4.2.2.2.2 Protection at the transport layer |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_TRANSPORT_LAYER | |
| Threat Reference | TR 33.926 [4], clause 5.3.6.3, Weak cryptographic algorithms |
|
| Requirement Name | Protection at the transport layer |
|
| Requirement Reference | TS 33.501 [10], clause 5.9.2.1, clause 13.1, clause 13.3.2 |
|
| Requirement Description | NF Service Request and Response procedure supports mutual authentication between NF consumer and NF producer as specified in TS 33.501 [10], clause 5.9.2.1 . All network functions supports TLS. Network functions support both server-side and client-side certificates. The TLS profile follows the profile given in Annex E of TS 33.310 [9] with the restriction to be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11] as specified in TS 33.501 [10], clause 13.1. Authentication between network functions within one PLMN uses one of the following methods:
|
|
| Test Purpose | Verify that TLS protocol for NF mutual authentication and NF transport layer protection is implemented in the network products based on the profile required. |
|
| Pre-Conditions | Network product documentation containing information about supported TLS protocol and certificates is provided by the vendor. A peer implementing the TLS protocol configured by the vendor shall be available. The tester shall base the tests on the profile defined by 3GPP in Annex E of TS 33.310 [9] with the restriction that it shall be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11]. |
|
| Execution Steps |
Expected can Results:
|
|
| Expected Results | ||
| Expected Format of Evidence | Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file. |
|
| PDFs | e8a87d87e8ccc90c6c728a38e2257557 | |
4.2.2.2.2 Protection at the transport layer |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_TRANSPORT_LAYER | |
| Threat Reference | TR 33.926 [4], clause 5.3.6.3, Weak cryptographic algorithms |
|
| Requirement Name | Protection at the transport layer |
|
| Requirement Reference | TS 33.501 [10], clause 5.9.2.1, clause 13.1, clause 13.3.2 |
|
| Requirement Description | "NF Service Request and Response procedure shall support mutual authentication between NF consumer and NF producer" as specified in TS 33.501 [10], clause 5.9.2.1; "All network functions shall support TLS. Network functions shall support both server-side and client-side certificates. The TLS profile shall follow the profile given in Annex E of TS 33.310 [9] with the restriction that it shall be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11]. " as specified in TS 33.501 [10], clause 13.1. "Authentication between network functions within one PLMN shall use one of the following methods:
as specified in TS 33.501 [10], clause 13.3.2. |
|
| Test Purpose | Verify that TLS protocol for NF mutual authentication and NF transport layer protection is implemented in the network products based on the profile required. |
|
| Pre-Conditions | Network product documentation containing information about supported TLS protocol and certificates is provided by the vendor. A peer implementing the TLS protocol configured by the vendor shall be available. The tester shall base the tests on the profile defined by 3GPP in Annex E of TS 33.310 [9] with the restriction that it shall be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11]. |
|
| Execution Steps |
Expected can Results:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 5066f21308038071d726a77e9c0df669 | |
4.2.2.2.3.1 Authorization token verification failure handling within one PLMN |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_ONE_PLMN | |
| Threat Reference | TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens |
|
| Requirement Name | Authorization token verification failure handling within one PLMN |
|
| Requirement Reference | TS 33.501 [10], clause 13.4.1.1 |
|
| Requirement Description | According to TS 33.501 [10], clause 13.4.1.1, the NF Service producer verifies the access token as follows:
|
|
| Test Purpose | Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in the same PLMN fails. |
|
| Pre-Conditions |
|
|
| Execution Steps | The network product under test receives the access token sent from the NF service consumer, verifies the access token based on Oauth 2.0. Test Cases 1~4 are tests on failure handling by the network product under test when the mandatory claims in access token failed verification. Test Case 1: Verification failure of the access token integrity
Test Case 2: Incorrect audience claim in the access token
Test Case 3: Incorrect scope claim in the access token
Test Case 4: Expired access token
Test Cases 5~8 are tests on failure handling by the network product under test when the optional claims in access token failed verification.
Test Case 5: Incorrect list of S-NSSAIs in the access token
Test Case 6: Incorrect list of NSIs in the access token
Test Case 7: Incorrect NF Set ID in the access token
Test Case 8: Incorrect additional scope in the access token
|
|
| Expected Results | For test cases 1~4 on verification failure of mandatory claims in the access token, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. For test cases 5~8 on verification failure of optional claims in the access token, if the network product under test understands these optional claims (list of S-NSSAIs, list of NSIs, NF Set ID, additional scope), it rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot containing the operational results. |
|
| PDFs | 761d184cd158addc1c38062bfcf108d8 | |
4.2.2.2.3.1 |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_ONE_PLMN | |
| Threat Reference | TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens |
|
| Requirement Name | Authorization token verification failure handling wthin one PLMN |
|
| Requirement Reference | TS 33.501 [14], clause 13.4.1.1 |
|
| Requirement Description | "13.4.1.1 Service access authorization within the PLMN
|
|
| Test Purpose | Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in the same PLMN fails. |
|
| Pre-Conditions |
|
|
| Execution Steps | The network product under test receives the access token sent from the NF service consumer, verifies the access token based on Oauth 2.0. Test Cases 1~4 are tests on failure handling by the network product under test when the mandatory claims in access token failed verification. Test Case 1: Verification failure of the access token integrity
Test Case 2: Incorrect audience claim in the access token
Test Case 3: Incorrect scope claim in the access token
Test Case 4: Expired access token
Test Cases 5~8 are tests on failure handling by the network product under test when the optional claims in access token failed verification.
Test Case 5: Incorrect list of S-NSSAIs in the access token
Test Case 6: Incorrect list of NSIs in the access token
Test Case 7: Incorrect NF Set ID in the access token
Test Case 8: Incorrect additional scope in the access token
|
|
| Expected Results | For test cases 1~4 on verification failure of mandatory claims in the access token, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. For test cases 5~8 on verification failure of optional claims in the access token, if the network product under test understands these optional claims (list of S-NSSAIs, list of NSIs, NF Set ID, additional scope), it rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot containing the operational results. |
|
| PDFs | b835fb69e5c0fd83af4a2c197e2a2cd4 | |
4.2.2.2.3.2 Authorization token verification failure handling in different PLMNs |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_DIFF_PLMN | |
| Threat Reference | TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens
|
|
| Requirement Name | Authorization token verification failure handling in different PLMNs |
|
| Requirement Reference | TS 33.501 [10], clause 13.4.1.2 |
|
| Requirement Description | The NF service producer checks that the home PLMN ID of audience claim in the access token matches its own PLMN identity. |
|
| Test Purpose | Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in a different PLMN fails. |
|
| Pre-Conditions |
|
|
| Execution Steps | The network product under test receives the access token sent from the NF service consumer, verifies the access token in accordance with the execution steps in 4.2.2.2.3.1, with the following additional test cases: Test Case 1: incorrect PLMN ID of the NF service producer in the access token
Test Case 2: absent PLMN ID of the NF service producer in the access token
|
|
| Expected Results | For both test cases 1 and 2, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot containing the operational results. |
|
| PDFs | 7ebe048fe111fe7492e8165394b30457 | |
4.2.2.2.3.2 Authorization token verification failure handling in different PLMNs |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_DIFF_PLMN | |
| Threat Reference | TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens
|
|
| Requirement Name | Authorization token verification failure handling in different PLMNs |
|
| Requirement Reference | TS 33.501 [10], clause 13.4.1.2 |
|
| Requirement Description | "The NF service producer shall check that the home PLMN ID of audience claim in the access token matches its own PLMN identity." |
|
| Test Purpose | Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in a different PLMN fails. |
|
| Pre-Conditions |
|
|
| Execution Steps | The network product under test receives the access token sent from the NF service consumer, verifies the access token in accordance with the execution steps in 4.2.2.1.2.1, with the following additional test cases: Test Case 1: incorrect PLMN ID of the NF service producer in the access token
Test Case 2: absent PLMN ID of the NF service producer in the access token
|
|
| Expected Results | For both test cases 1 and 2, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12]. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot containing the operational results. |
|
| PDFs | 7e87ed2d63db2b6aa71282343d453d4b | |
4.2.2.2.4.1 Correct handling of client credentials assertion validation failure |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 → 33117-h50 → 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_CLIENT_CREDENTIALS_ASSERTION_VALIDATION | |
| Threat Reference | TR 33.926 [4], clause 6.3.x.1, Incorrect validation of client credentials assertion Note: The following test case only applies if the NF under test implements verification of client credentials assertions. |
|
| Requirement Name | Correct handling of client credentials assertion validation failure |
|
| Requirement Reference | TS 33.501 [10], clause 13.3.8.3 |
|
| Requirement Description | The verification of the Client credentials assertion is performed by the receiving node, i.e., NRF or NF Service Producer in the following way:
If the receiving node is the NR F, the NRF validates the timestamp (iat) and the expiration time (exp). If the receiving node is the NF Service Producer, the NF service Producer validates the expiration time and it may validate the timestamp.
It verifies that the NF instance ID in the client credentials assertion matches the NF instance ID in the public key certificate used for signing the assertion. |
|
| Test Purpose | Verify that the NF under test correctly handles client credentials assertion validation failure. Editor's Note: This test case applies for Rel-16 NFs. The formulation for indicating the applicable release may need to be updated. |
|
| Pre-Conditions |
|
|
| Execution Steps | Test Case 1: Failed verification of the client credentials assertion integrity
Test Case 2: Incorrect audience claim in the client credentials assertion
Test Case 3: Expired client credentials assertion
|
|
| Expected Results | For test cases 1~3, the NF under test rejects the consumer NF's service request and sends back an error message. Editor's Note: the result needs to be aligned with the relevant error handling description to be added in TS 29.500. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operational results. |
|
| PDFs | c898d280ec5110945d01bb02956284ca | |
4.2.2.2.4.1 Correct handling of client credentials assertion validation failure |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 → 33117-h50 → 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_CLIENT_CREDENTIALS_ASSERTION_VALIDATION | |
| Threat Reference | TR 33.926 [4], clause 6.3.x.1, Incorrect validation of client credentials assertion Note: The following test case only applies if the NF under test implements verification of client credentials assertions. |
|
| Requirement Name | Correct handling of client credentials assertion validation failure |
|
| Requirement Reference | TS 33.501 [14], clause 13.3.8.3 |
|
| Requirement Description | "The verification of the Client credentials assertion shall be performed by the receiving node, i.e., NRF or NF Service Producer in the following way:
If the receiving node is the NR F, the NRF validates the timestamp (iat) and the expiration time (exp). If the receiving node is the NF Service Producer, the NF service Producer validates the expiration time and it may validate the timestamp.
It verifies that the NF instance ID in the client credentials assertion matches the NF instance ID in the public key certificate used for signing the assertion". |
|
| Test Purpose | Verify that the NF under test correctly handles client credentials assertion validation failure. Editor's Note: This test case applies for Rel-16 NFs. The formulation for indicating the applicable release may need to be updated. |
|
| Pre-Conditions |
|
|
| Execution Steps | Test Case 1: Failed verification of the client credentials assertion integrity
Test Case 2: Incorrect audience claim in the client credentials assertion
Test Case 3: Expired client credentials assertion
|
|
| Expected Results | For test cases 1~3, the NF under test rejects the consumer NF's service request and sends back an error message. Editor's Note: the result needs to be aligned with the relevant error handling description to be added in TS 29.500. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operational results. |
|
| PDFs | a70c8bcec41d610834fe8e7a47ecb345 | |
4.2.3.2.2 Protecting data and information -- Confidential System Internal Data |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Unauthorized Viewing |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | When the system is not under maintenance, there shall be no system function that reveals confidential system internal data in the clear to users and administrators. Such functions could be, for example, local or remote O&M CLI or GUI, logging messages, alarms, configuration file exports etc. Confidential system internal data contains authentication data (i.e. PINs, cryptographic keys, passwords, cookies) as well as system internal data that is not required for systems administration and could be of advantage to attackers (i.e. stack traces in error messages). |
|
| Test Purpose | Verify that no system function reveals sensitive data in the clear |
|
| Pre-Conditions | The vendor shall provide documentation describing how confidential system internal information that could possibly be revealed in clear-text is handled by system functions. A list of all system functions in the network product, information on how to enable and execute them should be provided as a part of the vendor's documentation. A system function is every function implemented in the network product needed by the services/functionalities provided by the network product itself. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | There should be no confidential system internal data revealed in the clear by any system function. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operational results. |
|
| PDFs | 35fa9a76436728c5b9e59c1d81a08d35 | |
4.2.3.2.2 Protecting data and information -- Confidential System Internal Data |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA | |
| Threat Reference | ||
| Requirement Name | Unauthorized Viewing |
|
| Requirement Reference | ||
| Requirement Description | When the system is not under maintenance, there shall be no system function that reveals confidential system internal data in the clear to users and administrators. Such functions could be, for example, local or remote OAM CLI or GUI, logging messages, alarms, configuration file exports etc. Confidential system internal data contains authentication data (i.e. PINs, cryptographic keys, passwords, cookies) as well as system internal data that is not required for systems administration and could be of advantage to attackers (i.e. stack traces in error messages). Security Objective references: tba. |
|
| Test Purpose | Verify that no system function reveals sensitive data in the clear |
|
| Pre-Conditions | The vendor shall provide documentation describing how confidential system internal information that could possibly be revealed in clear-text is handled by system functions. A list of all system functions in the network product, information on how to enable and execute them should be provided as a part of the vendor's documentation. A system function is every function implemented in the network product needed by the services/functionalities provided by the network product itself. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | There should be no confidential system internal data revealed in the clear by any system function. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operational results. |
|
| PDFs | 70a0e473495ad2781ab2a9f7d1a21e4e | |
4.2.3.2.3 Protecting data and information in storage |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PSW_STOR_SUPPORT | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Protecting data and information in storage |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | For sensitive data in (persistent or temporary) storage read access rights shall be restricted. Files of a system that are needed for the functionality shall be protected against manipulation. In addition, the following rules apply for:
|
|
| Test Purpose | Verify that Password storage uses a non-broken one-way cryptographic hash algorithm. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. All collected records contain different hash values, even if the corresponding passwords were identical.
b. The bit length of the hash values is fixed and independent from the password length. c. The hash value does not contain any information that could be used for password disclosure. (e.g. contains part of the password in plain text or some sort of password length indicator)
|
|
| Expected Results | All records comply with the characteristic of one-way cryptographic hash result. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation results. |
|
| PDFs | 6c6168a02d54f04391c46323afd771f2 | |
4.2.3.2.3 Protecting data and information in storage |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PSW_STOR_SUPPORT | |
| Threat Reference | ||
| Requirement Name | Protecting data and information in storage |
|
| Requirement Reference | ||
| Requirement Description | For sensitive data in (persistent or temporary) storage read access rights shall be restricted. Files of a system that are needed for the functionality shall be protected against manipulation. In addition, the following rules apply for:
Security Objective references: tba |
|
| Test Purpose | Verify that Password storage use one-way hash algorithm. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. All collected records contain different hash values, even if the corresponding passwords were identical.
b. The bit length of the hash values is fixed and independent from the password length. c. The hash value does not contain any information that could be used for password disclosure. (e.g. contains part of the password in plain text or some sort of password length indicator)
|
|
| Expected Results | All records comply with the characteristic of one-way hash result. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation results. |
|
| PDFs | 9bc1f0078cba683bc5fe9882110f3bf7 | |
4.2.3.2.4 Protecting data and information in transfer |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 → 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_DATA_INFO_TRANSFER_1 | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Protecting data and information in transfer |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description |
|
|
| Test Purpose | Verify the mechanisms implemented to protect data and information in transfer to and from the Network Product's O&M interface.
|
|
| Pre-Conditions | Network product documentation containing information about supported O&M protocols is provided by the vendor, A peer implementing the security protocol configured by the vendor (e.g SSH client supporting SSHv2 or HTTPS client) shall be available. Network product documentation stating which security protocols for protection of data in transit are implemented and which profiles in TS 33.310 [9] and TS 33.210 [15] are applicable is provided by the vendor For TLS/DTLS, the tester shall base the tests on the profile defined by 3GPP in TS 33.310 [9] and TS 33.210 [15]. For IKE and IPsec, the tester shall base the tests on the profile defined by 3GPP in TS 33.210 [15]. For protocols, for which 3GPP did not define a security profile, e.g. SSH, the tester shall base the tests on a widely recognised and publicly available security profile. |
|
| Execution Steps |
|
|
| Expected Results | The traffic is properly protected, and insecure options are not accepted by the Network Product. |
|
| Expected Format of Evidence | Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 40705f09c989f9d928eb60357662238a | |
4.2.3.2.4 Protecting data and information in transfer |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 → 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_DATA_INFO_TRANSFER_1 | |
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description |
Security Objective references: tba |
|
| Test Purpose | Verify the mechanisms implemented to protect data and information in transfer to and from the Network Product's OAM interface.
