-gNB on dual connectivity 55
3.12 Key update at the en-gNB on dual connectivity when PDCP counter is about to wrap
around. 56
3.13 Control plane data protection over X2-C interface 56
3.14 User plane data protection over X2-U interface 56
3.15 Bidding down prevention in X2 handover. 56
Chapter 4: Specific Security Requirements – Option 7 (NR NodeB) 57
4.1 Integrity protection of RRC-signalling 57
4.2 Integrity protection of user plane data between the en-gNB and the UE 57
4.3 RRC integrity check failure 57
4.4 UP integrity check failure 58
4.5 Ciphering of RRC-signalling 58
4.6 Ciphering of user plane data between the en-gNB and the UE. 58
4.7 Replay protection of user plane data between the en-gNB and the UE 58
4.8 Replay protection of RRC-signalling 59
4.9 Ciphering of user plane data based on the security policy sent by the SMF 59
4.10 Integrity of user plane data based on the security policy sent by the SMF 59
4.11 Key refresh at the en-gNB [Sen-gNB] 59
4.12 Bidding down prevention in Xn-handovers 59
4.13 AS protection algorithm selection in en gNB change 60
4.14 Control plane data & User plane data protection over Xn interface 60
4.15 Key update at the en-gNB on dual connectivity 60
4.16 Key update at the en-gNB on dual connectivity when PDCP counter is about to wrap
around. 61
Chapter 5: Specific Security Requirements – Option 4 (NR NodeB) 62
Page 6
5.1 Integrity protection of RRC-signalling 62
5.2 Integrity protection of user plane data between the gNB and the UE 62
5.3 RRC integrity check failure 62
5.4 UP integrity check failure 62
5.5 Ciphering of RRC-signalling 63
5.6 Ciphering of user plane data between the gNB and the UE 63
5.7 Replay protection of user plane data between the gNB and the UE 63
5.8 Replay protection of RRC-signalling 63
5.9 Ciphering of user plane data based on the security policy sent by the SMF 64
5.10 Integrity of user plane data based on the security policy sent by the SMF 64
5.11 Access Stratum (AS) algorithms selection 64
5.12 Key refresh at the gNB 64
5.13 Bidding down prevention in Xn-handovers 65
5.14 AS protection algorithm selection in gNB change 65
5.15 Control plane data protection over N2 interface 65
5.16 Control plane data & User plane data protection over Xn interface 65
5.17 Key update at the gNB on dual connectivity 66
5.18 UP security activation in Inactive scenario 66
5.19 Key update at the gNB on dual connectivity when SN counter is about to wrap around 66
5.20 User plane data protection over N3 interface 66
Annexure-I (Definition) 67
Annexure-II (Acronyms) 69
Annexure-III (List of Submissions) 72
Annexure-IV (References) 73
Page 7
A) Outline:
The objective of this document is to present a comprehensive, country-specific security
requirements for the aggregated gNB/en-gNB/ng-eNB – Network Elements of 5G RAN with
Non Standalone option 3, 7 and 4 as defined by 3GPP.
The specifications produced by various regional/international standardization
bodies/organizations/ associations like 3GPP, TSDSI along with the country-specific security
requirements are the basis for this document.
This document commences with a brief description of 5G RAN with various deployment
options, Core architecture and then proceeds to address the common security requirements
and specific security requirements of gNB/en-gNB/ng-eNB.
B) Scope:
This document targets on the security requirements of the 5G RAN Network Elements i.e.
aggregated gNB/en-gNB/ng-eNB with Non standalone option 3, 7 and 4 as defined by 3GPP.
C) Conventions:
1. Must or shall or required denotes the absolute requirement of a particular clause of ITSAR.
2. Must not or shall not denote absolute prohibition of a particular clause of ITSAR.
3. Should or Recommended denotes that the particular clause of ITSAR may be ignored
under justifiable circumstances but after careful examination of its implications.
4. Should not or not Recommended denotes the opposite meaning of (3) above.
Page 8
Chapter 1 – Overview
5G RAN Network: RAN (Radio Access Network) is the entry point to the core network for the
UE. It handles radio resource allocation and management to UE through Uu interface and
connects to Core network via AMF for control plane and UPF for data plane.
gNodeB: The gNB (gNodeB and its variants) in 5G (SA or NSA) network provides connectivity
between user equipment (UE) and the core network (i.e. 5GC or EPC as the case may be).
The gNodeB is the functional equivalent of a base station in a traditional cellular network and
is mainly responsible for radio communication with UEs in its coverage area/cell. It is also
responsible for Radio resource management and control of mobility, connection, signalling
and user plane security, QoS flows (an important 5G feature). It contains 3GPP-compliant of
independent Network Functions, also referred to as NR RAN protocols namely: PHY, MAC,
RLC, PDCP, RRC, SDAP.
5G Core Network: Core network is the central part of mobile network. 5G Core network
provides authentication, security, mobility management, session management services and
enables the subscribers to avail the services. These functionalities are specified as “network
Page 9
functions”. Some of the important core network functions are 1) AMF 2) SMF 3) AuSF 4) UPF
5) AF 6) NEF 7) NRF 8) PCF 9) UDM 10) UDR, etc.
