4 MnF-specific security requirements and related test cases
33.5263GPPRelease 18Security Assurance Specification for Management Function (MnF)TS
4.1 Introduction
4.2 MnF-specific security functional adaptations of requirements and related test cases
4.2.1 Introduction
The present clause contains MnF-specific security functional adaptations of requirements and related test cases.
4.2.2 Security functional requirements on the MnF deriving from 3GPP specifications and related test cases
The requirement and test case in TS 33.117 [3] clause 4.2.2.2.2 apply to the MnF network product class.
The test case can also address the MnF-specific threat "Unprotected Management data during transmission".
Editor’s Note: The exact reference for the threat is tbc and this may depend on the work of SA5 on MSAC in relation to TLS.
4.2.3 Technical Baseline
4.2.3.1 Introduction
The present clause provides baseline technical requirements.
4.2.3.2 Protecting data and information
4.2.3.2.1 Protecting data and information – general
There are no MnF-specific additions to clause 4.2.3.2.1 of TS 33.117 [3].
4.2.3.2.2 Protecting data and information – unauthorized viewing
There are no MnF-specific additions to clause 4.2.3.2.2 of TS 33.117 [3].
4.2.3.2.3 Protecting data and information in storage
There are no MnF-specific additions to clause 4.2.3.2.3 of TS 33.117 [3].
4.2.3.2.4 Protecting data and information in transfer
There are no MnF-specific additions to clause 4.2.3.2.4 of TS 33.117 [3].
4.2.3.2.5 Logging access to personal data
There are no MnF-specific additions to clause 4.2.3.2.5 of TS 33.117 [3].
.
4.2.3.3 Protecting availability and integrity
4.2.3.3.1 System handling during overload situations
There are no MnF-specific additions to clause 4.2.3.3.1 of TS 33.117 [3].
.
4.2.3.3.2 Boot from intended memory devices only
There are no MnF-specific additions to clause 4.2.3.3.2 of TS 33.117 [3].
4.2.3.3.3 System handling during excessive overload situations
There are no MnF-specific additions to clause 4.2.3.3.3 of TS 33.117 [3].
.
4.2.3.3.4 System robustness against unexpected input.
There are no MnF-specific additions to clause 4.2.3.3.4 of TS 33.117 [3].
4.2.3.3.5 Network Product software package integrity
There are no MnF-specific additions to clause 4.2.3.3.5 of TS 33.117 [3].
4.2.3.4 Authentication and authorization
4.2.3.4.1 Authentication policy
4.2.3.4.1.1 System functions shall not be used without successful authentication and authorization.
There are no MnF-specific additions to clause 4.2.3.4.1.1 of TS 33.117 [3].
4.2.3.4.1.2 Accounts shall allow unambiguous identification of the user.
There are no MnF-specific additions to clause 4.2.3.4.1.2 of TS 33.117 [3].
4.2.3.4.2 Authentication attributes
4.2.3.4.2.1 Account protection by at least one authentication attribute.
There are no MnF-specific additions to clause 4.2.3.4.2.1 of TS 33.117 [3].
4.2.3.4.2.2 Predefined accounts shall be deleted or disabled.
There are no MnF-specific additions to clause 4.2.3.4.2.2 of TS 33.117 [3].
4.2.3.4.2.3 Predefined or default authentication attributes shall be deleted or disabled.
There are no MnF-specific additions to clause 4.2.3.4.2.3 of TS 33.117 [3].
4.2.3.4.3 Password policy
4.2.3.4.3.1 Password Structure
There are no MnF-specific additions to clause 4.2.3.4.3.1 of TS 33.117 [3]..
4.2.3.4.3.2 Password changes
There are no MnF-specific additions to clause 4.2.3.4.3.2 of TS 33.117 [3].
4.2.3.4.3.3 Protection against brute force and dictionary attacks
There are no MnF-specific additions to clause 4.2.3.4.3.3 of TS 33.117 [3].
4.2.3.4.3.4 Hiding password display
There are no MnF-specific additions to clause 4.2.3.4.3.4 of TS 33.117 [3].
4.2.3.4.4 Specific Authentication use cases
4.2.3.4.4.1 Network Product Management and Maintenance interfaces
There are no MnF-specific additions to clause 4.2.4.4.1 of TS 33.117 [3].
4.2.3.4.5 Policy regarding consecutive failed login attempts
There are no MnF-specific additions to clause 4.2.3.4.5 of TS 33.117 [3].
4.2.3.4.6 Authorization and access control
4.2.3.4.6.1 Authorization policy
There are no MnF-specific additions to clause 4.2.3.4.6.1 of TS 33.117 [3].
The test case can also address the MnF-specific threat "Over-privileged data process".
4.2.3.4.6.2 Role-based access control
There are no MnF-specific additions to clause 4.2.3.4.6.2 of TS 33.117 [3].
Editor’s Note: This may depend on SA5 work on MSAC.
4.2.3.5 Protecting sessions
4.2.3.5.1 Protecting sessions – logout function
There are no MnF-specific additions to clause 4.2.3.5.1 of TS 33.117 [3].
4.2.3.5.2 Protecting sessions – Inactivity timeout
There are no MnF-specific additions to clause 4.2.3.5.2 of TS 33.117 [3].
4.2.3.6 Logging
4.2.3.6.1 Security event logging
There are no MnF-specific additions to clause 4.2.3.6.1 of TS 33.117 [3].
4.2.3.6.2 Log transfer to centralized storage
There are no MnF-specific additions to clause 4.2.3.6.2 of TS 33.117 [3].
4.2.3.6.3 Protection of security event log files
There are no MnF-specific additions to clause 4.2.3.6.3 of TS 33.117 [3].