|
|
| Pre-Conditions | Network product documentation containing information about supported OAM protocols is provided by the vendor, A peer implementing the security protocol configured by the vendor (e.g SSH client supporting SSHv2 or HTTPS client) shall be available. Network product documentation stating which security protocols for protection of data in transit are implemented and which profiles in TS 33.310 [9] and TS 33.210 [15] are applicable is provided by the vendor For TLS/DTLS, the tester shall base the tests on the profile defined by 3GPP in TS 33.310 [9] and TS 33.210 [15]. For IKE and IPsec, the tester shall base the tests on the profile defined by 3GPP in TS 33.210 [15]. For protocols, for which 3GPP did not define a security profile, e.g. SSH, the tester shall base the tests on a widely recognised and publicly available security profile. |
|
| Execution Steps |
|
|
| Expected Results | The traffic is properly protected, and insecure options are not accepted by the Network Product. |
|
| Expected Format of Evidence | Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 21576de0eee649eaa50b6c7c79a9bf1a | |
4.2.3.2.5 Logging access to personal data |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_LOGGING_ACCESS_TO_PERSONAL_DATA | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Logging access to personal data |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | In some cases access to personal data in clear text might be required. If such access is required, access to this data shall be logged, and the log shall contain who accessed what data without revealing personal data in clear text. When for practical purposes such logging is not available, a coarser grain logging is allowed. In some cases, the personal data stored in the log files may allow the direct identification of a subscriber. In such cases, the revealed personal information shall not expose the subscriber to any kind of privacy violation. |
|
| Test Purpose | Verify that in cases where a network product presents personal data in clear text, access attempts to such data are logged and the log information includes the user identity that has accessed the data. The test case also verifies that the personal data itself is not included in clear text in the log. |
|
| Pre-Conditions | A document which provides a description of where personal data in clear text is accessible on the network product, how it can be accessed, and details of where such access attempts are logged and how to view these logs. |
|
| Execution Steps |
|
|
| Expected Results | All access attempts to personal data (in clear text) are recorded in the described logs, with the user identity included and no personal data visible in the log. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | a5d1a1a731c2c5d424dfc85b7226f797 | |
4.2.3.2.5 Logging access to personal data |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_LOGGING_ACCESS_TO_PERSONAL_DATA | |
| Threat Reference | ||
| Requirement Name | Logging access to personal data |
|
| Requirement Reference | ||
| Requirement Description | In some cases access to personal data in clear text might be required. If such access is required, access to this data shall be logged, and the log shall contain who accessed what data without revealing personal data in clear text. When for practical purposes such logging is not available, a coarser grain logging is allowed. In some cases, the personal data stored in the log files may allow the direct identification of a subscriber. In such cases, the revealed personal information may not expose the subscriber to any kind of privacy violation. |
|
| Test Purpose | Verify that in cases where a network product presents personal data in clear text, access attempts to such data are logged and the log information includes the user identity that has accessed the data. The test case also verifies that the personal data itself is not included in clear text in the log. |
|
| Pre-Conditions | A document which provides a description of where personal data in clear text is accessible on the network product, how it can be accessed, and details of where such access attempts are logged and how to view these logs. |
|
| Execution Steps |
|
|
| Expected Results | All access attempts to personal data (in clear text) are recorded in the described logs, with the user identity included and no personal data visible in the log. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 02e23c6d9ef3a05196b24d10bc429030 | |
4.2.3.3.2 Boot from intended memory devices only |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 → 33117-h40 33117-h50 → 33117-i00 → 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_BOOT_INT_MEM_1 | |
| Threat Reference | ||
| Requirement Name | Boot from intended memory devices only |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product can boot only from the memory devices intended for this purpose. |
|
| Test Purpose | Verify that the network product can only boot from memory devices intended for this purpose (e.g. not from external memory like USB key). |
|
| Pre-Conditions | A document which contains information regarding the firmware access mechanism supported by the product and about the memory devices from which the network product can boot. |
|
| Execution Steps |
|
|
| Expected Results | The network product cannot boot from a memory device that is not configured in its firmware, and access to the firmware is only possible with the correct authentication. |
|
| Expected Format of Evidence | NA |
|
| PDFs | ffab46ac106b7285eebe4f98f9111468 | |
4.2.3.3.2 Boot from intended memory devices only |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 → 33117-h40 33117-h50 → 33117-i00 → 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_BOOT_INT_MEM_1 | |
| Threat Reference | ||
| Requirement Name | Boot from intended memory devices only |
|
| Requirement Reference | to be done later |
|
| Requirement Description | The network product can boot only from the memory devices intended for this purpose. |
|
| Test Purpose | Verify that the network product can only boot from memory devices intended for this purpose (e.g. not from external memory like USB key). |
|
| Pre-Conditions | A document which contains information regarding the firmware access mechanism supported by the product and about the memory devices from which the network product can boot. |
|
| Execution Steps |
|
|
| Expected Results | The network product cannot boot from a memory device that is not configured in its firmware, and access to the firmware is only possible with the correct authentication. |
|
| Expected Format of Evidence | NA |
|
| PDFs | fe983695542f1108ae132044aba60cfe | |
4.2.3.3.3 System handling during excessive overload situations |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYSTEM_HANDLING_OF_OVERLOAD_SITUATIONS | |
| Threat Reference | TR 33.926 [4]. |
|
| Requirement Name | System handling during excessive overload situations. |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | The system shall act in a predictable way if an overload situation cannot be prevented. A system shall be built in this way that it can react on an overload situation in a controlled way. However it is possible that a situation happens where the security measures are no longer sufficient. In such case it shall be ensured that the system cannot reach an undefined and thus potentially insecure state. In an extreme case this means that a controlled system shutdown is preferable to uncontrolled failure of the security functions and thus loss of system protection. The vendor shall provide a technical description of the network product's Over Load Control mechanisms (especially whether these mechanisms rely on cooperation of other network elements e.g. eNode B) and the accompanying test case for this requirement checks that the description provides sufficient detail in order for an evaluator to understand how the mechanism is designed. |
|
| Test Purpose | Verify that the network product:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
Note: If some of the items listed above are not applicable to a network product then, in those cases, it should be clarified by the vendor why these items are not applicable. The test results should:
|
|
| Expected Format of Evidence | Documentation showing each of the points in the results sections. |
|
| PDFs | 14c15af65c373b375b9801bf833173b7 | |
4.2.3.3.3 System handling during excessive overload situations |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYSTEM_HANDLING_OF_OVERLOAD_SITUATIONS | |
| Threat Reference | ||
| Requirement Name | System handling during excessive overload situations |
|
| Requirement Reference | ||
| Requirement Description | The system shall act in a predictable way if an overload situation cannot be prevented. A system shall be built in this way that it can react on an overload situation in a controlled way. However it is possible that a situation happens where the security measures are no longer sufficient. In such case it shall be ensured that the system cannot reach an undefined and thus potentially insecure state. In an extreme case this means that a controlled system shutdown is preferable to uncontrolled failure of the security functions and thus loss of system protection. The vendor shall provide a technical description of the network product's Over Load Control mechanisms (especially whether these mechanisms rely on cooperation of other network elements e.g. eNode B) and the accompanying test case for this requirement will check that the description provides sufficient detail in order for an evaluator to understand how the mechanism is designed. Security Objective references: tba. |
|
| Test Purpose | Verify that the network product:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
Note: If some of the items listed above are not applicable to a network product then, in those cases, it should be clarified by the vendor why these items are not applicable. The test results should:
|
|
| Expected Format of Evidence | Documentation showing each of the points in the results sections. |
|
| PDFs | 281a5a69fb5cf367fe6e61cfa93d1eb9 | |
4.2.3.3.5 Network Product software package integrity |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SW_PKG_INTEGRITY_1 | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Network product Software integrity validation |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description |
|
|
| Test Purpose | Verify that:
|
|
| Pre-Conditions |
|
|
| Execution Steps | The tester checks the permissions required to install software on the network product ensuring that a user is properly authenticated by the network product and that they have the required access privileges to perform the installation activity. The tester checks, when a software package is attempted to be installed on the network product, that the software package integrity check is executed (check for evidence of execution as described in network product documentation) and that valid software is allowed to be installed but invalid software is rejected. The tester checks the access control permissions for the software package integrity checking process, the list of public keys of authorised software sources, and any related credentials or keys for the process, to ensure that the process cannot be controlled by persons that are not authorized to do so. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the installation of package A and B. |
|
| PDFs | 00d8197a94f4aa301b60be73323449ce | |
4.2.3.3.5 Network Product software package integrity |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SW_PKG_INTEGRITY_1 | |
| Threat Reference | ||
| Requirement Name | Network product Software integrity validation |
|
| Requirement Reference | to be done later |
|
| Requirement Description |
Security Objective references: SOFTWARE INTEGRITY |
|
| Test Purpose | Verify that:
|
|
| Pre-Conditions |
|
|
| Execution Steps | The tester checks the permissions required to install software on the network product ensuring that a user is properly authenticated by the network product and that they have the required access privileges to perform the installation activity. The tester checks, when a software package is attempted to be installed on the network product, that the software package integrity check is executed (check for evidence of execution as described in network product documentation) and that valid software is allowed to be installed but invalid software is rejected. The tester checks the access control permissions for the software package integrity checking process, the list of public keys of authorised software sources, and any related credentials or keys for the process, to ensure that the process cannot be controlled by persons that are not authorized to do so. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the installation of package A and B. |
|
| PDFs | 0193bf4d6d79c71e28a27956e889ea76 | |
4.2.3.4.1.1 Successful authentication and authorization of system functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYS_FUN_USAGE | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Authentication and authorization for System functions |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The usage of a system function without successful authentication on basis of the user identity and at least one authentication attribute (e.g. password, certificate) shall be prevented. System functions comprise, for example network services (like SSH, SFTP, Web services), local access via a management console, local usage of operating system and applications. This requirement shall also be applied to accounts that are only used for communication between systems. An exception to the authentication and authorization requirement are functions for public use such as those for a Web server on the Internet, via which information is made available to the public. |
|
| Test Purpose | To ensure that system functions shall not be used without successful authentication and authorization. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 805b07099654a18be23fb703e08239b3 | |
4.2.3.4.1.1 |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYS_FUN_USAGE | |
| Threat Reference | ||
| Requirement Name | System functions shall not be used or accessed without successful authentication and authorization. |
|
| Requirement Reference | ||
| Requirement Description | The usage of a system function without successful authentication on basis of the user identity and at least one authentication attribute (e.g. password, certificate) shall be prevented. System functions comprise, for example network services (like SSH, SFTP, Web services), local access via a management console, local usage of operating system and applications. This requirement shall also be applied to accounts that are only used for communication between systems. An exception to the authentication and authorization requirement are functions for public use such as those for a Web server on the Internet, via which information is made available to the public. Security Objective references: tba. |
|
| Test Purpose | To ensure that system functions shall not be used without successful authentication and authorization. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | a1031ea9f09a54f6055153aba8c325d3 | |
4.2.3.4.1.2 Unambiguous identification of the user. |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_DOCUMENTATION | |
| Threat Reference | TR 33.926 [4]
|
|
| Requirement Name | Unambiguous identification of the user. |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.
|
|
| Test Purpose | To ensure that documentation of the network product does not encourage or require the use of group accounts, group credentials, or sharing of the same account between several users. To ensure that the network product does not support credentials unrelated to an account. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test report that lists the reviewed documentation (incl. release dates and versions) and the findings. |
|
| PDFs | fb37eef7b728064ef8da574b44847105 | |
4.2.3.4.1.2 |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_DOCUMENTATION | |
| Threat Reference | ||
| Requirement Name | The network product shall use accounts that allow unambiguous identification of the user. |
|
| Requirement Reference | ||
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.
Security Objective references: tba.
|
|
| Test Purpose | To ensure that documentation of the network product does not encourage or require the use of group accounts, group credentials, or sharing of the same account between several users. To ensure that the network product does not support credentials unrelated to an account. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test report that lists the reviewed documentation (incl. release dates and versions) and the findings. |
|
| PDFs | aa2fa7c80c1b13e2393fe4e30b4ffb55 | |
4.2.3.4.1.2(2) Unambiguous identification of the user. |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_DEFAULTS | |
| Threat Reference | TR 33.926 [4]
|
|
| Requirement Name | Unambiguous identification of the user. |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.
|
|
| Test Purpose | To ensure that the default setup of the network product does not enable the use of group accounts or group credentials. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test report that lists the reviewed documentation, reviewed user and group databases, and the findings. |
|
| PDFs | ce35b714050cbf16ec1e001510566e61 | |
4.2.3.4.1.2(2) |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_DEFAULTS | |
| Threat Reference | ||
| Requirement Name | The network product shall use accounts that allow unambiguous identification of the user. |
|
| Requirement Reference | ||
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.
Security Objective references: tba.
|
|
| Test Purpose | To ensure that the default setup of the network product does not enable the use of group accounts or group credentials. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test report that lists the reviewed documentation, reviewed user and group databases, and the findings. |
|
| PDFs | 80e3b64df2cceebe42da08d038cf5ac3 | |
4.2.3.4.1.2(3) Unambiguous identification of the user. |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_NUMBER | |
| Threat Reference | TR 33.926 [4]
|
|
| Requirement Name | Unambiguous identification of the user. |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.
|
|
| Test Purpose | To ensure that a minimum number of individual accounts per user data base is supported. The minimum number is defined in the requirement description of this clause. |
|
| Pre-Conditions | All user data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product. |
|
| Execution Steps | The tester is required to execute the following steps: Create accounts until the minimum number of accounts is reached. |
|
| Expected Results | Successful creation of the minimum number of accounts. |
|
| Expected Format of Evidence | Test report that lists the reviewed documentation, reviewed user databases, and the findings. |
|
| PDFs | 3e90f9c606a7a14f38c5d382217ba20a | |
4.2.3.4.1.2(3) |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_NUMBER | |
| Threat Reference | ||
| Requirement Name | The network product shall use accounts that allow unambiguous identification of the user. |
|
| Requirement Reference | ||
| Requirement Description | Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.
Security Objective references: tba.
|
|
| Test Purpose | To ensure that a minimum number of individual accounts per user data base is supported. The minimum number is defined in the requirement description of this clause. |
|
| Pre-Conditions | All user data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product. |
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps: Create accounts until the minimum number of accounts is reached. |
|
| Expected Results | Successful creation of the minimum number of accounts. |
|
| Expected Format of Evidence | Test report that lists the reviewed documentation, reviewed user databases, and the findings. |
|
| PDFs | 0e4fee4ce8d555fa15554413ea098295 | |
4.2.3.4.2.1 Account protection by at least one authentication attribute. |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_PROTECTION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Account protection by at least one authentication attribute. |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | The various user and machine accounts on a system shall be protected from misuse. To this end, an authentication attribute is typically used, which, when combined with the user name, enables unambiguous authentication and identification of the authorized user. Authentication attributes include:
This means that authentication based on a parameter that can be spoofed (e.g. phone numbers, public IP addresses or VPN membership) is not permitted. Exceptions are attributes that cannot be faked or spoofed by an attacker.
|
|
| Test Purpose | To ensure that all accounts are protected by at least one authentication attribute. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence containing the results of all login attempts, e.g. screenshots, log files, error messages. |
|
| PDFs | 0011d17ac66d82b7223b73ad80b39939 | |
4.2.3.4.2.1 Account protection by at least one authentication attribute. |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCOUNT_PROTECTION | |
| Threat Reference | ||
| Requirement Name | Account protection by at least one authentication attribute. |
|
| Requirement Reference | ||
| Requirement Description | The various user and machine accounts on a system shall be protected from misuse. To this end, an authentication attribute is typically used, which, when combined with the user name, enables unambiguous authentication and identification of the authorized user. Authentication attributes include:
This means that authentication based on a parameter that can be spoofed (e.g. phone numbers, public IP addresses or VPN membership) is not permitted. Exceptions are attributes that cannot be faked or spoofed by an attacker.