The deployment of 5G does not concomitantly require both the 5G core network (5GC) and
the NG-RAN (Next-Generation Radio Access Network). This has led to different deployment
options or migration paths towards fully evolved deployment of a 5G network. As a
consequence of which, in 5G, network deployment has two models (viz.) SA (Standalone
Access) and an NSA (Non-Standalone Access). The diagrams below depict various options
possibilities and deployment migration possibilities.
Page 10
Option 1
Option 6 Option 5
Option 7
Option 3
Option 2 Option 4
5GC
UE
EPC
5G RAN Option 2 (SA) Architecture: The 'option 2' architecture is based upon a gNodeB
connected to the 5G Core Network. The gNodeB uses the New Radio (NR) air interface and
signalling protocols towards the end-user device. The gNodeB connects to an Access and
Mobility Management Function (AMF) for control plane signalling with the 5G Core Network.
The gNodeB connects to a User Plane Function (UPF) for the transfer of application data. The
gNodeB are inter-connected using the Xn interface. This section also depicts various
deployment options of 5G network such as option 3, 4, 7 and its variants.
Page 11
The following figure illustrates Option 2 (SA) architecture:
UE
NGU (N3 reference point)
Xn-Interface
MME
S-GW
S1 - MME
S1-UP
Option 3x S1- UP en-gNB
X2-C (SgNB)
eNodeB (Secondary Node)
(Master Node) X2-U (SCG)
(MCG)
UE
4G Air Interface 5GNR Air Interface
Page 12
The following figure illustrates Option 4 (NSA) architecture:
Page 13
The following figure illustrates Option 7 (NSA) architecture:
AMF
UPF
NG-C Option 7a
NG-U (NSA)
NG-U
ng-eNB gNB
Xn-C
(Master Node) (Secondary Node)
Master Cell Group Secondary Cell Group
Xn-U
(MCG) (SCG))
UE
4G NR Air Interface 5 G Air Interface
The security requirements in this document are defined for various deployment options 3, 7 & 4. Each
requirement described with applicable deployment options. Based on the options, gNB, en-gNB and
ng-eNB are used interchangeably. Network configuration with respect to NodeBs are provided here
for reference.
Option 3: ng-eNB is the master connected to 4GC. en-gNB act as a secondary node.
Option 7: ng-eNB is the master connected to 5GC. en-gNB act as a secondary node.
Option 4: gNB is the master connected to 5GC. ng-eNB act as a secondary node.
Page 14
Chapter 2 – Common Security Requirements
Page 15
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117- 16.7.0 V.1.0.0. Section 4.2.3.4.6.2]
___________________________________________________________________________
___
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.3.2.6]
___________________________________________________________________________
___
Page 16
2.1.6 Authorization Policy
Requirement:
The authorizations for accounts and applications shall be reduced to the minimum required
for the tasks they have to perform.
Authorizations to a system shall be restricted to a level in which a user can only access data
and use functions that he needs in the course of his work. Suitable authorizations shall also
be assigned for access to files that are components of the operating system or of applications
or that are generated by the same (e.g., configuration and logging files).
Alongside access to data, execution of applications and components shall also take place with
rights that are as low as possible. Applications should not be executed with administrator or
system rights.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.4.6.1]
___________________________________________________________________________
___
Page 17
Section 2.2: Authentication Attribute Management
Brute force and dictionary attacks aim to use automated guessing to ascertain authentication
attribute for user and machine accounts.
Various measures or a combination of the following measures can be taken to prevent this:
(i) Using the timer delay (this delay could be the same or increased depending on the
operator's policy for each attempt) for each newly entered password input following an
incorrect entry ("tar pit").
(ii) Blocking an account following a specified number of incorrect attempts. However, it has
to be taken into account that this solution needs a process for unlocking and an attacker can
force this to deactivate accounts and make them unusable.
(iii) Using an authentication attribute blacklist to prevent vulnerable passwords.
Page 18
(iv) Using CAPTCHA to prevent automated attempts (often used for Web applications).
In order to achieve higher security, two or more of the measures indicated above shall be
mandatorily supported by gNB/en-gNB/ng-eNB. An exception to this requirement is machine
accounts.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.4.3.3]
___________________________________________________________________________
___
Page 19
2.2.5 Inactive Session timeout
Requirement:
An OAM user interactive session shall be terminated automatically after a specified period of
inactivity. It shall be possible to configure an inactivity time-out period.
gNB/en-gNB/ng-eNB shall monitor inactive sessions of administrative login users and initiate
session locking mechanism based on user configurable timers. Unlocking the session shall be
permissible only by authentication. If the inactivity period further continues for a defined
period, Session /user ID time out must occur after this inactivity.
The timer values can be admin configurable as per requirement, normally recommended to
be between 2 to 5 minutes.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.5.2]
___________________________________________________________________________
___
Configurable.