4.2.4 Operating systems
There are no MnF-specific additions to clause 4.2.4 of TS 33.117 [3].
4.2.5 Web servers
4.2.5.1 HTTPS
There are no MnF-specific additions to clause 4.2.5.1 of TS 33.117 [3].
4.2.5.2 Logging
There are no MnF-specific additions to clause 4.2.5.2 of TS 33.117 [3].
4.2.5.3 HTTP User sessions
For the requirement defined in clause 4.2.5.3 of TS 33.117[3]:
– The requirement "In addition to the Session Idle Timeout (see clause 4.2.3.5.2 of TS 33.117 [3]), the Network Product shall automatically terminate sessions after a configurable maximum lifetime. This maximum lifetime defines the maximum session span. When the maximum lifetime expires, the session shall be closed, the session ID shall be deleted and the user shall be forced to (re)authenticate in the web application and to establish a new session. The default value for this maximum lifetime shall be set to 8 hours." may not be applicable to the MnF product.
4.2.5.4 HTTP input validation
There are no MnF-specific additions to clause 4.2.5.4 of TS 33.117 [3].
4.2.6 Network devices
4.2.6.1 Protection of data and information
There are no MnF-specific additions to clause 4.2.6.2.1 of TS 33.117 [3].
4.2.6.2 Protecting availability and integrity
4.2.6.2.1 Packet filtering
There are no MnF-specific additions to clause 4.2.6.2.1 of TS 33.117 [3].
4.2.6.2.2 Interface robustness requirements
There are no MnF-specific additions to clause 4.2.6.2.2 of TS 33.117 [3].
4.2.6.2.3 GTP-C Filtering
The requirement and test case in clause 4.2.6.2.3 of TS 33.117 [3] is not applicable to MnF.
4.2.6.2.4 GTP-U Filtering
The requirement and test case in clause 4.2.6.2.4 of TS 33.117 [3] is not applicable to MnF.
4.3 MnF-specific adaptations of hardening requirements and related test cases.
4.3.1 Introduction
The present clause contains MnF-specific adaptations of hardening requirements and related test cases.
4.3.2 Technical Baseline
There are no MnF-specific additions to clause 4.3.2 of TS 33.117 [3].
4.3.3 Operating Systems
4.3.3.1 General operating system requirements and test cases
4.3.3.1.1 IP-Source address spoofing mitigation
There are no MnF-specific additions to clause 4.3.3.1.1 of TS 33.117 [3].
4.3.3.1.2 Minimized kernel network functions
There are no MnF-specific additions to clause 4.3.3.1.2 of TS 33.117 [3].
4.3.3.1.3 No automatic launch of removable media
There are no MnF-specific additions to clause 4.3.3.1.3 of TS 33.117 [3].
4.3.3.1.4 SYN Flood Prevention
There are no MnF-specific additions to clause 4.3.3.1.4 of TS 33.117 [3].
4.3.3.1.5 Protection from buffer overflows
There are no MnF-specific additions to clause 4.3.3.1.5 of TS 33.117 [3].
4.3.3.1.6 External file system mount restrictions
There are no MnF-specific additions to clause 4.3.3.1.6 of TS 33.117 [3].
4.3.4 Web Servers
4.3.4.1 General
There are no MnF-specific additions to clause 4.3.4.1 of TS 33.117 [3].
4.3.4.2 No system privileges for web server
There are no MnF-specific additions to clause 4.3.4.2 of TS 33.117 [3].
4.3.4.3 No unused HTTP methods
TBD
4.3.4.4 No unused add-ons
There are no MnF-specific additions to clause 4.3.4.4 of TS 33.117 [3].
4.3.4.5 No compiler, interpreter, or shell via CGI or other server-side scripting
There are no MnF-specific additions to clause 4.3.4.5 of TS 33.117 [3].
4.3.4.6 No CGI or other scripting for uploads
There are no MnF-specific additions to clause 4.3.4.6 of TS 33.117 [3].
4.3.4.7 No execution of system commands with SSI
There are no MnF-specific additions to clause 4.3.4.7 of TS 33.117 [3].
4.3.4.8 Access rights for web server configuration
There are no MnF-specific additions to clause 4.3.4.8 of TS 33.117 [3].
4.3.4.9 No default content
There are no MnF-specific additions to clause 4.3.4.9 of TS 33.117 [3].
4.3.4.10 No directory listings
TBD
4.3.4.11 Web server information in HTTP headers
TBD
4.3.4.12 Web server information in error pages
There are no MnF-specific additions to clause 4.3.4.12 of TS 33.117 [3].
4.3.4.13 Minimized file type mappings
There are no MnF-specific additions to clause 4.3.4.13 of TS 33.117 [3].
4.3.4.14 Restricted file access
There are no MnF-specific additions to clause 4.3.4.14 of TS 33.117 [3].
4.3.4.15 Execute rights exclusive for CGI/Scripting directory
There are no MnF-specific additions to clause 4.3.4.15 of TS 33.117 [3].
4.3.5 Network Devices
4.3.5.1 Traffic Separation
TBD
4.3.6 Network Functions in service-based architecture
4.3.6.1 Introduction
There are no MnF-specific additions to clause 4.3.6.1 of TS 33.117 [3].
4.3.6.2 No code execution or inclusion of external resources by JSON parsers
TBD
4.3.6.3 Unique key values in IEs
TBD
4.3.6.4 The valid format and range of values for IEs
TBD
4.4 MnF-specific adaptations of basic vulnerability testing requirements and related test cases
There are no MnF-specific additions to clause 4.4 of TS 33.117 [3].