Security Objective references: tba. |
|
| Test Purpose | To ensure that all accounts are protected by at least one authentication attribute. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | tba |
|
| PDFs | 4b53465e85376b8b5ff1ecceeaf8c2fa | |
4.2.3.4.2.2 Deletion or disablement of predefined accounts |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PREDEFINED_ACCOUNT_DELETION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Deletion or disablement of predefined accounts . |
|
| Requirement Reference | In accordance with industry best practice. |
|
| Requirement Description | All predefined or default accounts shall be deleted or disabled. Many systems have default accounts (e.g. guest, ctxsys), some of which are preconfigured with or without known passwords. These standard users shall be deleted or disabled. Should this measure not be possible the accounts shall be locked for remote login. In any case disabled or locked accounts shall be configured with a complex password as specified in clause 4.2.3.4.3.1 Password Structure. This is necessary to prevent unauthorized use of such an account in case of misconfiguration. Exceptions to this requirement to delete or disable accounts are accounts that are used only internally on the system involved and that are required for one or more applications on the system to function. Also for these accounts remote access or local login shall be forbidden to prevent abusive use by users of the system. |
|
| Test Purpose | To ensure that predefined accounts are deleted or disabled unless there is specific exception as defined in the requirement 4.2.3.4.2.2. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence can be presented in the form of screenshot/screen-capture on showing for example a remote login failure or complexity of a password of e.g. locked or disabled accounts. |
|
| PDFs | 07afe88a263912c09118902a1d618889 | |
4.2.3.4.2.2 |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PREDEFINED_ACCOUNT_DELETION | |
| Threat Reference | ||
| Requirement Name | Predefined accounts shall be deleted or disabled. |
|
| Requirement Reference | ||
| Requirement Description | All predefined or default accounts shall be deleted or disabled. Many systems have default accounts (e.g. guest, ctxsys), some of which are preconfigured with or without known passwords. These standard users shall be deleted or disabled. Should this measure not be possible the accounts shall be locked for remote login. In any case disabled or locked accounts shall be configured with a complex password as specified in clause 4.2.3.4.3.1 Password Structure. This is necessary to prevent unauthorized use of such an account in case of misconfiguration. Exceptions to this requirement to delete or disable accounts are accounts that are used only internally on the system involved and that are required for one or more applications on the system to function. Also for these accounts remote access or local login shall be forbidden to prevent abusive use by users of the system. Security Objective references: TBA. |
|
| Test Purpose | To ensure that predefined accounts are deleted or disabled unless there is specific exception as defined in the requirement 4.2.3.4.2.2. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence can be presented in the form of screenshot/screen-capture on showing for example a remote login failure or complexity of a password of e.g. locked or disabled accounts. |
|
| PDFs | 13cc0d58a248bc4a968eeb2bd22f83de | |
4.2.3.4.2.3 Deletion or disablement of predefined or default authentication attributes. |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_PREDEFINED_AUTHENTICATION_ATTRIBUTES_DELETION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Deletion or disablement of predefined or default authentication attributes |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Predefined or default authentication attributes shall be deleted or disabled. Normally, authentication attributes such as password or cryptographic keys will be preconfigured from vendor, manufacturer, or developer of a system. Such authentication attributes shall be changed by automatically forcing a user to change it on 1^st^ time login to the system or the vendor provides instructions on how to manually change it. |
|
| Test Purpose | To ensure that predefined or default authentication attributes are deleted or disabled as defined in the requirement 4.2.3.4.2.3. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence can be presented in the form of screenshot/screen-capture on how the network product prompts for password change at first login. Also extracts from product documentation with clear instructions of how to change any default password or cryptographic key. |
|
| PDFs | fceb5cc3fcaaf68d644d314eb1c93827 | |
4.2.3.4.2.3 |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_PREDEFINED_AUTHENTICATION_ATTRIBUTES_DELETION | |
| Threat Reference | ||
| Requirement Name | Predefined or default authentication attributes shall be deleted or disabled. |
|
| Requirement Reference | ||
| Requirement Description | Predefined or default authentication attributes shall be deleted or disabled. Normally, authentication attributes such as password or cryptographic keys will be preconfigured from producer, vendor or developer of a system. Such authentication attributes shall be changed by automatically forcing a user to change it on 1^st^ time login to the system or the vendor provides instructions on how to manually change it. Security Objective references: TBA. |
|
| Test Purpose | To ensure that predefined or default authentication attributes are deleted or disabled as defined in the requirement 4.2.3.4.2.3. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence can be presented in the form of screenshot/screen-capture on how the network product prompts for password change at first login. Also extracts from product documentation with clear instructions of how to change any default password or cryptographic key. |
|
| PDFs | c520a8c037f78a4e65ca506f76560f9c | |
4.2.3.4.3.1 Password Structure |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 → 33117-j10 → 33117-j20 | |
| Test Name | TC_PASSWORD_STRUCT | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Password Complexity rule |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The setting by the vendor shall be such that a network product shall only accept passwords that comply with the following complexity criteria:
The network product shall use a default minimum length of 10 characters. The minimum length of characters in the passwords shall be configurable by the network operator. The default minimum length is the value configured by the vendor before any network operator-specific configuration has been applied. The special characters can be categorized in sets according to their Unicode category. The network product shall at least support passwords of a length of 64 characters or a length greater than 64 characters. If a central system is used for user authentication, password policy is performed on the central system and additional assurance shall be provided that the central system enforces the same password complexity rules as laid down for the local system in this subclause. If a central system is not used for user authentication, the assurance on password complexity rules shall be performed on the Network Product. When a user is changing a password or entering a new password, the system checks and ensures that it meets the password requirements. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). |
|
| Test Purpose | To verify that password structure adheres to the password complexity criteria. To verify that password structure is configurable as per the complexity criteria. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps: A. Test Case 1
B. Test Case 2
|
|
| Expected Results | Tester can change password only if new password fulfil the password complexity criteria |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation result or report in text form. |
|
| PDFs | 5a3424c78af481c712144b05e94a3c9c | |
4.2.3.4.3.1 Password Structure |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 → 33117-j10 → 33117-j20 | |
| Test Name | TC_PASSWORD_STRUCT | |
| Threat Reference | ||
| Requirement Name | Password Complexity rule |
|
| Requirement Reference | ||
| Requirement Description | The setting by the vendor shall be such that a network product shall only accept passwords that comply with the following complexity criteria:
The network product shall use a default minimum length of 10 characters. The minimum length of characters in the passwords shall be configurable by the operator. The default minimum length is the value configured by the vendor before any operator-specific configuration has been applied. The special characters may be categorized in sets according to their Unicode category. The network product shall at least support passwords of a length of 64 characters or a length greater than 64 characters. If a central system is used for user authentication, password policy is performed on the central system and additional assurance shall be provided that the central system enforces the same password complexity rules as laid down for the local system in this subclause. If a central system is not used for user authentication, the assurance on password complexity rules shall be performed on the Network Product. When a user is changing a password or entering a new password, the system checks and ensures that it meets the password requirements. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). Security Objective references: Hardening. |
|
| Test Purpose | To verify that password structure adheres to the password complexity criteria. To verify that password structure is configurable as per the complexity criteria. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps: A. Test Case 1
B. Test Case 2
|
|
| Expected Results | Tester can change password only if new password fulfil the password complexity criteria |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation result or report in text form. |
|
| PDFs | 745e11cee0e5b5bee0fdf50ee6f334fc | |
4.2.3.4.3.2 Password changes |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PASSWORD_CHANGES | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Password changes |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If a password is used as an authentication attribute, then the system shall offer a function that enables a user to change his password at any time. When an external centralized system for user authentication is used it is possible to redirect or implement this function on this system. Password change shall be enforced after initial login. The system shall enforce password change based on password management policy. In particular, the system shall enforce password expiry. Previously used passwords shall not be allowed up to a certain number (Password History).\ The number of disallowed previously used passwords shall be:
When a password is about to expire a password expiry notification shall be provided to the user. Above requirements shall be applicable for all passwords used(e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. |
|
| Test Purpose |
|
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps: A. Positive Test Case 1: Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: 1 The tester logs into network product application using a privileged account . 2 The network product application generates password expiry notification for user Y to force user Y to change the password. 3 The tester logs out as a privileged user and logs on as user Y.
5 The network product application confirms change in password by, for example, displaying "Password Changed Successfully". 6 The tester successfully logs-in the network product application as user Y using the new password. Case 3:
B. Negative Test Case 1: Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: No negative test case for this scenario. Case 3:
|
|
| Expected Results | A. Positive Test Case 1: Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: Tester can successfully change the password. Case 3: Tester can successfully change the password. B. Negative Test If the negative test case passes, this shows that network product application does not work properly and it violates the requirement. Case 1: Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: No negative test case for this scenario. Case 3: The tester cannot successfully change the password. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation result. |
|
| PDFs | 60c13f93b73347c46a0235d8d5ae641b | |
4.2.3.4.3.2 Password changes |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PASSWORD_CHANGES | |
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | If a password is used as an authentication attribute, then the system shall offer a function that enables a user to change his password at any time. When an external centralized system for user authentication is used it is possible to redirect or implement this function on this system. Password change shall be enforced after initial login. The system shall enforce password change based on password management policy. In particular, the system shall enforce password expiry. Previously used passwords shall not be allowed up to a certain number (Password History).\ The number of disallowed previously used passwords shall be:
When a password is about to expire a password expiry notification shall be provided to the user. Above requirements shall be applicable for all passwords used(e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. Security Objective references: tba. |
|
| Test Purpose |
|
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps: A. Positive Test Case 1: Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: 1 The tester logs into network product application using a privileged account . 2 The network product application generates password expiry notification for user Y to force user Y to change the password. 3 The tester logs out as a privileged user and logs on as user Y.
5 The network product application confirms change in password by, for example, displaying "Password Changed Successfully". 6 The tester successfully logs-in the network product application as user Y using the new password. Case 3:
B. Negative Test Case 1: Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: No negative test case for this scenario. Case 3:
|
|
| Expected Results | A. Positive Test Case 1: Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: Tester can successfully change the password. Case 3: Tester can successfully change the password. B. Negative Test If the negative test case passes, this shows that network product application does not work properly and it violates the requirement. Case 1: Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3. Case 2: No negative test case for this scenario. Case 3: The tester cannot successfully change the password. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation result. |
|
| PDFs | 57a838bb4db5ef6ae4bd1c35483ad8b1 | |
4.2.3.4.3.3 Protection against brute force and dictionary attacks |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_AGAINST_BRUTE_FORCE_AND_DICTIONARY_ATTACKS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Protection against brute force and dictionary attacks |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If a password is used as an authentication attribute, a protection against brute force and dictionary attacks that hinder password guessing shall be implemented. Brute force and dictionary attacks aim to use automated guessing to ascertain passwords for user and machine accounts. Various measures or a combination of these measures can be taken to prevent this. The most commonly used protection measures are:
In order to achieve higher security, it is often meaningful to combine two or more of the measures named here. It is left to the vendor to select appropriate measures. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. |
|
| Test Purpose | To ensure that the system uses a mechanism with adequate protection against brute force and dictionary attacks To check whether system follows commonly used preventive measures which are mentioned below.
|
|
| Pre-Conditions | This test applies only when the most commonly used protection measures used in the requirement are implemented. If they are not implemented, then the vendor documentation needs to provide alternative measures and the tester needs to develop suitable tests for these alternative measures. Since a vendor is free to select appropriate measures, only the vendor selected measures are to be tested.
|
|
| Execution Steps | Execute the following steps: A. Positive Test Case 1: Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password and correct CAPTCHA. Case 4: If the recommended protection measures mentioned in the Requirement Description are not implemented in the Network Product, the tester checks if the alternative measures described in the vendor provided documentation are meaningful and develops suitable test cases to verify their correct implementation. In some cases the network product class can have two or more of the attack prevention methods available, which are a combination of Cases 1-3. In such cases the tester will need to run a combination of these test cases. B. Negative Test Case 1: Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password without and with incorrect CAPTCHA. Case 4:
|
|
| Expected Results | A. Positive Test Case 1: Expected result for the test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: Tester can login only after entering the correct password and CAPTCHA. Case 4: The tester assesses the alternative measures for brute force and dictionary attack mitigation as meaningful and all developed test cases can be completed successfully. B. Negative Test Case 1: Expected result for the use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: Tester cannot successfully log in to the network product. Case 4: Tester cannot successfully change the password to the disallow listed password. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation result. |
|
| PDFs | 9501f3b9db401a1107e38c6d359d0f77 | |
4.2.3.4.3.3 Protection against brute force and dictionary attacks |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECT_AGAINST_BRUTE_FORCE_AND_DICTIONARY_ATTACKS | |
| Threat Reference | ||
| Requirement Name | Protection against brute force and dictionary attacks |
|
| Requirement Reference | ||
| Requirement Description | If a password is used as an authentication attribute, a protection against brute force and dictionary attacks that hinder password guessing shall be implemented. Brute force and dictionary attacks aim to use automated guessing to ascertain passwords for user and machine accounts. Various measures or a combination of these measures can be taken to prevent this. The most commonly used protection measures are:
In order to achieve higher security, it is often meaningful to combine two or more of the measures named here. It is left to the vendor to select appropriate measures. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. Security Objective references: tba. |
|
| Test Purpose | To ensure that the system uses a mechanism with adequate protection against brute force and dictionary attacks To check whether system follows commonly used preventive measures which are mentioned below.
|
|
| Pre-Conditions | This test applies only when the most commonly used protection measures used in the requirement are implemented. If they are not implemented, then the vendor documentation needs to provide alternative measures and the tester needs to develop suitable tests for these alternative measures. Since a vendor is free to select appropriate measures, only the vendor selected measures are to be tested.
|
|
| Execution Steps | Execute the following steps: A. Positive Test Case 1: Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3:
In some cases the network product class can have two or more of the attack prevention methods available, which are a combination of Cases 1-3. In such cases the tester will need to run a combination of these test cases. B. Negative Test Case 1: Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3:
Case 4:
|
|
| Expected Results | A. Positive Test Case 1: Expected result for the test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: Tester can login only after entering the correct password and CAPTCHA. Case 4: The tester assesses the alternative measures for brute force and dictionary attack mitigation as meaningful and all developed test cases can be completed successfully. B. Negative Test Case 1: Expected result for the use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5. Case 2: Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5. Case 3: Tester cannot successfully log in to the network product. Case 4: Tester cannot successfully change the password to the blacklisted password. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot containing the operation result. |
|
| PDFs | 3867fd5cd57043234720697a4cd7f05e | |
4.2.3.4.3.4 Hiding password display |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HIDING_PASSWORD_DISPLAY | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Hiding password display |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances an individual character may be displayed briefly during input. Such a function is used, for example, on smartphones to make input easier. However, the entire password is never output to the display in plaintext. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. |
|
| Test Purpose | Verify that the given password is not visible to the casual local observer. |
|
| Pre-Conditions | Tester has account with username and password in the network product. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances an individual character may be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation results. |
|
| PDFs | 7cbec199e58c439d24c6a2c01279b878 | |
4.2.3.4.3.4 Hiding password display |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HIDING_PASSWORD_DISPLAY | |
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances it may be permissible for an individual character to be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext. Above requirements shall be applicable for all passwords used(e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts. Security Objective references: tba. |
|
| Test Purpose | Verify that the given password is not visible to the casual local observer. |
|
| Pre-Conditions | Tester has account with username and password in the network product. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances it may be permissible for an individual character to be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation results. |
|
| PDFs | a4c5bcb06d56448f34a56af02313fb8f | |
4.2.3.4.4.1 Network Product Management and Maintenance interfaces |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_MUTUAL_AUTHENTICATION-ON_NETWORK_PRODUCT_MANAGEMENT_PROTOCOLS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Network Product Management and Maintenance interfaces |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product management shall support mutual authentication mechanisms, the mutual authentication mechanism can rely on the protocol used for the interface itself or other means. |
|
| Test Purpose | Verify that: There is mutual authentication of entities for management interfaces on the network product. |
|
| Pre-Conditions | Documentation that lists each of the management protocols and describes the authentication mechanism used for each one. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test result pass/fail recorded by tester. |
|
| PDFs | 11df60e2fa9f8e8a84650d4b2da26f0c | |
4.2.3.4.4.1 Network Product Management and Maintenance interfaces |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_MUTUAL_AUTHENTICATION-ON_NETWORK_PRODUCT_MANAGEMENT_PROTOCOLS | |
| Threat Reference | ||
| Requirement Name | Network Product Management and Maintenance interfaces |
|
| Requirement Reference | ||
| Requirement Description | The network product management shall support mutual authentication mechanisms, the mutual authentication mechanism can rely on the protocol used for the interface itself or other means. Security Objective references: Secure Network Product Administration. |
|
| Test Purpose | Verify that: There is mutual authentication of entities for management interfaces on the network product. |
|
| Pre-Conditions | Documentation that lists each of the management protocols and describes the authentication mechanism used for each one. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Test result pass/fail recorded by tester. |
|
| PDFs | 9014ad1a668942e7d5fb6e32bd87377f | |
4.2.3.4.5 Policy regarding consecutive failed login attempts |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FAILED_LOGIN_ATTEMPTS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Policy regarding consecutive failed login attempts |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the network operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the network operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec. b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked. |
|
| Test Purpose | To ensure that the policy regarding failed login attempts is adhered to. Case 1: Testing for requirement 4.2.3.4.5 a) |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence containing the results of all login attempts, e.g. screenshots, log files, configurations, error messages. Case 2: Testing for requirement 4.2.3.4.5 b) |
|
| PDFs | ec641af3cf899721951c68c7fc4be30e | |