Greater than 0.
And its minimum value shall be 3. This means that the gNB/en-gNB/ng-eNB shall store
at least the three previously set passwords. The maximum number of passwords that
the gNB/en-gNB/ng-eNB can store for each user is up to the manufacturer.
When a password is about to expire, a password expiry notification shall be provided to the
user.
Above requirements shall be applicable for all passwords used (e.g. application-level, OS-
level, etc.). An exception to this requirement is machine accounts.
gNB/en-gNB/ng-eNB to have in-built mechanism to support this requirement.
Page 20
If a central system is used for user authentication password policy, then additional assurance
shall be provided that the central system enforces the same password change policies as laid
down for the local system in this subclause.
And if a central system is not used for user authentication, the assurance on password
changes rules shall be performed on the gNB/en-gNB/ng-eNB.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.4.3.2]
Page 21
2.2.9 Logout function
Requirement:
The system shall have a function that allows a signed-in user to logout at any time. All
processes under the logged-in user ID shall be terminated on logout. The network product
shall be able to continue to operate without interactive sessions.
Only for debugging purposes, processes under a logged-in user ID may be allowed to continue
to run after detaching the interactive session.
An exception to this requirement is machine accounts.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.5.1]
___________________________________________________________________________
___
Page 22
Section 2.3: Software Security
___________________________________________________________________________
___
Page 23
2.3.3 Source code security assurance
Requirement:
a) OEM shall follow best security practices including secure coding for software development.
Source code shall be made available either at TSTL premises or at the mutually agreed location
for source code review by the designated TSTL. It may be supported by furnishing the
Software Test Document (STD).
b) Also, OEM shall submit the undertaking as below:
(i) Industry standard best practices of secure coding have been followed during the
entire software development life cycle of the gNB/en-gNB/ng-eNB Software which
includes OEM developed code, third party software and opensource code libraries
used/embedded in the gNB/en-gNB/ng-eNB.
(ii) gNB/en-gNB/ng-eNB software shall be free from CWE top 25 and OWASP top10
security weaknesses on the date of offer of product to designated TTSL for testing. For
other security weaknesses, OEM shall give mitigation plan.
(iii) The binaries for gNB/en-gNB/ng-eNB and upgrades/updates thereafter generated
from the source code are free from all known security vulnerabilities stated in bullet
(ii) above.
___________________________________________________________________________
___
Page 24
___________________________________________________________________________
___
Any other protocols, services that are vulnerable are also to be permanently disabled.
Full documentation of required protocols and services (communication matrix) of the
gNB/en-gNB/ng-eNB and their purpose needs to be provided by the OEM as prerequisite for
the test case.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.3.2.1]
___________________________________________________________________________
___
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section- 4.2.3.3.2]
___________________________________________________________________________
___
Page 25
2.3.8 Secure Time Synchronization
Requirement:
gNB/en-gNB/ng-eNB shall use reliable time and date information provided through NTP/PTP
server. gNB/en-gNB/ng-eNB shall establish secure communication channel with the NTP/PTP
server.
gNB/en-gNB/ng-eNB shall establish secure communication channel strictly using Secure
cryptographic controls prescribed in Table1 of the latest document “Cryptographic Controls
for Indian Telecom Security Assurance Requirements (ITSAR)” with NTP/PTP server.
gNB/en-gNB/ng-eNB shall generate audit logs for all changes to time settings.
___________________________________________________________________________
___
Page 26
Section 2.4: System Secure Execution Environment
The list of hardware and software functions installed in the system shall match with the ones
that have been mentioned and deemed necessary for the operation of the gNB/en-gNB/ng-
eNB.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.3.2.4]
Page 27
Section 2.5: User Audit
___________________________________________________________________________
___
Username
Timestamp
Username,
Page 28
Source (IP address) if remote
access
Administrator username,
Administered account,
Timestamp
Value exceeded,
Value reached
Timestamp
Change made
Timestamp
Configuration change Changes to configuration of the
network device Outcome of event (Success or
(Mandatory)
failure)
Username
Timestamp
Interface status change Change to the status of interfaces on Interface name and type
the network device/gNB/en- Status (shutdown, down
(Mandatory) gNB/ng-eNB (e.g., shutdown) missing link, etc.)
Page 29
Outcome of event (Success or
failure)
Timestamp
Administrator username,
Administered account,
Timestamp.
Administrator username
Administered account
Timestamp
Service identity
Timestamp
Type of event
User identity
Attempt to initiate manual update,
Timestamp
Secure Update (Optional) initiation of update, completion of
update Outcome of event (Success or
failure)
Page 30
Activity performed
Timestamp
User identity
Timestamp
Any attempts at unlocking of an
interactive session, termination of a Outcome of event (Success or
Session unlocking/
remote session by the session failure)
termination (Optional)
locking mechanism, termination of
an interactive session. Subject identity
Activity performed
Type of event
Timestamp
Timestamp
Audit data changes Changes to audit data including Type of event (audit data
(Optional) deletion of audit data deletion, audit data
modification)
Page 31
Outcome of event (Success or
failure)
Subject identity
User identity
User identity
Origin of attempt
All use of Identification and (IP address)
User Login (Mandatory)
authentication mechanisms.
