L.4 Exposure of time synchronisation
33.5013GPPRelease 18Security architecture and procedures for 5G SystemTS
Any AF that has knowledge of deterministic application requirements is able to request TSC services from the 5GS by interfacing with NEF, and as authorized, can be notified of pertinent network events. The security solution as described in clause 12 shall apply.
Annex M (normative):
Security for Integrated Access and Backhaul (IAB)