4.2.3.4.5 Policy regarding consecutive failed login attempts |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FAILED_LOGIN_ATTEMPTS | |
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec. b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked. Security Objective references: tba. |
|
| Test Purpose | To ensure that the policy regarding failed login attempts is adhered to. Case 1: Testing for requirement 4.2.3.4.5 a) |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | tba Case 2: Testing for requirement 4.2.3.4.5 b) |
|
| PDFs | 18cad92772ca96853be38724f30fe7a9 | |
4.2.3.4.5(2) Policy regarding consecutive failed login attempts |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FAILED_LOGIN_ATTEMPTS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Policy regarding consecutive failed login attempts |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the network operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the network operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec. b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked. |
|
| Test Purpose | To ensure that the policy regarding failed login attempts is adhered to. Case 1: Testing for requirement 4.2.3.4.5 a) |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
5a. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for an unprivileged user. 5b. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a user with administrative access rights. |
|
| Expected Results | In execution step 5a it is verified that the user cannot login at any execution step. In execution step 5b it is verified that an administrator user can successfully login only at execution step 5b. |
|
| Expected Format of Evidence | Evidence containing the results of all login attempts, e.g. screenshots, log files, configurations, error messages. |
|
| PDFs | 118a2659497a95111b912deeac12cc7d | |
4.2.3.4.5(2) Policy regarding consecutive failed login attempts |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FAILED_LOGIN_ATTEMPTS | |
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec. b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked. Security Objective references: tba. |
|
| Test Purpose | To ensure that the policy regarding failed login attempts is adhered to. Case 1: Testing for requirement 4.2.3.4.5 a) |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
5a. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a normal user. 5b. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a user with administrative access rights. |
|
| Expected Results | In execution step 5a it is verified that the user cannot login at any execution step. In execution step 5b it is verified that an administrator user can successfully login only at execution step 5b. |
|
| Expected Format of Evidence | tba |
|
| PDFs | 2c97955ffa4c9856b06278943f9503ab | |
4.2.3.4.6.1 Authorization policy |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4] verify authorization policy is in place and that user access and data access in the system are according to the authorization policy. |
|
| Requirement Name | Authorization policy |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The authorizations for accounts and applications shall be reduced to the minimum required for the tasks they have to perform. Authorizations to a system shall be restricted to a level in which a user can only access data and use functions that he needs in the course of his work. Suitable authorizations shall also be assigned for access to files that are components of the operating system or of applications or that are generated by the same (e.g. configuration and logging files). Alongside access to data, execution of applications and components shall also take place with rights that are as low as possible. Applications should not be executed with administrator or system rights. |
|
| Test Purpose | ||
| Pre-Conditions | Documentation describing the authorization policy defined for the system including details on the lowest access rights assigned to user accounts, access to data, application execution and components. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Pass/fail results as recorded by the tester. |
|
| PDFs | 8c2b06609e77ca2526d5ae4de2ed51ac | |
4.2.3.4.6.1 Authorization policy |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | The authorizations for accounts and applications shall be reduced to the minimum required for the tasks they have to perform. Authorizations to a system shall be restricted to a level in which a user can only access data and use functions that he needs in the course of his work. Suitable authorizations shall also be assigned for access to files that are components of the operating system or of applications or that are generated by the same (e.g. configuration and logging files). Alongside access to data, execution of applications and components shall also take place with rights that are as low as possible. Applications should not be executed with administrator or system rights. Security Objective references: tba. verify authorization policy is in place and that user access and data access in the system are according to the authorization policy. |
|
| Test Purpose | ||
| Pre-Conditions | Documentation describing the authorization policy defined for the system including details on the lowest access rights assigned to user accounts, access to data, application execution and components. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Pass/fail results as recorded by the tester. |
|
| PDFs | cfc55ae542fdef3b9a9d6192c6db26f4 | |
4.2.3.4.6.2 Role-based access control |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Role-based access control |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall support Role Based Access Control (RBAC). A role-based access control system uses a set of controls which determines how users interact with domains and resources. The domains could be Fault Management (FM), Performance Management (PM), System Admin, etc. The RBAC system controls how users or groups of users are allowed access to the various domains and what type of operation they can perform, i.e. the specific operation command or command group (e.g. View, Modify, Execute). The network product supports RBAC, in particular, for O&M privilege management for network product Management and Maintenance, including authorization of the operation for configuration data and software via the network product console interface. |
|
| Test Purpose | Verify that users are granted access with role-based privileges. |
|
| Pre-Conditions | Documentation describing the role based access control system including details on which user roles are defined. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Pass/fail results as recorded by the tester. |
|
| PDFs | 5c1e780267294fe3d1c4717e62706a62 | |
4.2.3.4.6.2 Role-based access control |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | ||
| Requirement Name | tba |
|
| Requirement Reference | ||
| Requirement Description | The network product shall support Role Based Access Control (RBAC). A role-based access control system uses a set of controls which determines how users interact with domains and resources. The domains could be Fault Management (FM), Performance Management (PM), System Admin, etc. The RBAC system controls how users or groups of users are allowed access to the various domains and what type of operation they can perform, i.e. the specific operation command or command group (e.g. View, Modify, Execute). The network product supports RBAC, in particular, for OAM privilege management for network product Management and Maintenance, including authorization of the operation for configuration data and software via the network product console interface. Security Objective references: tba. |
|
| Test Purpose | Verify that users are granted access with role-based privileges. |
|
| Pre-Conditions | Documentation describing the role based access control system including details on which user roles are defined. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Pass/fail results as recorded by the tester. |
|
| PDFs | d20deca123e50eeb041eb54e3726d45b | |
4.2.3.5.1 Protecting sessions -- logout function |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTING_SESSION_LOGOUT | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Protecting sessions -- logout function |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The system shall have a function that allows a signed in user to logout at any time. All processes under the logged in user ID shall be terminated on log out. The network product shall be able to continue to operate without interactive sessions. Only for debugging purposes, processes under a logged in user ID may be allowed to continue to run after detaching the interactive session. |
|
| Test Purpose | To ensure a signed in user can logout at any time. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | a237b3fb05fb680e16cda7bc55c55d18 | |
4.2.3.5.1 Protecting sessions -- logout function |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTING_SESSION_LOGOUT | |
| Threat Reference | ||
| Requirement Name | Protecting sessions -- logout function |
|
| Requirement Reference | ||
| Requirement Description | The system shall have a function that allows a signed in user to logout at any time. All processes under the logged in user ID shall be terminated on log out. The network product shall be able to continue to operate without interactive sessions. Only for debugging purposes, processes under a logged in user ID may be allowed to continue to run after detaching the interactive session. Security Objective references: tba. |
|
| Test Purpose | To ensure a signed in user can logout at any time. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 181d118f622c78d4a349b5c81901f97b | |
4.2.3.5.2 Protecting sessions -- Inactivity timeout |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTING_SESSION_ INAC TIMEOUT | |
| Threat Reference | ||
| Requirement Name | Protecting sessions -- inactivity timeout |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | An O&M user interactive session shall be terminated automatically after a specified period of inactivity. It shall be possible to configure an inactivity time-out period. Note: The kind of activity required to reset the timeout timer depends on the type of user session. |
|
| Test Purpose | To ensure an O&M user interactive session shall be terminated at inactivity timeout. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 825db27d7323195448df684c5cd732e8 | |
4.2.3.5.2 Protecting sessions -- Inactivity timeout |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTING_SESSION_ INAC TIMEOUT | |
| Threat Reference | ||
| Requirement Name | Protecting sessions -- inactivity timeout |
|
| Requirement Reference | ||
| Requirement Description | An OAM user interactive session shall be terminated automatically after a specified period of inactivity. It shall be possible to configure an inactivity time-out period. Note: The kind of activity required to reset the timeout timer depends on the type of user session. |
|
| Test Purpose | To ensure an OAM user interactive session shall be terminated at inactivity timeout. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Security Objective references: tba. |
|
| PDFs | 4acce6b6dfead96dea162c045e098972 | |
4.2.3.6.1 Security event logging |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SECURITY_EVENT_LOGGING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Security event logging |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Security events shall be logged together with a unique system reference (e.g. host name, IP or MAC address) and the exact time the incident occurred. For each security event, the log entry shall include user name and/or timestamp and/or performed action and/or result and/or length of session and/or values exceeded and/or value reached. IETF RFC 3871 [x], section 2.11.10 specifies the minimum set of security events. Each vendor shall document what security events the product logs so that it can be verified by testing. In particular, it shall be possible to log the following events (which are intended to be supported by the network product and which can be enabled by default at manufacturing time or at a later time by the network operator): +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Incorrect | Records any user | • Username, | | login | incorrect login | | | attempts | attempts to the | • Source (IP address) if | | | network product | remote access | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Administrator | Records any access | • Username, | | access | attempts to accounts | | | | that have system | • Timestamp, | | | privileges. | | | | | • Length of session, | | | | | | | | • Source (IP address) if | | | | remote access | +---------------+-----------------------+------------------------------+ | Account | Records all account | • Administrator username, | | a | administration | | | dministration | activity, i.e. | • Administered account, | | | configure, delete, | | | | enable, and disable. | • Activity performed | | | | (configure, delete, enable | | | | and disable) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | | | | +---------------+-----------------------+------------------------------+ | Resource | Records events that | • Value exceeded, | | Usage | have been triggered | | | | when system parameter | • Value reached | | | values such as disk | | | | space, CPU load over | (Here suitable threshold | | | a longer period have | values shall be defined | | | exceeded their | depending on the individual | | | defined thresholds. | system.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Configuration | Changes to | • Change made | | change | configuration of the | | | | network device | • Username | +---------------+-----------------------+------------------------------+ | Reboot/s | This event records | • Action performed (reboot, | | hutdown/crash | any action on the | shutdown, etc.) | | | network device that | | | | forces a reboot or | • Username (for intentional | | | shutdown OR where the | actions) | | | network device has | | | | crashed. | • Timestamp | +---------------+-----------------------+------------------------------+ | Interface | Change to the status | • Interface name and type | | status change | of interfaces on the | | | | network device (e.g. | • Status (shutdown, missing | | | shutdown) | link, etc.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ In addition, optionally it shall be possible to log also the following event (if supported): +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Change of | Any change of group | • Administrator username, | | group | membership for | | | membership or | accounts | • Administered account, | | accounts | | | | | | • Activity performed (group | | | | added or removed) | | | | | | | | • Timestamp. | +---------------+-----------------------+------------------------------+ |
|
| Test Purpose | To verify that the network product correctly logs all required security event types. |
|
| Pre-Conditions |
|
|
| Execution Steps | For each O&M service perform the following test steps
|
|
| Expected Results | All security events are appropriately logged, including all required event data. |
|
| Expected Format of Evidence | The testing report contains the following information for each security event:
|
|
| PDFs | 2f5c5fb8f2be253a75d6e8a60929df13 | |
4.2.3.6.1 Security event logging |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SECURITY_EVENT_LOGGING | |
| Threat Reference | ||
| Requirement Name | Security event logging |
|
| Requirement Reference | ||
| Requirement Description | Security events shall be logged together with a unique system reference (e.g. host name, IP or MAC address) and the exact time the incident occurred. For each security event, the log entry shall include user name and/or timestamp and/or performed action and/or result and/or length of session and/or values exceeded and/or value reached. IETF RFC 3871, section 2.11.10 specifies the minimum set of security events. Each vendor shall document what security events the product logs so that it can be verified by testing. In particular, it shall be possible to log the following events (which are intended to be supported by the network product and which can be enabled by default at manufacturing time or at a later time by the operator): +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Incorrect | Records any user | • Username, | | login | incorrect login | | | attempts | attempts to the | • Source (IP address) if | | | network product | remote access | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Administrator | Records any access | • Username, | | access | attempts to accounts | | | | that have system | • Timestamp, | | | privileges. | | | | | • Length of session, | | | | | | | | • Source (IP address) if | | | | remote access | +---------------+-----------------------+------------------------------+ | Account | Records all account | • Administrator username, | | a | administration | | | dministration | activity, i.e. | • Administered account, | | | configure, delete, | | | | enable, and disable. | • Activity performed | | | | (configure, delete, enable | | | | and disable) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | | | | +---------------+-----------------------+------------------------------+ | Resource | Records events that | • Value exceeded, | | Usage | have been triggered | | | | when system parameter | • Value reached | | | values such as disk | | | | space, CPU load over | (Here suitable threshold | | | a longer period have | values shall be defined | | | exceeded their | depending on the individual | | | defined thresholds. | system.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Configuration | Changes to | • Change made | | change | configuration of the | | | | network device | • Username | +---------------+-----------------------+------------------------------+ | Reboot/s | This event records | • Action performed (reboot, | | hutdown/crash | any action on the | shutdown, etc.) | | | network device that | | | | forces a reboot or | • Username (for intentional | | | shutdown OR where the | actions) | | | network device has | | | | crashed. | • Timestamp | +---------------+-----------------------+------------------------------+ | Interface | Change to the status | • Interface name and type | | status change | of interfaces on the | | | | network device (e.g. | • Status (shutdown, missing | | | shutdown) | link, etc.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ In addition, optionally it shall be possible to log also the following event (if supported): +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Change of | Any change of group | • Administrator username, | | group | membership for | | | membership or | accounts | • Administered account, | | accounts | | | | | | • Activity performed (group | | | | added or removed) | | | | | | | | • Timestamp. | +---------------+-----------------------+------------------------------+ Security Objective references: tba. |
|
| Test Purpose | To verify that the network product correctly logs all required security event types. |
|
| Pre-Conditions |
|
|
| Execution Steps | For each O&M service perform the following test steps
|
|
| Expected Results | All security events are appropriately logged, including all required event data. |
|
| Expected Format of Evidence | The testing report contains the following information for each security event:
|
|
| PDFs | b9309d5e868c1f12f775f750c9eb8132 | |
4.2.3.6.2 Log transfer to centralized storage |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4]Test Name: TC_LOG TRANS_TO_CENTR STORAGE |
|
| Requirement Name | Log transfer to centralized storage |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | a. The Network Product shall support forwarding of security event logging data to an external system. Secure transport protocols in accordance with clause 4.2.3.2.4, shall be used. b. Log functions should support secure uploading of log files to a central location or to an external system for the Network Product that is logging. |
|
| Test Purpose | To ensure log shall be transferred to centralized storage. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 1010deae40dde156c8cc189bacfff410 | |
4.2.3.6.2 Log transfer to centralized storage |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_LOG TRANS_TO_CENTR STORAGE |
|
| Threat Reference | ||
| Requirement Name | Log transfer to centralized storage |
|
| Requirement Reference | ||
| Requirement Description | a. The Network Product shall support forwarding of security event logging data to an external system. Secure transport protocols in accordance with clause 4.2.3.2.4, shall be used. b. Log functions should support secure uploading of log files to a central location or to an external system for the Network Product that is logging. Security Objective references: tba. |
|
| Test Purpose | To ensure log shall be transferred to centralized storage. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 1ec97ca48e16ebfaf93fb65e1da02c29 | |
4.2.3.6.3 Protection of security event log files |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Protection of security event log files |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The security event log shall be access controlled (file access rights) so only privileged users have access to the log files. |
|
| Test Purpose | Verify that the log(s) is(are) only accessible by privileged user(s). |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The tester checks that log files are accessible when a user with the appropriate authorisation attempts to access them and fails when a user without the correct permissions attempts to access them |
|
| Expected Format of Evidence | Pass/fail result as recorded by the tester. |
|
| PDFs | 695302fe569baff1fc9512810ff0578b | |
4.2.3.6.3 Protection of security event log files |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | ||
| Requirement Name | Protection of security event log files |
|
| Requirement Reference | ||
| Requirement Description | The security event log shall be access controlled (file access rights) so only privileged users have access to the log files. Security Objective references: tba. |
|
| Test Purpose | Verify that the log(s) is(are) only accessible by privileged user(s). |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The tester checks that log files are accessible when a user with the appropriate authorisation attempts to access them and fails when a user without the correct permissions attempts to access them |
|
| Expected Format of Evidence | Pass/fail result as recorded by the tester. |
|
| PDFs | c9353d6fe1a1acc4898a0be0519b0cb7 | |
4.2.4.1.1.1 Handling of growing content |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING_OF_GROWING_CONTENT | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Handling of growing content. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Growing or dynamic content (e.g. log files, uploads) shall not influence system functions. A file system that reaches its maximum capacity shall not stop a system from operating properly. Therefore, countermeasures shall be taken such as usage of dedicated filesystems, separated from main system functions, or quotas, or at least a file system monitoring to ensure that this scenario is avoided. |
|
| Test Purpose | To verify that the growing or dynamic content does not influence system functions. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | System monitoring data (e.g. Alarms, logs, CPU utilization, etc.). |
|
| PDFs | 972e3ed321c6ef786e25cc7fe522745b | |
4.2.4.1.1.1 Handling of growing content |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING_OF_GROWING_CONTENT | |
| Threat Reference | ||
| Requirement Name | Growing (dynamic) content shall not influence system functions. |
|
| Requirement Reference | ||
| Requirement Description | Growing or dynamic content (e.g. log files, uploads) shall not influence system functions. A file system that reaches its maximum capacity shall not stop a system from operating properly. Therefore, countermeasures shall be taken such as usage of dedicated filesystems, separated from main system functions, or quotas, or at least a file system monitoring to ensure that this scenario is avoided. |
|
| Test Purpose | To verify that the growing or dynamic content does not influence system functions. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | System monitoring data (e.g. Alarms, logs, CPU utilization, etc.). |
|
| PDFs | 6f580005d2c964c0b397b424ab8e38b5 | |
4.2.4.1.1.2 Handling of ICMP |
Home → General → 18.2.0 |
| 33117-h00 → 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING_OF_ICMP | |