Outcome of event (Success or
failure)
Timestamp
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.6.1]
Page 32
2.5.3 Secure Log Export
Requirement:
(i) (a) The gNB/en-gNB/ng-eNB shall support forwarding of security event logging data to
an external system by push or pull mechanism.
(b) Log functions should support secure uploading of log files to a central location or
to a system external for the gNB/en-gNB/ng-eNB.
(ii) gNB/en-gNB/ng-eNB shall be able to store the generated audit data itself may be with
limitations.
(iii) gNB/en-gNB/ng-eNB shall alert administrator when its security log buffer reaches
configured threshold limit.
(iv) In the absence of external system (due to loss of connectivity or due to node failure
or due to any other reasons), gNB/en-gNB/ng-eNB shall have mechanism to store
audit data locally. gNB/en-gNB/ng-eNB shall have sufficient memory to store at least
five days logs allocated for this purpose. OEM shall submit justification document for
sufficiency of local storage requirement.
(v) Secure Log export shall comply the secure cryptographic controls prescribed in Table1
of the latest document “Cryptographic Controls for Indian Telecom Security Assurance
Requirements (ITSAR)” only.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.6.2]
Page 33
Section 2.6: Data Protection
___________________________________________________________________________
___
OEM shall also submit cryptographic module testing document and the detailed self / Lab test
report along with test results for scrutiny.
___________________________________________________________________________
___
Page 34
2.6.3 Cryptographic Algorithms implementation Security Assurance
Requirement:
Cryptographic algorithm implemented inside the Crypto module of gNB/en-gNB/ng-eNB shall
be in compliance with the respective FIPS standards (for the specific crypto algorithm).
Till further instructions, this clause will be considered ‘complied’ by submission of an
undertaking by the OEM in specified format along with self-certified test reports.
An undertaking is to be submitted by the OEM mentioning that “Cryptographic algorithm
implemented inside the Crypto module of gNB/en-gNB/ng-eNB is in compliance with the
respective FIPS standards (for the specific crypto algorithm embedded inside the gNB)”
OEM shall submit cryptographic algorithm implementation testing document and the
detailed self / Lab test report along with test results for scrutiny.
___________________________________________________________________________
___
Page 35
(iii) Stored files in the gNB/en-gNB/ng-eNB: Shall be protected against
manipulation strictly using the NCCS approved Secure cryptographic controls
prescribed in Table1 of the latest document “Cryptographic Controls for Indian
Telecom Security Assurance Requirements (ITSAR)” only.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0 Section 4.2.3.2.3]
___________________________________________________________________________
___
Page 36
Section 2.7: Network Services
___________________________________________________________________________
___
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0 Section 4.2.6.2.1]
___________________________________________________________________________
___
Page 37
2.7.3 Traffic Protection –Anti-Spoofing:
Requirement:
gNB/en-gNB/ng-eNB shall not process IP Packets if their source address is not reachable via
the incoming interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides
this function.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.3.3.1.1]
___________________________________________________________________________
___
- The gNB’s product documentation states that the capability is not supported and that
the gNB/en-gNB/ng-eNB needs to be deployed together with a separate entity which
provides the capability described above.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.6.2.4]
Page 38
2.8.1 Network Level and application-level DDoS
Requirement:
gNB/en-gNB/ng-eNB shall have protection mechanism against Network level and Application-
level DDoS attacks.
gNB/en-gNB/ng-eNB shall provide security measures to deal with overload situations which
may occur as a result of a denial-of-service attack or during periods of increased traffic. In
particular, partial or complete impairment of system availability shall be avoided.
Potential protective measures include but not limited to the following:
- Restricting of available RAM per application
- Restricting of maximum sessions for a Web application
- Defining the maximum size of a dataset
- Restricting CPU resources per process
- Prioritizing processes
- Limiting of amount or size of transactions of a user or from an IP address in a specific
time range
- Limiting of amount or size of transactions to an IP address/Port Address in a specific
time range
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.3.3.1]
___________________________________________________________________________
___
___________________________________________________________________________
___
2.8.3 Manipulated packets that are sent to an address of the network device shall not lead
to an impairment of availability.
Requirement:
Page 39
gNB/en-gNB/ng-eNB shall not be affected in its availability or robustness by incoming packets
from other network elements that are manipulated or differing the norm. This means that
appropriate packets shall be detected as invalid and be discarded. The process shall not be
affecting the performance of the gNB/en-gNB/ng-eNB. This robustness shall be just as
effective for a great mass of invalid packets as for individual or a small number of packets.
Examples of such packets are:
- Mass-produced TCP packets with a set SYN flag to produce half-open TCP connections
(SYN flooding attack).
- Packets with the same IP sender address and IP recipient address (Land attack).
- Mass-produced ICMP packets with the broadcast address of a network as target
address (Smurf attack).
