L.4 Exposure of time synchronisation

33.5013GPPRelease 18Security architecture and procedures for 5G SystemTS

Any AF that has knowledge of deterministic application requirements is able to request TSC services from the 5GS by interfacing with NEF, and as authorized, can be notified of pertinent network events. The security solution as described in clause 12 shall apply.

Annex M (normative):
Security for Integrated Access and Backhaul (IAB)