| Threat Reference | TR 33.926 [4] The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Requirement Name | Processing of ICMPv4 and ICMPv6 packets |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Processing of ICMPv4 and ICMPv6 packets which are not required for operation shall be disabled on the network product. In particular, there are certain types of ICMP4 and ICMPv6 that are not used in most networks, but represent a risk. ICMP message types which on receipt lead to responses or to configuration changes are not mentioned in this requirement, but they may be necessary to support relevant and specified networking features. Those shall be documented. Certain ICMP types are generally permitted and do not need to be specifically documented. Those are marked as "Permitted" in below table. The network product shall not send certain ICMP types by default, but it may support the option to enable utilization of these types (e.g. for debugging). This is marked as "Optional" in below table. +-------------+-----------+--------------+-------------+-------------+ | Type (IPv4) | Type | Description | Send | Respond to | | | (IPv6) | | | | +-------------+-----------+--------------+-------------+-------------+ | 0 | 128 | Echo Reply | Optional | N/A | | | | | | | | | | | (i.e. as | | | | | | automatic | | | | | | reply to | | | | | | "Echo | | | | | | Request") | | +-------------+-----------+--------------+-------------+-------------+ | 3 | 1 | Destination | Permitted | N/A | | | | Unreachable | | | +-------------+-----------+--------------+-------------+-------------+ | 8 | 129 | Echo Request | Permitted | Optional | +-------------+-----------+--------------+-------------+-------------+ | 11 | 3 | Time | Optional | N/A | | | | Exceeded | | | +-------------+-----------+--------------+-------------+-------------+ | 12 | 4 | Parameter | Permitted | N/A | | | | Problem | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 2 | Packet Too | Permitted | N/A | | | | Big | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 135 | Neigbor | Permitted | Permitted | | | | Solicitation | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 136 | Neighbor | Permitted | N/A | | | | A | | | | | | dvertisement | | | +-------------+-----------+--------------+-------------+-------------+ The network product shall not respond to, or process (i.e. do changes to configuration), under any circumstances certain ICMP message types as marked in below table. +----------+---------+-----------+-----------+-----------+-----------+ | Type | Type | De | Send | Respond | Process | | (IPv4) | (IPv6) | scription | | to | (i.e. do | | | | | | | changes | | | | | | | to | | | | | | | confi | | | | | | | guration) | +----------+---------+-----------+-----------+-----------+-----------+ | 5 | 137 | Redirect | N/A | N/A | Not | | | | | | | Permitted | +----------+---------+-----------+-----------+-----------+-----------+ | 13 | N/A | Timestamp | N/A | Not | N/A | | | | | | Permitted | | +----------+---------+-----------+-----------+-----------+-----------+ | 14 | N/A | Timestamp | Not | N/A | N/A | | | | Reply | Permitted | | | | | | | | | | | | | | (i.e. as | | | | | | | automatic | | | | | | | reply to | | | | | | | "Tim | | | | | | | estamp") | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 133 | Router | N/A | Not | Not | | | | Sol | | Permitted | Permitted | | | | icitation | | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 134 | Router | N/A | N/A | Not | | | | Adve | | | Permitted | | | | rtisement | | | | +----------+---------+-----------+-----------+-----------+-----------+ |
|
| Test Purpose | To verify that the network product does not reply to certain ICMP types in accordance with the requirement. To verify that the network product does not send 'Time Exceeded'. To verify that the network product does not process the following ICMPv4 and ICMPv6 types:
|
|
| Pre-Conditions |
|
|
| Execution Steps | The following needs to be done for all IP protocol versions (IPv4 and/or IPv6) supported by the network element. For verifying that the network product does not reply to ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that
For verifying that the network product does not change its configuration due to receiving ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that
The tester utilizes appropriate means to verify consistency between the documentation in regard to ICMP and the network product. |
|
| Expected Results | The ICMP messages which are "Not Permitted" to generate a response from the network product do not generate a response. The ICMP messages which are "Not Permitted" to change the configuration of the network element do not change the configuration. ICMP message types which lead to responses or to configuration changes on receipt, if neither mentioned in the requirement nor in the documentation, are not enabled. |
|
| Expected Format of Evidence | The following information needs to be retained and included into the report as appropriate:
|
|
| PDFs | 29c7e93dcaba46b1e1c49b343fbcc463 | |
4.2.4.1.1.2 Handling of ICMP |
Home → General → 17.1.0 |
| 33117-h00 →  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING_OF_ICMP | |
| Threat Reference | ||
| Requirement Name | Processing of ICMPv4 and ICMPv6 packets |
|
| Requirement Reference | ||
| Requirement Description | Processing of ICMPv4 and ICMPv6 packets which are not required for operation shall be disabled on the network product. In particular, there are certain types of ICMP4 and ICMPv6 that are not used in most networks, but represent a risk. ICMP message types which on receipt lead to responses or to configuration changes are not mentioned in this requirement, but they may be necessary to support relevant and specified networking features. Those must be documented. Certain ICMP types are generally permitted and do not need to be specifically documented. Those are marked as "Permitted" in below table. The network product shall not send certain ICMP types by default, but it may support the option to enable utilization of these types (e.g. for debugging). This is marked as "Optional" in below table. +-------------+-----------+--------------+-------------+-------------+ | Type (IPv4) | Type | Description | Send | Respond to | | | (IPv6) | | | | +-------------+-----------+--------------+-------------+-------------+ | 0 | 128 | Echo Reply | Optional | N/A | | | | | | | | | | | (i.e. as | | | | | | automatic | | | | | | reply to | | | | | | "Echo | | | | | | Request") | | +-------------+-----------+--------------+-------------+-------------+ | 3 | 1 | Destination | Permitted | N/A | | | | Unreachable | | | +-------------+-----------+--------------+-------------+-------------+ | 8 | 129 | Echo Request | Permitted | Optional | +-------------+-----------+--------------+-------------+-------------+ | 11 | 3 | Time | Optional | N/A | | | | Exceeded | | | +-------------+-----------+--------------+-------------+-------------+ | 12 | 4 | Parameter | Permitted | N/A | | | | Problem | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 2 | Packet Too | Permitted | N/A | | | | Big | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 135 | Neigbor | Permitted | Permitted | | | | Solicitation | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 136 | Neighbor | Permitted | N/A | | | | A | | | | | | dvertisement | | | +-------------+-----------+--------------+-------------+-------------+ The network product shall not respond to, or process (i.e. do changes to configuration), under any circumstances certain ICMP message types as marked in below table. +----------+---------+-----------+-----------+-----------+-----------+ | Type | Type | De | Send | Respond | Process | | (IPv4) | (IPv6) | scription | | to | (i.e. do | | | | | | | changes | | | | | | | to | | | | | | | confi | | | | | | | guration) | +----------+---------+-----------+-----------+-----------+-----------+ | 5 | 137 | Redirect | N/A | N/A | Not | | | | | | | Permitted | +----------+---------+-----------+-----------+-----------+-----------+ | 13 | N/A | Timestamp | N/A | Not | N/A | | | | | | Permitted | | +----------+---------+-----------+-----------+-----------+-----------+ | 14 | N/A | Timestamp | Not | N/A | N/A | | | | Reply | Permitted | | | | | | | | | | | | | | (i.e. as | | | | | | | automatic | | | | | | | reply to | | | | | | | "Tim | | | | | | | estamp") | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 133 | Router | N/A | Not | Not | | | | Sol | | Permitted | Permitted | | | | icitation | | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 134 | Router | N/A | N/A | Not | | | | Adve | | | Permitted | | | | rtisement | | | | +----------+---------+-----------+-----------+-----------+-----------+ The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | To verify that the network product does not reply to certain ICMP types in accordance with the requirement. To verify that the network product does not send 'Time Exceeded'. To verify that the network product does not process the following ICMPv4 and ICMPv6 types:
|
|
| Pre-Conditions |
|
|
| Execution Steps | The following needs to be done for all IP protocol versions (IPv4 and/or IPv6) supported by the network element. For verifying that the network product does not reply to ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that
For verifying that the network product does not change its configuration due to receiving ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that
The tester utilizes appropriate means to verify consistency between the documentation in regard to ICMP and the network product. |
|
| Expected Results | The ICMP messages which are "Not Permitted" to generate a response from the network product do not generate a response. The ICMP messages which are "Not Permitted" to change the configuration of the network element do not change the configuration. ICMP message types which lead to responses or to configuration changes on receipt, if neither mentioned in the requirement nor in the documentation, are not enabled. |
|
| Expected Format of Evidence | The following information needs to be retained and included into the report as appropriate:
|
|
| PDFs | 85290e82dbc1cf0bd70bbd80a41f672b | |
4.2.4.1.1.3 Handling of IP options and extensions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING-IP-OPTIONS-AND-EXTENSIONS | |
| Threat Reference | TR 33.926 [4] The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Requirement Name | Handling of IP options and extensions |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | IP packets with unnecessary options or extension headers shall not be processed. IP options and extension headers (e.g. source routing) are only required in exceptional cases. So, all packets with enabled IP options or extension headers shall be filtered. |
|
| Test Purpose | To verify that the network product provides functionality to filter out IP packets with unnecessary options or extension headers. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. The tester establishes an O&M session on if1 interface b. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv4 TCP SYN packet with an appropriate destination portto if1 interface without setting any IP Options c. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back. d. Using the tool (e.g. Scapy) the tester sends an IPv4 TCP SYN packet with an appropriate destination port and an IP Option set to the if1 interface e. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.
a. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv6 TCP SYN packet with an appropriate destination port to if1 interface without setting any extension header b. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back. c. Using the tool (e.g. Scapy) the tester sends an IPv6 TCP SYN packet with an appropriate destination port and an extension header set to the if1 interface d. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule. |
|
| Expected Results | The network product discards IPv4 packets with unnecessary options or IPv6 packets (assuming the network product supports IPv6) with extension header. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 5c29cb0d926349fb6a1131d9e4754747 | |
4.2.4.1.1.3 Handling of IP options and extensions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_HANDLING-IP-OPTIONS-AND-EXTENSIONS | |
| Threat Reference | ||
| Requirement Name | IP packets with unnecessary options or extension headers shall not be processed. |
|
| Requirement Reference | ||
| Requirement Description | IP packets with unnecessary options or extension headers shall not be processed. IP options and extension headers (e.g. source routing) are only required in exceptional cases. So, all packets with enabled IP options or extension headers shall be filtered. The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | To verify that the network product provides functionality to filter out IP packets with unnecessary options or extension headers. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. The tester establishes an O&M session on if1 interface b. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv4 TCP SYN packet with an appropriate destination portto if1 interface without setting any IP Options c. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back. d. Using the tool (e.g. Scapy) the tester sends an IPv4 TCP SYN packet with an appropriate destination port and an IP Option set to the if1 interface e. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.
a. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv6 TCP SYN packet with an appropriate destination port to if1 interface without setting any extension header b. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back. c. Using the tool (e.g. Scapy) the tester sends an IPv6 TCP SYN packet with an appropriate destination port and an extension header set to the if1 interface d. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule. |
|
| Expected Results | The network product discards IPv4 packets with unnecessary options or IPv6 packets (assuming the network product supports IPv6) with extension header. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | ec64872267f693e3f49cdb9ede7127c2 | |
4.2.4.1.2.1 Authenticated Privilege Escalation only |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_OS_PRIVILEGE | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Authenticated Privilege Escalation only. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication.. Implementation example: Disable insecure privilege escalation methods so that users are required to (re-)login directly into the account with the required permissions. |
|
| Test Purpose | To ensure that privileged operating system functions shall not be used without successful authentication and authorization, and that violations of this requirement are documented and strictly limited in number and functionality. |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
SUID: find / -perm -4000 -type f -exec ls {} ; > suid_files.txt SGID: find / -perm -2000 -type f -exec ls {} ; > sgid_files.txt Capabilities: getcap -r / 2>/dev/null
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A test report provided by the tester which will consist of the following information:
|
|
| PDFs | 39413d438330bb35796ca0e6cd6d497d | |
4.2.4.1.2.1 Authenticated Privilege Escalation only |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_OS_PRIVILEGE | |
| Threat Reference | ||
| Requirement Name | There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication. |
|
| Requirement Reference | ||
| Requirement Description | There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication.. Implementation example: Disable insecure privilege escalation methods so that users are required to (re-)login directly into the account with the required permissions. |
|
| Test Purpose | To ensure that privileged operating system functions shall not be used without successful authentication and authorization, and that violations of this requirement are documented and strictly limited in number and functionality. |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
SUID: find / -perm -4000 -type f -exec ls {} ; > suid_files.txt SGID: find / -perm -2000 -type f -exec ls {} ; > sgid_files.txt Capabilities: getcap -r / 2>/dev/null
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A test report provided by the accredited evaluator's test lab which will consist of the following information:
|
|
| PDFs | 0401629a7295c9b01378020d91682726 | |
4.2.4.2.2 System account identification |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_UNIQUE_SYSTEM_ACCOUNT_IDENTIFICATION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | System account identification |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Each system account in UNIX® shall have a unique UID. |
|
| Test Purpose | To verify that UNIX® account UIDs are assigned uniquely. |
|
| Pre-Conditions | UNIX® is used on the Network Product. |
|
| Execution Steps |
|
|
| Expected Results | The UIDs are all different and, in particular, only the root account has UID = 0. |
|
| Expected Format of Evidence | ||
| PDFs | d98ce51efeb155e232db810f1c8a8dfc | |
4.2.4.2.2 System account identification |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_UNIQUE_SYSTEM_ACCOUNT_IDENTIFICATION | |
| Threat Reference | ||
| Requirement Name | System account identification |
|
| Requirement Reference | ||
| Requirement Description | Each system account in UNIX® shall have a unique UID. Security Objective references: tba. |
|
| Test Purpose | To verify that UNIX® account UIDs are assigned uniquely. |
|
| Pre-Conditions | UNIX® is used on the MME. |
|
| Execution Steps |
|
|
| Expected Results | The UIDs are all different and, in particular, only the root account has UID = 0. |
|
| Expected Format of Evidence | ||
| PDFs | 74eb713300bfd0d5414d748e6e462ca6 | |
4.2.5.1 HTTPS |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | HTTPS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | HTTPS |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The communication between Web client and Web server shall be protected using TLS. The TLS profile defined in Annex E of TS 33.310 shall be followed with the following modifications: Cipher suites with NULL encryption shall not be supported |
|
| Test Purpose | Verify the above requirement. Procedure and execution steps, expected results, expected format of evidence: These are the same as for the test case in clause 4.2.3.2.4, except that, for execution step 2, it is tested that NULL encryption is not supported. |
|
| Pre-Conditions | ||
| Execution Steps | ||
| Expected Results | ||
| Expected Format of Evidence | ||
| PDFs | dabfaf7f697dd8ddcd5b6e4f073d478c | |
4.2.5.1 HTTPS |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | HTTPS | |
| Threat Reference | ||
| Requirement Name | HTTPS |
|
| Requirement Reference | ||
| Requirement Description | The communication between Web client and Web server shall be protected using TLS. The TLS profile defined in Annex E of TS 33.310 shall be followed with the following modifications: Cipher suites with NULL encryption shall not be supported Security Objective references: tba. |
|
| Test Purpose | Verify the above requirement. Procedure and execution steps, expected results, expected format of evidence: These are the same as for the test case in clause 4.2.3.2.4, except that, for execution step 2, it is tested that NULL encryption is not supported. |
|
| Pre-Conditions | ||
| Execution Steps | ||
| Expected Results | ||
| Expected Format of Evidence | ||
| PDFs | c2755690bcb3a317298b76f015220496 | |
4.2.5.2.1 Webserver logging |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_WEBSERVER_LOGGING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Webserver logging |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Access to the webserver shall be logged. The web server log shall contain the following information:
|
|
| Test Purpose | Verify that all accesses to the webserver are logged with the required information. |
|
| Pre-Conditions | Network Product documentation which contains information on log file location and procedure to access it. Tester has the necessary privileges to access the log files. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | All webserver events are logged with all of the required information. |
|
| Expected Format of Evidence | Testing report contains copies of the log file showing the captured information. |
|
| PDFs | de9d15231715a7b82e09326fa8ad2b1b | |
4.2.5.2.1 Webserver logging |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_WEBSERVER_LOGGING | |
| Threat Reference | ||
| Requirement Name | Webserver logging |
|
| Requirement Reference | ||
| Requirement Description | Access to the webserver shall be logged. The web server log shall contain the following information:
Security Objective references: tba. |
|
| Test Purpose | Verify that all accesses to the webserver are logged with the required information. |
|
| Pre-Conditions | Network Product documentation which contains information on log file location and procedure to access it. Tester has the necessary privileges to access the log files. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | All webserver events are logged with all of the required information. |
|
| Expected Format of Evidence | Testing report contains copies of the log file showing the captured information. |
|
| PDFs | 2712e2f068dd094c5a7d87bf1e540073 | |
4.2.5.3 HTTP User sessions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | User sessions |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | To protect user sessions the Network Product shall support the following session ID and session cookie requirements:
|
|
| Test Purpose | Verify that the above 12 session ID and session cookie requirements have been met. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. The session IDs are different between sessions of the same and different users; b. The session IDs seems random based on his/her own experience. The tester may use tests like the bitstream test or the count-the-1s-tests from the diehard test suite. The tester documents how randomness was verified; c. The session IDs are always different between sessions, also when the user ID is the same.
a. neither the "expire" or the "max-age" is set; b. the 'HttpOnly' is set to true; c. the 'domain' attribute is set to the correct domain; d. the 'path' attribute is set to the correct directory or sub-directory.
a. access a session by retrieving the session ID and communicating the session ID through a POST or GET variable. b. generate a session ID on the client by attempting to login with a custom generated session ID. c. keep a session alive for longer than the configured maximum lifetime (by default 8 hours). |
|
| Expected Results |
|
|
| Expected Format of Evidence | A confirmation that the tester has confirmed that:
|
|
| PDFs | 216ebe298a29ef13361b6a67c666f9e1 | |
4.2.5.3 HTTP User sessions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | ||
| Requirement Name | User sessions |
|
| Requirement Reference | ||
| Requirement Description | To protect user sessions the Network Product shall support the following session ID and session cookie requirements:
Security Objective references: tba. |
|
| Test Purpose | Verify that the above 12 session ID and session cookie requirements have been met. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. The session IDs are different between sessions of the same and different users; b. The session IDs seems random based on his/her own experience. The tester may use tests like the bitstream test or the count-the-1s-tests from the diehard test suite. The tester documents how randomness was verified; c. The session IDs are always different between sessions, also when the user ID is the same.
a. neither the "expire" or the "max-age" is set; b. the 'HttpOnly' is set to true; c. the 'domain' attribute is set to the correct domain; d. the 'path' attribute is set to the correct directory or sub-directory.
a. access a session by retrieving the session ID and communicating the session ID through a POST or GET variable. b. generate a session ID on the client by attempting to login with a custom generated session ID. c. keep a session alive for longer than the configured maximum lifetime (by default 8 hours). |
|
| Expected Results |
|
|
| Expected Format of Evidence | A confirmation that the tester has confirmed that:
|
|
| PDFs | 15b3783c5e6b41d7f5912eeb65150d31 | |
4.2.6.2.1 Packet filtering |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PACKET_FILTERING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Packet filtering |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The Network Product shall provide a mechanism to filter incoming IP packets on any IP interface (see RFC 3871 for further information). In particular the Network Product shall provide a mechanism:
|
|
| Test Purpose | Verify that the system provides functionality for incoming packet filtering |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Host 1 will receive a 'ping' answer back, but host 2 will not. |
|
| Expected Format of Evidence | NA |
|
| PDFs | 93550abc1b7c274116c9b986069fbe48 | |
4.2.6.2.1 Packet filtering |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PACKET_FILTERING | |
| Threat Reference | ||
| Requirement Name | Packet filtering |
|
| Requirement Reference | ||
| Requirement Description | The Network Product shall provide a mechanism to filter incoming IP packets on any IP interface (see RFC 3871 for further information). In particular the Network Product shall provide a mechanism:
Security Objective references: PROTECTED COMMUNICATIONS, HARDENING. |
|
| Test Purpose | Verify that the system provides functionality for incoming packet filtering |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Host 1 will receive a 'ping' answer back, but host 2 will not. |
|
| Expected Format of Evidence | NA |
|
| PDFs | c383ac166b58ea92e86dd8f0671b901b | |
4.2.6.2.3 GTP-C Filtering |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_GTP-C_FILTERING | |
| Threat Reference | TR 33.926 [4] The test case described here apply only when GTP-C filtering is provided on the Network Product itself. |
|
| Requirement Name | GTP-C Filtering |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The following capability is conditionally required:
This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:
|
|
| Test Purpose | To verify that the network product provides filtering functionalities for incoming GTP-C messages. In particular this test case verifies that:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Accept only GTP-C EchoRequest messages on if1. b. Discard all GTP-C messages on if2. c. For each rule above the accounting is also enabled.