- Fragmented IP packets with overlapping offset fields (Teardrop attack).
- ICMP packets that are larger than the maximum permitted size (65,535 Bytes) of IPv4
packets (Ping-of-death attack).
- Uncorrelated reply to packets (i.e., packets which cannot be correlated to any
request).
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.2.6.2.2]
Requirement:
Page 40
2.9.3 Vulnerability Scanning
Requirement:
The vulnerabilities found during the Vulnerability Scanning/Assessment process shall be
remediated as below. For other than critical vulnerabilities, OEM shall provide remediation.
.
Sl. No CVSS Score Severity Remediation
1 9.0 – 10.0 Critical To be patched immediately
2 7.0 – 8.9 High To be patched within a month
3 4.0 – 6.9 Medium To be patched within 3 months
4 0.1 – 3.9 Low To be patched within a year
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0 section 4.4.3]
___________________________________________________________________________
__
Page 41
0 128 Echo Reply Permitted N/A
(optional for
ng-eNB)
Page 42
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section 4.2.4.1.1.2]
___________________________________________________________________________
___
Page 43
gNB/en-gNB/ng-eNB shall not automatically launch any application when a removable media
device is connected.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section - 4.3.3.1.3]
___________________________________________________________________________
___
OS-level restrictions shall apply to normal users against mount / use of removable media
devices (e.g., USB drive, CD ROM etc.) for data transfer.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0 Section - 4.3.3.1.6]
___________________________________________________________________________
___
Page 44
2.10.10 SYN Flood Prevention
Requirement:
gNB/en-gNB/ng-eNB shall support a mechanism to prevent Syn Flood attacks. This feature
shall be enabled by default.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. Section - 4.3.3.1.4]
___________________________________________________________________________
___
Page 45
Section 2.11: Web Servers
___________________________________________________________________________
___
This entire section of the security requirements is applicable if the gNB/en-gNB/ng-eNB
supports web management interface.
2.11.1 HTTPS
Requirement:
The communication between Web client and Web server shall be protected strictly using the
Secure cryptographic controls prescribed in Table1 of the latest document “Cryptographic
Controls For Indian Telecom Security Assurance Requirements ( ITSAR )” only
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.2.5.1]
___________________________________________________________________________
___
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.2.5.2]
___________________________________________________________________________
___
2.11.3 HTTPS input validation
Requirement:
The gNB/en-gNB/ng-eNB shall have a mechanism in place to ensure that web application
inputs are not vulnerable to command injection or cross-site scripting attacks.
gNB/en-gNB/ng-eNB shall validate, filter, escape, and encode user-controllable input before
it is placed in output that is used as a web page that is served to other users.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.2.5.4]
Page 46
___________________________________________________________________________
___
Page 47
If CGI or other scripting technology is used, the associated CGI/script directory shall not be used
for uploads.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.3.4.6]
___________________________________________________________________________
___
Page 48
2.11.13 Web server information in HTTPS headers
Requirement:
The HTTPS header shall not include information on the version of the gNB/en-gNB/ng-eNB
web server and the modules/add-ons used.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.3.4.11]
___________________________________________________________________________
___
In particular, the gNB/en-gNB/ng-eNB web server shall not be able to access files which are
not meant to be delivered.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0 section 4.3.4.14]
Page 49
___________________________________________________________________________
___
Page 50
12.The gNB/en-gNB/ng-eNB shall be configured to only accept server generated session ID.
[Reference: TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0. section 4.2.5.3]
Once the gNB/en-gNB/ng-eNB software image is legally updated/upgraded with New Software
Image, it should not be possible to roll back to a previous software image.
In case roll back is essential, it shall be done only by the administrator with appropriate audit
trail log created.
gNB/en-gNB/ng-eNB shall support a well-established control mechanism for rolling back to
previous software image.
___________________________________________________________________________
___
___________________________________________________________________________
___
Page 51
The gNB/en-gNB/ng-eNB shall verify the integrity of a software component by comparing the
result of a measurement of the component, typically a standard cryptographic hash
generated strictly using the Secure cryptographic controls prescribed in Table1 of the latest
document “Cryptographic Controls for Indian Telecom Security Assurance Requirements
(ITSAR)” to the expected reference value.
___________________________________________________________________________
___
gNB/en-gNB/ng-eNB shall support the mechanism to verify both the physical and logical
interfaces exist in the product.
Physical and logical accessible interfaces (except console interface) which are not under use
shall be disabled so that they remain inactive even in the event of reboot.
___________________________________________________________________________
___
___________________________________________________________________________
___
Page 52
Chapter 3: Specific Security Requirements – Option 3 (NR NodeB)
___________________________________________________________________________
___
3.2 Integrity protection of user plane data between the en-gNB and the UE
Requirement:
The en-gNB shall support integrity protection of user plane data packets over the NG RAN air
interface through eNB.
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
___________________________________________________________________________
___
The RRC integrity checks shall be performed both in the ME and the en-gNB. In case failed
integrity check (i.e., faulty or missing MAC-I) is detected after the start of integrity protection,
the concerned message shall be discarded. This can happen on the en-gNB side or on the ME
side.
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section 7.4 and
E3.10.1]
___________________________________________________________________________
___
Page 53
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section 7.3 and
E3.10.1]
___________________________________________________________________________
___
3.6 Ciphering of user plane data between the en-gNB and the UE
Requirement:
The en-gNB shall provide standard ciphering of user plane data packets between the en-gNB
and the UE on NG RAN air interface.
Secure cryptographic controls prescribed for AES in Table 1 of the latest document
“Cryptographic Controls for Indian Telecom Security Assurance Requirements (ITSAR)” or
SNOW3G-128 or ZUC-128 shall be used for en-gNB management and maintenance.
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
___________________________________________________________________________
___
3.7 Replay protection of user plane data between the en-gNB and the UE
Requirement:
The gNB shall support replay protection of user plane data between the gNB and the UE.
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E1.3 and
E3.10.1]
___________________________________________________________________________
___
Page 54
3.8 Replay protection of RRC-signalling
Requirement:
The gNB shall support integrity protection and replay protection of RRC-signalling.
[Reference: TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E1.3 and
E3.10.1]
___________________________________________________________________________
___
Page 55
If the Mng-eNB receives a request for S-KgNB update from the Sen-gNB or decides on its own
to perform S-KgNB update, the eNB shall compute a fresh S-KgNB and increment the SCG
Counter. Then the Mng-eNB shall perform a Sen-gNB Modification procedure to deliver the
fresh S-KgNB to the Sen-gNB. The Mng-eNB shall provide the value of the SCG Counter used
in the derivation of the S-KgNB to the UE in an integrity protected RRC procedure. The UE
shall derive the S-KgNB. Whenever the UE or Sen-gNB start using a fresh S-KgNB, they shall
re-calculate KSgNB-UP-enc, KSgNB-RRC-int and KSgNB-RRC-enc from the fresh S-KgNB.
[Reference: TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.5.2]
3.12 Key update at the en-gNB on dual connectivity when PDCP counter is about to wrap
around.
Requirement:
The en-gNB shall request the Mng-eNB to update the S-KgNB over the X2-C interface when
uplink or downlink PDCP counts are about to wrap around.
[Reference: TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.5.1]
Page 56
During X2 handover, the DRB connection between UE and en-gNB/ng-eNB shall be released
and the AS security context and en-gNB and UE shall be deleted.
[Reference: TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.6]
4.2 Integrity protection of user plane data between the en-gNB and the UE
Requirement:
The en-gNB shall support integrity protection of user plane data packets over the NG RAN air
interface.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.2,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.3, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
Page 57
4.4 UP integrity check failure
Requirement:
The User Plane integrity check shall be performed both in UE and en-gNB. If the en-gNB or
the UE receives a PDCP PDU which fails integrity check with faulty or missing MAC-I after the
start of integrity protection, the PDU shall be discarded.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.5,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 6.6.4, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
4.6 Ciphering of user plane data between the en-gNB and the UE.
Requirement:
The en-gNB shall provide standard ciphering of user plane data packets between the en-gNB
and the UE on NG RAN air interface.
Secure cryptographic controls prescribed for AES in Table 1 of the latest document
“Cryptographic Controls for Indian Telecom Security Assurance Requirements (ITSAR)” or
SNOW3G-128 or ZUC-128 shall be used for gNB management and maintenance.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.7,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.2, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
4.7 Replay protection of user plane data between the en-gNB and the UE
Requirement:
The en-gNB shall support replay protection of user plane data between the en-gNB and the
UE
Page 58
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.8,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.3, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
4.9 Ciphering of user plane data based on the security policy sent by the SMF
Requirement:
The en-gNB shall activate ciphering of user plane data based on the security policy sent by
the SMF.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.10, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 5.3.2]
4.10 Integrity of user plane data based on the security policy sent by the SMF
Requirement:
The en-gNB shall provide integrity protection of user plane data based on the security policy
sent by the SMF.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 section 4.2.2.1.11, TEC
25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 5.3.2]
Page 59
During Xn handover the DRB connection between UE and en-gNB shall be released and the
AS security context at en-gNB and UE shall be deleted.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.14, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 6.7.3.1, TEC
25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.6]
4.14 Control plane data & User plane data protection over Xn interface
Requirement:
The transport of control plane data and user plane data over Xn shall be confidentiality,
integrity & replay protected.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.17, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 Sections 9.4, TEC
25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
Page 60
shall derive the S-KgNB. Whenever the UE or Sen-gNB start using a fresh S-KgNB, they shall
re-calculate KSgNB-UP-enc, KSgNB-RRC-int and KSgNB-RRC-enc from the fresh S-KgNB.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.18, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 Sections 6.10.2.1,
6.10.2.2.1, TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.5.2]
4.16 Key update at the en-gNB on dual connectivity when PDCP counter is about to wrap
around.