a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.
a. Using the network analyser the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are discarded and that no EchoResponse messages are sent back. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | 2aa43fc01ba24048c6d1740935279525 | |
4.2.6.2.3 GTP-C Filtering |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_GTP-C_FILTERING | |
| Threat Reference | ||
| Requirement Name | GTP-C Filtering |
|
| Requirement Reference | ||
| Requirement Description | The following capability is conditionally required:
This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:
Security Objective references: tba. The test case described here apply only when GTP-C filtering is provided on the Network Product itself. |
|
| Test Purpose | To verify that the network product provides filtering functionalities for incoming GTP-C messages. In particular this test case verifies that:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Accept only GTP-C EchoRequest messages on if1. b. Discard all GTP-C messages on if2. c. For each rule above the accounting is also enabled.
a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.
a. Using the network analyser the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-C EchoRequest messages are discarded and that no EchoResponse messages are sent back. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | 52b2da4ba599a64b6b2e9252c4dcc7b8 | |
4.2.6.2.4 GTP-U Filtering |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_GTP-U_FILTERING | |
| Threat Reference | TR 33.926 [4] The test case described here apply only when GTP-U filtering is provided on the Network Product itself. |
|
| Requirement Name | GTP-U Filtering |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The following capability is conditionally required:
This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:
|
|
| Test Purpose | To verify that the network product provides filtering functionalities for incoming GTP-U messages. In particular this test case verifies that:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Accept only GTP-U EchoRequest messages on if1. b. Discard all GTP-U messages on if2. c. For each rule above the accounting is also enabled.
a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.
a. Using the network analyser the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are discarded and that no EchoResponse messages are sent back. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | c7013142e54b24620643dddcbf7b9851 | |
4.2.6.2.4 GTP-U Filtering |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_GTP-U_FILTERING | |
| Threat Reference | ||
| Requirement Name | GTP-U Filtering |
|
| Requirement Reference | ||
| Requirement Description | The following capability is conditionally required:
This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:
Security Objective references: tba. The test case described here apply only when GTP-U filtering is provided on the Network Product itself. |
|
| Test Purpose | To verify that the network product provides filtering functionalities for incoming GTP-U messages. In particular this test case verifies that:
|
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Accept only GTP-U EchoRequest messages on if1. b. Discard all GTP-U messages on if2. c. For each rule above the accounting is also enabled.
a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.
a. Using the network analyser the tester verifies that the messages are correctly received by the network product. b. The tester verifies that the GTP-U EchoRequest messages are discarded and that no EchoResponse messages are sent back. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | 27191524c7ec431b54a21ca4b43f4466 | |
4.3.2.1 No unnecessary or insecure services / protocols |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNNECESSARY_SERVICE | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unnecessary or insecure services / protocols |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall only run protocol handlers and services which are needed for its operation, and which do not have any known security vulnerabilities. In particular, by default the following services shall be initially configured to be disabled on the network product by the vendor except if services are needed during deployment. In that case those services shall be disabled according to vendor's instructions after deployment is done. Disabled protocols can still be enabled for other reasons by the network operators, e.g. remote diagnostics.
Note 2: Full documentation of required protocols and services of the network product and their purpose needs to be provided by the vendor as prerequisite for the test case. |
|
| Test Purpose | To ensure that on all network interfaces, there are no unsecure services or protocols that might be running. |
|
| Pre-Conditions | A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:
The tool used shall be capable to detect and identify the protocol handlers and running services in the system. |
|
| Execution Steps | The tester is required to execute the following steps:
a. Verification that the list of available network services and protocol handlers is available in the documentation of the Network Product. b. Validation that all entries in the list are meaningful and reasonably necessary for the operation of the Network Product class.
|
|
| Expected Results | The report will contain:
Result will show:
|
|
| Expected Format of Evidence | A report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 82bbd993de047e533b4ed2bd8406cea9 | |
4.3.2.1 No unnecessary or insecure services / protocols |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNNECESSARY_SERVICE | |
| Threat Reference | ||
| Requirement Name | No unnecessary or insecure services / protocols |
|
| Requirement Reference | ||
| Requirement Description | The network product shall only run protocol handlers and services which are needed for its operation, and which do not have any known security vulnerabilities. In particular, by default the following services shall be initially configured to be disabled on the network product by the vendor except if services are needed during deployment. In that case those services shall be disabled according to vendor's instructions after deployment is done. Disabled protocols may still need to be enabled for other reasons by the operators, e.g. remote diagnostics.
Note 2: Full documentation of required protocols and services of the network product and their purpose needs to be provided by the vendor as prerequisite for the test case. TBA |
|
| Test Purpose | To ensure that on all network interfaces, there are no unsecure services or protocols that might be running. |
|
| Pre-Conditions | A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:
The tool used shall be capable to detect and identify the protocol handlers and running services in the system. |
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
a. Verification that the list of available network services and protocol handlers is available in the documentation of the Network Product. b. Validation that all entries in the list are meaningful and reasonably necessary for the operation of the Network Product class.
|
|
| Expected Results | The report will contain:
Result will show:
|
|
| Expected Format of Evidence | A report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 0fbf2b7b30fcd038e35c8bee71a35dc8 | |
4.3.2.2 Restricted reachability of services |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 → 33117-j10 → 33117-j20 | |
| Test Name | TC_RESTRICTED_ REACHABILITY _OF_SERVICES | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Restricted reachability of services |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall restrict the reachability of services so that they can only be reached on interfaces where their usage is required. On interfaces were services are active, the reachability should be limited to legitimate communication peers. This limitation shall be realized on the network product itself (without measures (e.g. firewall) at network side) according to the requirement detailed in clause 4.2.6.2.1 Packet Filtering. Example: Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the management network to support separation of management traffic from user traffic. |
|
| Test Purpose | To verify that it is possible to bind the services only to the interfaces from which they are expected to be reachable. Note: The test case developed for the requirement " 4.2.6.2.1 Packet Filtering" implicitly verifies that the network product permits to limit the reachability of the services only to legitimate communication peers, |
|
| Pre-Conditions |
|
|
| Execution Steps | For every available interface if_n:
|
|
| Expected Results | Services can be enabled on per-interface basis. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | d4d0c03dacc3667d11bccd15470ddf94 | |
4.3.2.2 Restricted reachability of services |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 → 33117-j10 → 33117-j20 | |
| Test Name | TC_RESTRICTED_REACHIBILITY_OF_SERVICES |
|
| Threat Reference | ||
| Requirement Name | The network product shall restrict the reachability of services |
|
| Requirement Reference | ||
| Requirement Description | The network product shall restrict the reachability of services so that they can only be reached on interfaces where their usage is required. On interfaces were services are active, the reachability should be limited to legitimate communication peers. This limitation shall be realized on the network product itself (without measures (e.g. firewall) at network side) according to the requirement detailed in clause 4.2.6.2.1 Packet Filtering. Example: Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the management network to support separation of management traffic from user traffic. |
|
| Test Purpose | To verify that it is possible to bind the services only to the interfaces from which they are expected to be reachable. Note: The test case developed for the requirement " 4.2.6.2.1 Packet Filtering" implicitly verifies that the network product permits to limit the reachability of the services only to legitimate communication peers, |
|
| Pre-Conditions |
|
|
| Execution Steps | For every available interface if_n:
|
|
| Expected Results | Services can be enabled on per-interface basis. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 3ce31ea467071a3aaedc81450fcdd404 | |
4.3.2.3 No unused software |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_SOFTWARE | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unused software |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Unused software components or parts of software which are not needed for operation or functionality of the network product shall not be installed or shall be deleted after installation. This includes also parts of a software, installed as examples but typically not be used (e.g. default web pages, example databases, test data). |
|
| Test Purpose | To ensure that there is no unused software or associated components that might be installed in the network product which are not required for its operation or functionality. |
|
| Pre-Conditions | A list of all available software and libraries and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The tester is required to execute the following steps:
a. Verification that the list of software / libraries and components is available in the documentation of the Network Product. b. Validation that all entries in the list of software / libraries and components are meaningful and reasonably necessary for the operation of the Network Product class.
|
|
| Expected Results | The report will contain the names and version of the tool(s) used for finding out what software /libraries is installed in the system. The detailed report will contain the name and version information of all the software / libraries installed in the system generated by the tool. The list of all available software / libraries which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software / library not in the list of allowed software / libraries will be highlighted and brought out as a part of the report. There should be no unnecessary software / library installed in the network product except for the ones which are deemed necessary for its operation. There should be no more default example files for the installed software on the system. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 67ef1c7209624f0a9b999c4992d0285a | |
4.3.2.3 No unused software |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_SOFTWARE | |
| Threat Reference | ||
| Requirement Name | Unused software shall not be installed or shall be uninstalled |
|
| Requirement Reference | ||
| Requirement Description | Unused software components or parts of software which are not needed for operation or functionality of the network product shall not be installed or shall be deleted after installation. This includes also parts of a software, which will be installed as examples but typically not be used (e.g. default web pages, example databases, test data). |
|
| Test Purpose | To ensure that there is no unused software or associated components that might be installed in the network product which are not required for its operation or functionality. |
|
| Pre-Conditions | A list of all available software and libraries and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
a. Verification that the list of software / libraries and components is available in the documentation of the Network Product. b. Validation that all entries in the list of software / libraries and components are meaningful and reasonably necessary for the operation of the Network Product class.
|
|
| Expected Results | The report will contain the names and version of the tool(s) used for finding out what software /libraries is installed in the system. The detailed report will contain the name and version information of all the software / libraries installed in the system generated by the tool. The list of all available software / libraries which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software / library not in the list of allowed software / libraries will be highlighted and brought out as a part of the report. There should be no unnecessary software / library installed in the network product except for the ones which are deemed necessary for its operation. There should be no more default example files for the installed software on the system. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | a1dca0eb03ef4da6c160a5515f6b9034 | |
4.3.2.4 No unused functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_UNUSED_FUNCTIONS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unused functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | During installation of software and hardware often functions are activated that are not required for operation or function of the system. If unused functions of software cannot be deleted or deinstalled individually as required in clause "4.3.2.3 No unused software" of the present document, such functions shall be deactivated in the configuration of the network product permanently. Also hardware functions which are not required for operation or function of the system (e.g. unused interfaces) shall be permanently deactivated. Permanently means that they shall not be reactivated again after network product reboot. Example: A debugging function in software which can be used for troubleshooting can not be activated during normal operation of the network product. |
|
| Test Purpose | To ensure that there is no unused hardware or software functions that are not deactivated in the network product which are not required for its operation or functionality. |
|
| Pre-Conditions | A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results | The report will contain the names and version of the tool(s) used for finding out what software and associated function is installed in the system. The detailed report will contain the name and version information of all the software and components installed in the system generated by the test tool. The list of all available software which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software not in the list of allowed software will be highlighted and brought out as a part of the report. There should be no unused function that is not deactivated in the network product except for the ones which are deemed necessary for its operation. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 4ed7a8820fa6610dc2cf98e671252a49 | |
4.3.2.4 No unused functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_UNUSED_FUNCTIONS | |
| Threat Reference | ||
| Requirement Name | Unused functions of the network products' software and hardware shall be deactivated. |
|
| Requirement Reference | ||
| Requirement Description | During installation of software and hardware often functions will be activated that are not required for operation or function of the system. If unused functions of software cannot be deleted or deinstalled individually as required in clause "5.3.2.3 No unused software" of the present document, such functions shall be deactivated in the configuration of the network product permanently. Also hardware functions which are not required for operation or function of the system (e.g. unused interfaces) shall be permanently deactivated. Permanently means that they shall not be reactivated again after network product reboot. Example: A debugging function in software which can be used for troubleshooting shall not be activated during normal operation of the network product. |
|
| Test Purpose | To ensure that there is no unused hardware or software functions that are not deactivated in the network product which are not required for its operation or functionality. |
|
| Pre-Conditions | A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results | The report will contain the names and version of the tool(s) used for finding out what software and associated function is installed in the system. The detailed report will contain the name and version information of all the software and components installed in the system generated by the test tool. The list of all available software which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software not in the list of allowed software will be highlighted and brought out as a part of the report. There should be no unused function that is not deactivated in the network product except for the ones which are deemed necessary for its operation. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 473789e2a4397b436175d0d01c2b487c | |
4.3.2.5 No unsupported components |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_UNSUPPORTED_COMPONENTS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unsupported components. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall not contain software and hardware components that are no longer supported by their vendor, manufacturer or developer, such as components that have reached end-of-life or end-of-support. Excluded are components that have a special support contract. This contract shall guarantee the correction of vulnerabilities over components' lifetime. |
|
| Test Purpose | To ensure that there is no unsupported software that is running in the network product which is not supported anymore and has reached its end-of-life or end-of-support. |
|
| Pre-Conditions | A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results | The report will contain the names and versions of the tool(s) used for finding out what software and hardware components are installed in the system. The detailed report will contain the name and version of the software and hardware used in the system, and the period of support for each of these components. The list of all available software and hardware components and their associated support information which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software or component which is not supported any longer by the vendor will be highlighted and brought out as a part of the report. There should be no software installed in the network product which is unsupported as of the day of testing. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 7758ba5acdbafbdb1cef112d6a9a7b9e | |
4.3.2.5 No unsupported components |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_UNSUPPORTED_COMPONENTS | |
| Threat Reference | ||
| Requirement Name | The network product shall not contain software and hardware components that are no longer supported by their vendor, producer or developer. |
|
| Requirement Reference | ||
| Requirement Description | The network product shall not contain software and hardware components that are no longer supported by their vendor, producer or developer, such as components that have reached end-of-life or end-of-support. Excluded are components that have a special support contract. This contract shall guarantee the correction of vulnerabilities over components' lifetime. |
|
| Test Purpose | To ensure that there is no unsupported software that is running in the network product which is not supported anymore and has reached its end-of-life or end-of-support. |
|
| Pre-Conditions | A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results | The report will contain the names and versions of the tool(s) used for finding out what software and hardware components are installed in the system. The detailed report will contain the name and version of the software and hardware used in the system, and the period of support for each of these components. The list of all available software and hardware components and their associated support information which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software or component which is not supported any longer by the vendor will be highlighted and brought out as a part of the report. There should be no software installed in the network product which is unsupported as of the day of testing. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | b93056864db14301111ac688dd9f3b42 | |
4.3.2.6 Remote login restrictions for privileged users |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 → 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_REMOTE_LOGIN_RESTRICTIONS_PRIVILEGED_USERS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Remote login restrictions for privileged users |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Direct login as root or equivalent highest privileged user shall be limited to the system console only. Root user will not be allowed to login to the system remotely. |
|
| Test Purpose | Verify that root or equivalent highest privileged user will not be allowed to login to the system remotely. |
|
| Pre-Conditions | A document that describes the interfaces to the network product and how the tester can login to them remotely. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The tester is not able to login to the system remotely using the root credentials. The tester is able to login to the system from the physical console using the root credentials. |
|
| Expected Format of Evidence | A Pass/Fail result. |
|
| PDFs | 63eaa64136b491acf9e8c1662a97b66e | |