Requirement:
The en-gNB shall request the Mng-eNB to update the S-KgNB over the X2-C interface when
uplink or downlink PDCP counts are about to wrap around.
[Reference: TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.5.1]
Page 61
Chapter 5: Specific Security Requirements – Option 4 (NR NodeB)
5.2 Integrity protection of user plane data between the gNB and the UE
Requirement:
The gNB shall support integrity protection of user plane data packets over the NG RAN air
interface.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.2,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.3, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
Page 62
5.5 Ciphering of RRC-signalling
Requirement:
The gNB shall support standard ciphering of RRC-signalling over the NG RAN air interface.
Secure cryptographic controls prescribed for AES in Table 1 of the latest document
“Cryptographic Controls for Indian Telecom Security Assurance Requirements (ITSAR)” or
SNOW3G-128 or ZUC-128 shall be used for gNB management and maintenance.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.6,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.2, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
5.6 Ciphering of user plane data between the gNB and the UE
Requirement:
The gNB shall provide standard ciphering of user plane data packets between the gNB and
the UE on NG RAN air interface.
Secure cryptographic controls prescribed for AES in Table 1 of the latest document
“Cryptographic Controls for Indian Telecom Security Assurance Requirements (ITSAR)” or
SNOW3G-128 or ZUC-128 shall be used for gNB management and maintenance.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.7,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.2, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
5.7 Replay protection of user plane data between the gNB and the UE
Requirement:
The gNB shall support replay protection of user plane data between the gNB and the UE.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section 4.2.2.1.8,
TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 5.3.3, TEC 25875:2022 –
TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
Page 63
5.9 Ciphering of user plane data based on the security policy sent by the SMF
Requirement:
The gNB shall activate ciphering of user plane data based on the security policy sent by the
SMF.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.10, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 5.3.2]
5.10 Integrity of user plane data based on the security policy sent by the SMF
Requirement:
The gNB shall provide integrity protection of user plane data based on the security policy
sent by the SMF.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 section 4.2.2.1.11, TEC
25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 5.3.2]
Page 64
5.13 Bidding down prevention in Xn-handovers
Requirement:
In the Path-Switch message, the target gNB shall send the UE’s 5G security capabilities, UP
security policy with corresponding PDU session ID received from the source gNB to the AMF.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.14, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 section 6.7.3.1, TEC
25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.6]
5.16 Control plane data & User plane data protection over Xn interface
Requirement:
The transport of control plane data and user plane data over Xn shall be confidentiality,
integrity & replay protected.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.17, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501 16.9.0 V1.0.0 Sections 9.4, TEC
25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.10.1]
Page 65
5.17 Key update at the gNB on dual connectivity
Requirement:
When executing the procedure for adding subsequent radio bearer(s) to the same SN
(Secondary Node i.e. ng-eNB), the MN (Master Node i.e. gNB) shall, for each new radio bearer,
assign a radio bearer identity that has not previously been used since the last KSN change. If
the MN cannot allocate an unused radio bearer identity for a new radio bearer in the SN, due
to radio bearer identity space exhaustion, the MN shall increment the SN Counter and
compute a fresh KSN, and then shall perform a SN Modification procedure to update the KSN.
The SN shall request the Master Node to update the KSN over the Xn-C, when uplink and/or
downlink PDCP COUNTs are about to wrap around for any of the SCG DRBs or SCG SRB.
[Reference: TEC 25879:2022 – TSDSI STD T1. 3GPP TS 33.511 16.7.0 V1.0.0 section
4.2.2.1.18, TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 Sections 6.10.2.1,
6.10.2.2.1, TEC 25875:2022 – TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 section E3.5.2]
5.19 Key update at the gNB on dual connectivity when SN counter is about to wrap around
Requirement:
The MN shall refresh the root key of the 5G AS security context associated with the SN
Counter before the SN Counter wraps around. When the root key is refreshed, the SN
Counter is reset to ‘0’.
[Reference: TEC 25878:2022 – TSDSI STD T1.3GPP 33.501-16.9.0 V1.0.0 section 6.10.3.1]
Page 66
Annexure-I (Definition)
1. Aggregated gNB means monolithic gNB (NR Node B) which contains DU & CU together.
2. DDoS: A distributed denial-of-service attack that renders the victim un-usable by the
external environment.
3. Downlink: Unidirectional radio link for the transmission of signals from a RAN access
point to a UE. Also, in general the direction from Network to UE.
4. eNodeB: a Base station which connects UE to 4G Core Network.
5. en-gNB: evolved next generation gNB which connects to 5G Core network and 4G core
network and eNB in case of dual connectivity.
6. gNodeB: an NR Base Station which connects UE to 5G Core Network.
7. Medium Access Control: A sub-layer of radio interface layer 2 providing
unacknowledged data transfer service on logical channels and access to transport
channels.
8. Mobility: The ability for the user to communicate whilst moving independent of
location.
9. Network Element: A discrete telecommunications entity which can be managed over
a specific interface e.g., the gNB.
10. ng-eNB: a base station which connects UE to 4G core network and 5G Core network
and gNB in case of dual connectivity.