4.3.2.6 Remote login restrictions for privileged users |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 → 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_REMOTE_LOGIN_RESTRICTIONS_PRIVILEGED_USERS | |
| Threat Reference | ||
| Requirement Name | Remote login restrictions for privileged users |
|
| Requirement Reference | ||
| Requirement Description | Direct login as root or equivalent highest privileged user shall be limited to the system console only. Root user will not be allowed to login to the system remotely. |
|
| Test Purpose | Verify that root or equivalent highest privileged user will not be allowed to login to the system remotely. |
|
| Pre-Conditions | A document that describes the interfaces to the network product and how the tester can login to them remotely. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The tester is not able to login to the system remotely using the root credentials. The tester is able to login to the system from the physical console using the root credentials. |
|
| Expected Format of Evidence | A Pass/Fail result. |
|
| PDFs | 4c9c6037d08a17211b22682daaa3a26b | |
4.3.2.7 Filesystem Authorization privileges |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 → 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FILESYSTEM_AUTHORIZATION_PRIVILEGES | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Filesystem Authorization privileges. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The system shall be designed to ensure that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so. EXAMPLE: On unix® systems a 'sticky' bit may be set on all directories where all users have write permissions. This ensures that only the file's owner, the directory's owner, or root user can rename or delete the file. Without the sticky bit being set, any user that has write and execute permissions for the directory can rename or delete files within the directory, regardless of the file's owner. |
|
| Test Purpose | Verify that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so. |
|
| Pre-Conditions | A document describing how access control is configured for the filesystems in the network product shall be provided by the vendor. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The OS-level access permissions are set correctly for the users. The users can only modify files, data, directories or file systems for which he has the necessary privileges to do so. |
|
| Expected Format of Evidence | Screenshot containing the configuration file showing the OS-level permissions are set correctly. |
|
| PDFs | efb5f7ac13041b89e7f22d66214c28c7 | |
4.3.2.7 Filesystem Authorization privileges |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 → 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_FILESYSTEM_AUTHORIZATION_PRIVILEGES | |
| Threat Reference | ||
| Requirement Name | Filesystem Authorization privileges. |
|
| Requirement Reference | ||
| Requirement Description | The system shall be designed to ensure that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so. EXAMPLE: On unix® systems a 'sticky' bit may be set on all directories where all users have write permissions. This ensures that only the file's owner, the directory's owner, or root user can rename or delete the file. Without the sticky bit being set, any user that has write and execute permissions for the directory can rename or delete files within the directory, regardless of the file's owner. |
|
| Test Purpose | Verify that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so. |
|
| Pre-Conditions | A document describing how access control is configured for the filesystems in the network product shall be provided by the vendor. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The OS-level access permissions are set correctly for the users. The users can only modify files, data, directories or file systems for which he has the necessary privileges to do so. |
|
| Expected Format of Evidence | Screenshot containing the configuration file showing the OS-level permissions are set correctly. |
|
| PDFs | de65fd58285f1c5bc7687c927d1a86bf | |
4.3.3.1.1 IP-Source address spoofing mitigation |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_IP_SPOOFING_MITIGATION | |
| Threat Reference | TR 33.926 [4] The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Requirement Name | IP-Source address spoofing mitigation |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Systems shall not process IP packets if their source address is not reachable via the incoming interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides this function. |
|
| Test Purpose | To verify that the network product provides anti-spoofing function that is, before a packet is processed, the network product checks whether the source IP of the received packet is reachable through the interface it comes in. To verify that if the received packet source address is not routable through the interface on which it comes, then the network product drops this packet. |
|
| Pre-Conditions |
Figure 1: Configurations for the network product, N1 and N2
|
|
| Execution Steps |
|
|
| Expected Results | The network product supports an anti-spoofing mechanism (e.g. the RPF function) and it accepts a packet only if it reaches the network product on the expected interface (i.e. this packet has a source ip address belonging to the same network as the interface where it came in or if it is routable through the interface on which it came in), otherwise it discards the packet. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | c818ac9089dcef57efe53a508f26e4f0 | |
4.3.3.1.1 IP-Source address spoofing mitigation |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_IP_SPOOFING_MITIGATION | |
| Threat Reference | ||
| Requirement Name | IP-Source address spoofing mitigation |
|
| Requirement Reference | ||
| Requirement Description | Systems shall not process IP packets if their source address is not reachable via the incoming interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides this function. The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | To verify that the network product provides anti-spoofing function that is, before a packet is processed, the network product checks whether the source IP of the received packet is reachable through the interface it comes in. To verify that if the received packet source address is not routable through the interface on which it comes, then the network product drops this packet. |
|
| Pre-Conditions |
Figure 1: Configurations for the network product, N1 and N2
|
|
| Execution Steps |
|
|
| Expected Results | The network product supports an anti-spoofing mechanism (e.g. the RPF function) and it accepts a packet only if it reaches the network product on the expected interface (i.e. this packet has a source ip address belonging to the same network as the interface where it came in or if it is routable through the interface on which it came in), otherwise it discards the packet. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 7669713e2eada1fd595b3a0269473526 | |
4.3.3.1.2 Minimized kernel network functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROXY_ARP_DISABLING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default: Note: Void
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Proxy ARP feature is disabled by default on the network product. In particular this test case verifies that the network product does not respond to ARP requests intended for another host. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | No Arp Reply is received by Host 1. |
|
| Expected Format of Evidence | Pcap trace, snapshot of ARP Cache of Host 1 |
|
| PDFs | 3994edf32772f9355937423c787d930e | |
4.3.3.1.2 Minimized kernel network functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_IP_FWD_DISABLING |
|
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that IP Packet Forwarding is disabled by default on the network product. In particular this test case verifies that a packet received by a network product interface but directed to a host on a different network is not routed by the network product |
|
| Pre-Conditions |
|
|
| Execution Steps | If the feature is available in a configuration file, verify that it is disabled by default. Send a packet from Host 1 on subnet A to Host 2 on subnet B with the network product configured as a default gateway. Verify that the packet is correctly received by the network product (logged by the network traffic analyser) but it is not routed to Host 2. |
|
| Expected Results | The packet is not routed by the network product and Host 2 does not receive it. |
|
| Expected Format of Evidence | Pcap trace of the received packet |
|
| PDFs | 9801f16319a74da99d7cb09d26839c57 | |
4.3.3.1.2(2) Minimized kernel network functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_DIRECTED_BROAD_DISABLING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default: Note: Void
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Directed broadcast is disabled by default on the network product. In particular this test case verifies that a packet received by a network product whose destination address is a valid broadcast address is dropped. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The packet is not broadcasted by the network product and Host 2 cannot receive it. |
|
| Expected Format of Evidence | Pcap trace showing that packet from host 1only incomes to the network product. |
|
| PDFs | 7b96eecb2a021a5e78d67caeb763e454 | |
4.3.3.1.2(2) Minimized kernel network functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROXY_ARP_DISABLING |
|
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Proxy ARP feature is disabled by default on the network product. In particular this test case verifies that the network product does not respond to ARP requests intended for another host. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | No Arp Reply is received by Host 1. |
|
| Expected Format of Evidence | Pcap trace, snapshot of ARP Cache of Host 1 |
|
| PDFs | 5e7ecac638336ee31399de8b5b496432 | |
4.3.3.1.2(3) Minimized kernel network functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ IP_MULTICAST_HANDLING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default: Note: Void
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that IP Multicast is disabled by default on the network product. In particular this test case verifies that packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) are not handled by the network product. |
|
| Pre-Conditions |
Capability: NOT applicable in certain deployment scenarios where multicast needs to be enabled. |
|
| Execution Steps |
|
|
| Expected Results | No interface is running multicast protocols |
|
| Expected Format of Evidence | Screenshot containing command output. |
|
| PDFs | c5225a89fae992b0fb5901be5e225d87 | |
4.3.3.1.2(3) Minimized kernel network functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_DIRECTED_BROAD_DISABLING |
|
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Directed broadcast is disabled by default on the network product. In particular this test case verifies that a packet received by a network product whose destination address is a valid broadcast address is dropped. |
|
| Pre-Conditions |
Capability: NOT applicable in certain deployment scenarios where multicast needs to be enabled. |
|
| Execution Steps |
|
|
| Expected Results | The packet is not broadcasted by the network product and Host 2 cannot receive it. |
|
| Expected Format of Evidence | Pcap trace showing that packet from host 1only incomes to the network product. |
|
| PDFs | 7176247e6ebe31a12f6c7a5dc508fc26 | |
4.3.3.1.2(4) Minimized kernel network functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_GRATUITOUS_ARP_DISABLING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default: Note: Void
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Gratuitous ARP feature is disabled by default on the network product. In particular this test case verifies that the network product cannot send gratuitous ARP requests and that the network product discards incoming Gratuitous ARP requests. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The network product ARP Cache is not updated. |
|
| Expected Format of Evidence | Snapshot of the network product ARP Cache |
|
| PDFs | 217c478d91056e6dd4f10b4700eefe75 | |
4.3.3.1.2(4) Minimized kernel network functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ IP_MULTICAST_HANDLING |
|
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | ||
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | No interface is running multicast protocols |
|
| Expected Format of Evidence | Screenshot containing command output. |
|
| PDFs | 0b425a6af1cf25fda1fe2231f671f8e0 | |
4.3.3.1.2(5) Minimized kernel network functions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BROADCAST_ICMP_HANDLING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default: Note: Void
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that responses to ICMP broadcast packets are disabled by default on the network product . In particular this test case verifies that all ICMP ECHO and TIMESTAMP requests sent to the network product via broadcast/multicast are not answered. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The network product doesn't respond to any ICMP packet with a broadcast address. |
|
| Expected Format of Evidence | Pcap trace showing that the ICMP ECHO/ ICMP timestamp packets are received by the network product but no responses are generated by the network product. |
|
| PDFs | 250ddb63d9208255f953e1c7911a3cd0 | |
4.3.3.1.2(5) Minimized kernel network functions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_GRATUITOUS_ARP_DISABLING |
|
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that the Gratuitous ARP feature is disabled by default on the network product. In particular this test case verifies that the network product cannot send gratuitous ARP requests and that the network product discards incoming Gratuitous ARP requests. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The network product ARP Cache is not updated. |
|
| Expected Format of Evidence | Snapshot of the network product ARP Cache |
|
| PDFs | 70ea9a0dd5e1abef75fb554f41e96a5f | |
4.3.3.1.2(6) Does not exist in this document version |
Home → General → 18.2.0 |
4.3.3.1.2(6) |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 → 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BROADCAST_ICMP_HANDLING | |
| Threat Reference | ||
| Requirement Name | Minimized kernel network functions. |
|
| Requirement Reference | ||
| Requirement Description | Kernel based network functions not needed for the operation of the network element shall be deactivated. In particular the following ones shall be disabled by default:
Note: The above text does not preclude that IP Packet Forwarding can be enabled in certain deployment scenarios.
Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios. Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default. |
|
| Test Purpose | Verify that responses to ICMP broadcast packets are disabled by default on the network product . In particular this test case verifies that all ICMP ECHO and TIMESTAMP requests sent to the network product via broadcast/multicast are not answered. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The network product doesn't respond to any ICMP packet with a broadcast address. |
|
| Expected Format of Evidence | Pcap trace showing that the ICMP ECHO/ ICMP timestamp packets are received by the network product but no responses are generated by the network product. |
|
| PDFs | b48612e99a692afdf579a49a7db98dde | |
4.3.3.1.3 No automatic launch of removable media |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 | |
| Test Name | TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No automatic launch of removable media |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall not automatically launch any application when removable media device such as CD-, DVD-, USB-Sticks or USB-Storage drive is connected. If the operating system supports an automatic launch, it shall be deactivated unless it is required to support availability requirements. |
|
| Test Purpose | To verify that the network product does not launch any applications automatically when a removable media device is connected. Any such feature should be deactivated. |
|
| Pre-Conditions | If the network product is provisioned with the necessary physical ports/drives (CD/DVD drive, USB port, etc.) then the test case applies. |
|
| Execution Steps |
a. The tester prepares a removable media device (e.g. CD, DVD, USB-Sticks and/or USB-Storage drives) that contain any kind of autostart file suitable for this port type. b. The tester inserts the prepared media device into the network product under test.
|
|
| Expected Results | The network product does not launch any applications to open the contents in the removable media device. In Linux® machines, the removable media device is not automatically mounted in the filesystem. |
|
| Expected Format of Evidence | Evidence can be presented in the form of logs/screenshot/screen-capture on how the network product responds when any removable media device is attached to it (e.g. the output log of the UNIX® mount command before and after insertion of the removable media device). |
|
| PDFs | 490d2c0ceeef6af59e93260b9c11df9a | |
4.3.3.1.3 No automatic launch of removable media |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 | |
| Test Name | TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA | |
| Threat Reference | ||
| Requirement Name | No automatic launch of removable media |
|
| Requirement Reference | ||
| Requirement Description | The network product shall not automatically launch any application when removable media device such as CD-, DVD-, USB-Sticks or USB-Storage drive is connected. If the operating system supports an automatic launch, it shall be deactivated unless it is required to support availability requirements. |
|
| Test Purpose | To verify that the network product does not launch any applications automatically when a removable media device is connected. Any such feature should be deactivated. |
|
| Pre-Conditions | If the network product is provisioned with the necessary physical ports/drives (CD/DVD drive, USB port, etc.) then the test case applies. |
|
| Execution Steps |
a. The tester prepares a removable media device (e.g. CD, DVD, USB-Sticks and/or USB-Storage drives) that contain any kind of autostart file suitable for this port type. b. The tester inserts the prepared media device into the network product under test.
|
|
| Expected Results | The network product does not launch any applications to open the contents in the removable media device. In Linux® machines, the removable media device is not automatically mounted in the filesystem. |
|
| Expected Format of Evidence | Evidence can be presented in the form of screenshot/screen-capture on how the network product responds when any removable media device is attached to it. |
|
| PDFs | 2aafcab3f0b1d4a20a31937742612079 | |
4.3.3.1.4 SYN Flood Prevention |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYN_FLOOD_PREVENTION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Syn Flood Prevention |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall support a mechanism to prevent Syn Flood attacks (e.g. implement the TCP Syn Cookie technique in the TCP stack by setting net.ipv4.tcp_syncookies = 1 in the linux sysctl.conf file). This feature shall be enabled by default. |
|
| Test Purpose | Verify that the Network Product supports a Syn Flood Prevention technique. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. While the SYN Flood attack is ongoing. b. After the SYN Flood attack was executed. |
|
| Expected Results | The Network Product does not become inoperative. |
|
| Expected Format of Evidence |
|
|
| PDFs | 0235b945ce77bbc8b60db10ae7e2f358 | |
4.3.3.1.4 SYN Flood Prevention |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_SYN_FLOOD_PREVENTION | |
| Threat Reference | ||
| Requirement Name | Syn Flood Prevention |
|
| Requirement Reference | ||
| Requirement Description | The network product shall support a mechanism to prevent Syn Flood attacks (e.g. implement the TCP Syn Cookie technique in the TCP stack by setting net.ipv4.tcp_syncookies = 1 in the linux sysctl.conf file). This feature shall be enabled by default. |
|
| Test Purpose | Verify that the Network Product supports a Syn Flood Prevention technique. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. While the SYN Flood attack is ongoing. b. After the SYN Flood attack was executed. |
|
| Expected Results | The Network Product does not become inoperative. |
|
| Expected Format of Evidence |
A Pass/Fail result provided by the tester. |
|
| PDFs | 3522d85185206e1e2038f2acdfe7070f | |
4.3.3.1.5 Protection from buffer overflows |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTION_FROM_BUFFER_OVERFLOW | |
| Threat Reference | TR 33.926 [4] Note: Void
|
|
| Requirement Name | Protection mechanisms against buffer overflows |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The system shall support mechanisms for buffer overflow protection. Documentation which describes these buffer overflow mechanisms and also how to check that they have been enabled and/or implemented shall be provided. |
|
| Test Purpose | To ensure that the system supports mechanisms that protect against buffer overflow. |
|
| Pre-Conditions |
If a standard buffer overflow mechanism from a 3rd party vendor is used then a reference to the standard feature in the 3rd party vendors documentation should be provided.
|
|
| Execution Steps | The tester is required to execute the following steps:
a. A technical description of the buffer overflow protection mechanisms that have been implemented on the system. b. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required. c. If manually executed actions are required then detailed instructions should be included in the technical description.
a. Describe test procedures used to verify the buffer overflow protection mechanisms, b. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented. c. Contains details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Documentation showing each of the points in the results sections. |
|
| PDFs | 06a4f310d9bfbd11185190f616c72f0b | |
4.3.3.1.5 Protection from buffer overflows |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_PROTECTION_FROM_BUFFER_OVERFLOW | |
| Threat Reference | ||
| Requirement Name | Protection mechanisms against buffer overflows |
|
| Requirement Reference | ||
| Requirement Description | The system shall support mechanisms for buffer overflow protection. Documentation which describes these buffer overflow mechanisms and also how to check that they have been enabled and/or implemented shall be provided. Note: Void
|
|
| Test Purpose | To ensure that the system supports mechanisms that protect against buffer overflow. |
|
| Pre-Conditions |
If a standard buffer overflow mechanism from a 3rd party vendor is used then a reference to the standard feature in the 3rd party vendors documentation should be provided.