11. NG-RAN: It is the radio access network introduced for accessing 5G.
12. NG-U interface: New generation user plane interface between eNB and 5G Core
network
13. Non-Access Stratum: Protocols between UE and the core network that are not
terminated in the RAN.
14. Original Equipment Manufacturer (OEM): manufacturer of communication and its
related products under whose brand, the products are sold or proposed to be sold to
operators in the country.
15. Protocol: A formal set of procedures that are adopted to ensure communication
between two or more functions within the same layer of a hierarchy of functions.
16. Radio link: A “radio link” is a logical association between single User Equipment and a
single RAN access point. Its physical realization comprises one or more radio bearer
transmissions.
17. Radio Resource Control: A sublayer of radio interface Layer 3 existing in the control
plane only which provides information transfer service to the non-access stratum. RRC
is responsible for controlling the configuration of radio interface Layers 1 and 2.
18. Remote Access: The access which is not Local access. This includes access from the
EMS (Element Management System) network, and access that originates or passes
through the internet.
Page 67
19. RRC Connection: A point-to-point bi-directional connection between RRC peer entities
on the UE and the UTRAN sides, respectively. A UE has either zero or one RRC
connection.
20. Security: The ability to prevent fraud as well as the protection of information
availability, integrity, and confidentiality.
21. Transmission or Transport is the transfer of information from one entity (transmitter)
to another (receiver) via a communication path.
22. Uplink: An “uplink” is a unidirectional radio link for the transmission of signals from a
UE to a base station.
23. User Equipment: A device allowing a user access to network services. The interface
between the UE and the network is the radio interface. A User Equipment can be
subdivided into a number of domains, the domains being separated by reference
points.
Page 68
Annexure-II (Acronyms)
5GC - 5G Core Network
5GS - 5G System
DN - Data Network
DRB - Data Radio Bearer
DTLS - Datagram Transport Layer Security
EPC - Evolved Packet Core
EPS - Evolved Packet System
eNB - Evolved Node B (Fourth Generation Base Station)
en-gNB - Enhanced 5G Next Generation Base station
gNB - 5G Next Generation base station
GTP - GPRS Tunnelling Protocol
GTP-C - GPRS Tunnelling Protocol Control Plane
GTP-U - GPRS Tunnelling Protocol User Plane
GUI - Graphical User Interface
HTTP - Hypertext Transfer Protocol
HTTPS - Hypertext Transfer Protocol Secure
ICMP - Internet Control Message Protocol
IMS - IP Multimedia Subsystem
Page 69
IP - Internet Protocol
ISO-OSI - International organization of Standardization – Open System
Interconnection
MAC-I - Message Authentication Code - Integrity
ME - Mobile Equipment
MN - Master Node
Mng-eNB - Master ng-eNB
MR - Multi Radio
NAS - Non-Access Stratum
NEF - Network Exposure Function
NF - Network Function
NG - Next Generation
ng-eNB - Next Generation e-NodeB
NG-RAN - Next Generation Radio Access Network
NRF - Network Repository Function
O&M - Operations and Maintenance
OAM - Operations, Administration, Maintenance
OS - Operating System
PCF - Policy Control Function
PDCP - Packet Data Convergence Protocol
Page 70
Sen-gNB - Secondary en-gNB
SMF - Session Management Function
SN - Secondary Node
SRB - Signalling Radio Bearer
TSTL - Telecom Security Testing Laboratory
UDM - Unified Data Management
UDR - Unified Data Repository
UE - User Equipment
UL - Uplink
UP - User Plane
Page 71
Annexure-III (List of Submissions)
1. Source Code Security Assurance (against test case 2.3.3)
2. Known Malware and backdoor Check (against test case 2.3.4)
3. No unused Software (against test case 2.3.5)
4. Unnecessary Services Removal (against test case 2.3.6)
5. No Unused Functions (against test case 2.4.1)
6. Avoidance of Unspecified mode of Access (against test case 2.4.3)
7. Cryptographic Based Secure Communication (against test case 2.6.1)
8. Cryptographic Module Security Assurance (against test case2.6.2)
9. Cryptographic Algorithms implementation Security Assurance (against test case
2.6.3)
Page 72
Annexure-IV (References)
1. TEC 25848:2022 - TEC 25848:2022 - TSDSI STD T1.3GPP 33.117-16.7.0 V.1.0.0:
“Catalogue of General Security Assurance Requirements”.
2. TEC 25879:2022 - TSDSI STD T1.3GPP 33.511-16.7.0 V.1.0.0 “Security Assurance
Specification (SCAS) for the next generation Node B (gNodeB) network product class”.
3. TEC 25878:2022 - TSDSI STD T1.3GPP 33.501-16.9.0 V.1.0.0 Security architecture and
procedures for 5G System”.
4. TEC 25875:2022 - TSDSI STD T1.3GPP 33.401-16.3.0 V1.0.0 3GPP System Architecture
Evolution (SAE); Security architecture
-End of Document-
Page 73