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
a. A technical description of the buffer overflow protection mechanisms that have been implemented on the system. b. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required. c. If manually executed actions are required then detailed instructions should be included in the technical description.
a. Describe test procedures used to verify the buffer overflow protection mechanisms, b. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented. c. Contains details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Documentation showing each of the points in the results sections. |
|
| PDFs | 6cc632ad126ebb617f727f9f0f107d3c | |
4.3.3.1.6 External file system mount restrictions |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_EXTERNAL_FILE_SYSTEM_MOUNT_RESTRICTIONS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | External file system mount restrictions |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If a user is allowed to mount external file systems (attached locally or via the network), OS-level restrictions shall be set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. Implementation example: In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option.
|
|
| Test Purpose | Verify that OS-level restrictions are set properly for users that are allowed to mount external file systems (attached locally or via the network). This is to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. |
|
| Pre-Conditions | Tester has admin access to check and configure the external filesystem mount permissions in the OS. Tester has username and password of a user in the network product that has external filesystem mount privileges. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The OS-level restrictions are set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. Any privilege escalation method used by the tester should be blocked. |
|
| Expected Format of Evidence | Screenshot containing the configuration file showing that OS-level restrictions are set properly for users that are allowed to mount external file systems. |
|
| PDFs | 98ecbc7708c47c71fd4d59cc92cf4e1d | |
4.3.3.1.6 External file system mount restrictions |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_EXTERNAL_FILE_SYSTEM_MOUNT_RESTRICTIONS | |
| Threat Reference | ||
| Requirement Name | External file system mount restrictions |
|
| Requirement Reference | ||
| Requirement Description | If normal users are allowed to mount external file systems (attached locally or via the network), OS-level restrictions shall be set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. Implementation example: In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option.
|
|
| Test Purpose | Verify that OS-level restrictions are set properly for users that are allowed to mount external file systems (attached locally or via the network). This is to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. |
|
| Pre-Conditions | Tester has admin access to check and configure the external filesystem mount permissions in the OS. Tester has username and password of a user in the network product that has external filesystem mount privileges. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The OS-level restrictions are set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems. Any privilege escalation method used by the tester should be blocked. |
|
| Expected Format of Evidence | Screenshot containing the configuration file showing that OS-level restrictions are set properly for users that are allowed to mount external file systems. |
|
| PDFs | 08dc61ce6c08441350a2e66167c834e2 | |
4.3.4.10 No directory listings |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_DIRECTORY_LISTINGS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No directory listings / Directory Browsing. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Directory listings (indexing) / "Directory browsing" shall be deactivated. |
|
| Test Purpose | To verify that Directory listings / Directory browsing has been deactivated in all Web server components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 94f08a7b0e7522821d9e37117030e778 | |
4.3.4.10 No directory listings |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_DIRECTORY_LISTINGS | |
| Threat Reference | ||
| Requirement Name | No directory listings / Directory Browsing. |
|
| Requirement Reference | ||
| Requirement Description | Directory listings (indexing) / "Directory browsing" shall be deactivated. |
|
| Test Purpose | To verify that Directory listings / Directory browsing has been deactivated in all Web server components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | cbe969e439879d604aee276f9c8d7991 | |
4.3.4.11 Web server information in HTTP headers |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_HEADER_INFORMATION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Web server information in HTTP headers. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The HTTP header shall not include information on the version of the web server and the modules/add-ons used. |
|
| Test Purpose | To verify that HTTP headers do not include information on the version of the web server and the modules/add-ons used. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 21dd3db21f4813168649a6ec48e9c564 | |
4.3.4.11 Web server information in HTTP headers |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_HEADER_INFORMATION | |
| Threat Reference | ||
| Requirement Name | Information about the web server in HTTP headers shall be minimized. |
|
| Requirement Reference | ||
| Requirement Description | The HTTP header shall not include information on the version of the web server and the modules/add-ons used. |
|
| Test Purpose | To verify that HTTP headers do not include information on the version of the web server and the modules/add-ons used. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | fba9acd013247a6d9e0c19094bb2d0d9 | |
4.3.4.12 Web server information in error pages |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_ERROR_PAGES_INFORMATION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Web server information in error pages. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | User-defined error pages shall not include version information about the web server and the modules/add-ons used. Error messages shall not include internal information such as internal server names, error codes, etc. Default error pages of the web server shall be replaced by error pages defined by the vendor. |
|
| Test Purpose | To verify that error pages and error messages do not include information about the web server. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 723b3865e3a4622cd6b898f98735e6e6 | |
4.3.4.12 Web server information in error pages |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_ERROR_PAGES_INFORMATION | |
| Threat Reference | ||
| Requirement Name | Web server information in error pages shall be deleted. |
|
| Requirement Reference | ||
| Requirement Description | User-defined error pages shall not include version information about the web server and the modules/add-ons used. Error messages shall not include internal information such as internal server names, error codes, etc. Default error pages of the web server shall be replaced by error pages defined by the vendor. |
|
| Test Purpose | To verify that error pages and error messages do not include information about the web server. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 1c80dcbd7291194803507148dd3b2fdd | |
4.3.4.13 Minimized file type mappings |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_FILE_TYPE MAPPINGS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Minimized file type mappings Requirement Reference: In accordance with industry best practice |
|
| Requirement Reference | ||
| Requirement Description | File type- or script-mappings that are not required shall be deleted, e.g. php, phtml, js, sh, csh, bin, exe, pl, vbe, vbs. |
|
| Test Purpose | To verify that file type- or script-mappings that are not required have been deleted. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | b9b34df10c6565b3ae75498ed19d0820 | |
4.3.4.13 Minimized file type mappings |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_WEB_SERVER_FILE_TYPE MAPPINGS | |
| Threat Reference | ||
| Requirement Name | File type- or script-mappings that are not required shall be deleted. |
|
| Requirement Reference | ||
| Requirement Description | File type- or script-mappings that are not required shall be deleted, e.g. php, phtml, js, sh, csh, bin, exe, pl, vbe, vbs. |
|
| Test Purpose | To verify that file type- or script-mappings that are not required have been deleted. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 67a9ab7208f6e2521c0bb204022da79f | |
4.3.4.14 Restricted file access |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_RESTRICTED_FILE_ACCESS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Restricted file access. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Restrictive access rights shall be assigned to all files which are directly or indirectly (e.g. via links or in virtual directories) in the web server's document directory. In particular, the web server shall not be able to access files which are not meant to be delivered. |
|
| Test Purpose | To test whether the restrictive access rights are assigned to all files which are directly or indirectly in the web server's document directory and to verify whether path traversal is made improbable. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
a. The files are owned by the user that runs the web server; b. The files are not writable to others, except the web server's account;
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A part of the configuration file / screenshot of the configuration showing that the web server, the file access rights and the account running the web server is properly configured. |
|
| PDFs | 587a5c6056c62264f01ca8fdc989a8af | |
4.3.4.14 Restricted file access |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_RESTRICTED_FILE_ACCESS | |
| Threat Reference | ||
| Requirement Name | The web server shall only deliver files which are meant to be delivered. |
|
| Requirement Reference | ||
| Requirement Description | Restrictive access rights shall be assigned to all files which are directly or indirectly (e.g. via links or in virtual directories) in the web server's document directory. In particular, the web server shall not be able to access files which are not meant to be delivered. |
|
| Test Purpose | To test whether the restrictive access rights are assigned to all files which are directly or indirectly in the web server's document directory and to verify whether path traversal is made improbable. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
a. The files are owned by the user that runs the web server; b. The files are not writable to others, except the web server's account;
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A part of the configuration file / screenshot of the configuration showing that the web server, the file access rights and the account running the web server is properly configured. |
|
| PDFs | fb72c4eaf6faea02b46286cc7b3129e2 | |
4.3.4.2 No system privileges for web server |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_SYSTEM_PRIVILEGES_WEB_SERVER | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No system privileges for web server. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | No web server processes shall run with system privileges. This is best achieved if the web server runs under an account that has minimum privileges. If a process is started by a user with system privileges, execution shall be transferred to a different user without system privileges after the start. |
|
| Test Purpose | Verify that the Web server is not run under system privileges. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Start the web server process as web server user and check process privileges. b. If possible, sStart the web server procvess as with system privileges and check if process privileges get dropped.
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 91244335d15f869ac1fc8dc6995d2614 | |
4.3.4.2 No system privileges for web server |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 → 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_SYSTEM_PRIVILEGES_WEB_SERVER | |
| Threat Reference | ||
| Requirement Name | No system privileges for web server. |
|
| Requirement Reference | ||
| Requirement Description | No web server processes shall run with system privileges. This is best achieved if the web server runs under an account that has minimum privileges. If a process is started by a user with system privileges, execution shall be transferred to a different user without system privileges after the start. |
|
| Test Purpose | Verify that the Web server is not run under system privileges. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Start the web server process as web server user and check process privileges. b. If possible, sStart the web server procvess as with system privileges and check if process privileges get dropped.
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 842e99890444205f4dd9f492e4115ee9 | |
4.3.4.3 No unused HTTP methods |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_HTTP_METHODS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unused HTTP methods |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | HTTP methods that are not required shall be deactivated. Standard requests to web servers use GET, HEAD, and POST. If other methods are required, e.g, PUT, DELETE, PATCH, they shall not introduce security leaks such as TRACK or TRACE. |
|
| Test Purpose | Verify that the Web server has deactivated all HTTP methods that are not required. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 1d243bce69a385d3d596e5000bbf5114 | |
4.3.4.3 No unused HTTP methods |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_HTTP_METHODS | |
| Threat Reference | ||
| Requirement Name | Unused HTTP methods shall be deactivated. |
|
| Requirement Reference | ||
| Requirement Description | HTTP methods that are not required shall be deactivated. Standard requests to web servers only use GET, HEAD, and POST. If other methods are required, they shall not introduce security leaks such as TRACK or TRACE. TBA |
|
| Test Purpose | Verify that the Web server has deactivated all HTTP methods that are not required. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | b27e282acddee1878637599d81fcf0c9 | |
4.3.4.4 No unused add-ons |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_ADD-ONS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No unused add-ons |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | All optional add-ons and components of the web server shall be deactivated if they are not required. In particular, CGI or other scripting components, Server Side Includes (SSI), and WebDAV shall be deactivated if they are not required. |
|
| Test Purpose | To verify that the Web server has deactivated unneeded add-ons and unneeded scripting components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 6cc4cc4b4cf12c4fbe6ae99dfc0b2cf2 | |
4.3.4.4 No unused add-ons |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_UNUSED_ADD-ONS | |
| Threat Reference | ||
| Requirement Name | Any add-ons and components that are not required shall be deactivated. |
|
| Requirement Reference | ||
| Requirement Description | All optional add-ons and components of the web server shall be deactivated if they are not required. In particular, CGI or other scripting components, Server Side Includes (SSI), and WebDAV shall be deactivated if they are not required. |
|
| Test Purpose | To verify that the Web server has deactivated unneeded add-ons and unneeded scripting components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 325df3bb588c93a45171028ab26ec227 | |
4.3.4.5 No compiler |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_COMPILER_FOR_CGI | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No compiler, interpreter, or shell via CGI or other server-side scripting. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If CGI (Common Gateway Interface) or other scripting technology is used, the CGI directory - or other corresponding scripting directory - shall not include compilers or interpreters (e.g. PERL® interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells). |
|
| Test Purpose | To verify that there are no compilers, interpreters or shell accessible via CGI or other scripting components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | There are no compilers, interpreters or shells in directories accessible via CGI or other scripting components. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | f78c4a2399976a3dd0b940f0b16e50e3 | |
4.3.4.5 No compiler |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_NO_COMPILER_FOR_CGI | |
| Threat Reference | ||
| Requirement Name | No compiler, interpreter, or shell via CGI or other server-side scripting. |
|
| Requirement Reference | ||
| Requirement Description | If CGI (Common Gateway Interface) or other scripting technology is used, the CGI directory - or other corresponding scripting directory - shall not include compilers or interpreters (e.g. PERL interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells). |
|
| Test Purpose | To verify that the Web server has deactivated unneeded add-ons and unneeded scripting components. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 6ba2978888f4e4b1dca962be054dbfd7 | |
4.3.4.6 No CGI or other scripting for uploads |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_CGI_OR_SCRIPTING_FOR_UPLOADS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No CGI or other scripting for uploads. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If CGI or other scripting technology is used, the associated CGI/script directory shall not be used for uploads. |
|
| Test Purpose | To test whether the upload directory is equal to the CGI/Scripting directory. |
|
| Pre-Conditions | If the web server is configured with CGI/Scripting on, this test applies. |
|
| Execution Steps | Execute the following steps: The tester checks whether the upload directory is configured to be different from the CGI/Scripting directory. |
|
| Expected Results | The configured upload directory is different from the CGI/Scripting directory. Additional evidence might be provided that shows that the web server has no write rights for the CGI/Scripting directory. |
|
| Expected Format of Evidence | A part of the configuration file / screenshot of the configuration showing that the web server is properly configured. |
|
| PDFs | d1b7f63e5fbafef7e271504ec7bab515 | |
4.3.4.6 No CGI or other scripting for uploads |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_CGI_OR_SCRIPTING_FOR_UPLOADS | |
| Threat Reference | ||
| Requirement Name | No CGI or other scripting for uploads. |
|
| Requirement Reference | ||
| Requirement Description | If CGI or other scripting technology is used, the associated CGI/script directory shall not be used for uploads. |
|
| Test Purpose | To test whether the upload directory is equal to the CGI/Scripting directory. |
|
| Pre-Conditions | If the web server is configured with CGI/Scripting on, this test applies. |
|
| Execution Steps | Execute the following steps: The tester checks whether the upload directory is configured to be different from the CGI/Scripting directory. |
|
| Expected Results | The configured upload directory is different from the CGI/Scripting directory. Additional evidence might be provided that shows that the web server has no write rights for the CGI/Scripting directory. |
|
| Expected Format of Evidence | A part of the configuration file / screenshot of the configuration showing that the web server is properly configured. |
|
| PDFs | 153065bcd70939597c59c8e7a1f1d6b0 | |
4.3.4.7 No execution of system commands with SSI |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_EXECUTION_OF_SYSTEM_COMMANDS | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No execution of system commands with SSI. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | If Server Side Includes (SSI) is active, the execution of system commands shall be deactivated. |
|
| Test Purpose | To test whether it is possible to use the exec directive and if so, whether it can be used for system commands. |
|
| Pre-Conditions | If the web server is configured with SSI active, this test applies. |
|
| Execution Steps | Execute the following steps: 1.-The tester checks whether execution of system commands is disabled in the web server configuration.
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 8352edce312289bc981136454b0dbbf3 | |
4.3.4.7 No execution of system commands with SSI |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 → 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_EXECUTION_OF_SYSTEM_COMMANDS | |
| Threat Reference | ||
| Requirement Name | No execution of system commands with SSI. |
|
| Requirement Reference | ||
| Requirement Description | If Server Side Includes (SSI) is active, the execution of system commands shall be deactivated. |
|
| Test Purpose | To test whether it is possible to use the exec directive and if so, whether it can be used for system commands. |
|
| Pre-Conditions | If the web server is configured with SSI active, this test applies. |
|
| Execution Steps | Execute the following steps: The tester checks whether execution of system commands is disabled in the web server configuration. |
|
| Expected Results | For example, a configuration file that shows that the IncludesNOEXEC (APACHE) or ssiExecDisable (IIS) is set. |
|
| Expected Format of Evidence | A part of the configuration file / screenshot of the configuration showing that the web server is properly configured. |
|
| PDFs | fdf8c114862fa4ef16b34811bfb3aebb | |
4.3.4.8 Access rights for web server configuration |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCESS_RIGHTS_WEB_SERVER_FILES | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Access rights for web server configuration files |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges. Implementation example: Delete "read" and "write" access rights for "others." Only grant "write" access to the user who configures the web server. |
|
| Test Purpose | To verify that the access rights for Web server configuration files are correctly set. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 4ce2204cd3478bf7a7c0d95edd718c1f | |
4.3.4.8 Access rights for web server configuration |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_ACCESS_RIGHTS_WEB_SERVER_FILES | |
| Threat Reference | ||
| Requirement Name | Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges. |
|
| Requirement Reference | ||
| Requirement Description | Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges. Implementation example: Delete "read" and "write" access rights for "others." Only grant "write" access to the user who configures the web server. |
|
| Test Purpose | To verify that the access rights for Web server configuration files are correctly set. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 118a61f978a2200061456e2cf4885d39 | |
4.3.4.9 No default content |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_DEFAULT_CONTENT | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | No default content. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server shall be removed. |
|
| Test Purpose | To verify that there is no default content on the web server, that is not needed for web server operation, since such default content can be useful for an attacker. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 986900e5df7b1586d252813dcd05c7a7 | |
4.3.4.9 No default content |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_NO_DEFAULT_CONTENT | |
| Threat Reference | ||
| Requirement Name | Default content shall be removed. |
|
| Requirement Reference | ||
| Requirement Description | Default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server shall be removed. |
|
| Test Purpose | To verify that there is no default content on the web server, that is not needed for web server operation, since such default content can be useful for an attacker. Procedure and execution steps |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 17088478088e5fef324dca412532b830 | |
4.3.5.1 Traffic Separation |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_TRAFFIC_SEPARATION | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Traffic Separation |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The network product shall support physical or logical separation of traffic belonging to different network domains. For example, O&M traffic and control plane traffic belong to different network domains. See RFC 3871 [3] for further information. |
|
| Test Purpose | To test whether traffic belonging to different network domains is separated. |
|
| Pre-Conditions |
The network product has at least two separate (logical) interfaces dedicated to different network domains. Network products for which the test applies and that fail to meet this precondition fail the test by definition. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The two tests are successful. |
|
| Expected Format of Evidence | A PASS or FAIL. |
|
| PDFs | fb9c99d1cf7659fffb80d21c7acfae3d | |
4.3.5.1 Traffic Separation |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_TRAFFIC_SEPARATION | |
| Threat Reference | ||
| Requirement Name | Traffic Separation |
|
| Requirement Reference | ||
| Requirement Description | The network product shall support physical or logical separation of traffic belonging to different network domains. For example, O&M traffic and control plane traffic belong to different network domains. See RFC 3871 [3] for further information. Security Objective references: tba. |
|
| Test Purpose | To test whether traffic belonging to different network domains is separated. |
|
| Pre-Conditions |
The network product has at least two separate (logical) interfaces dedicated to different network domains. Network products for which the test applies and that fail to meet this precondition fail the test by definition. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The two tests should be successful. |
|
| Expected Format of Evidence | A PASS or FAIL. |
|
| PDFs | 8b7b9fb744b57ff592c92cad69d07e35 | |
4.3.6.2 No code execution or inclusion of external resources by JSON parsers |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_JSON_PARSER_CODE_EXEC_INCL | |
| Threat Reference | TR 33.926 [4], clause 6.3.2.1, JSON Parser Exploits |
|
| Requirement Name | No code execution or inclusion of external resources by JSON parsers. |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | Parsers used by Network Functions (NF) shall not execute JavaScript or any other code contained in JSON objects received on Service Based Interfaces (SBI). Further, these parsers shall not include any resources external to the received JSON object itself, such as files from the NF's filesystem or other resources loaded externally. |
|
| Test Purpose | NFs implementing SBI transfer application data serialized as JSON objects. When receiving such data, an NF parses this JSON representation and creates equivalent internal data structures. Since the contents of the JSON objects shall be considered untrusted, blindly executing code fragments or loading resources from a local path or Uniform Resource Identifier (URI) shall not be possible. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | d5f2e7a5ff7f1e39f94f08c0333a5046 | |
4.3.6.2 No code execution or inclusion of external resources by JSON parsers |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 33117-j20 | |
| Test Name | TC_JSON_PARSER_CODE_EXEC_INCL | |
| Threat Reference | TR 33.926 [4], clause 6.3.2.1, JSON Parser Exploits |
|
| Requirement Name | No code execution or inclusion of external resources by JSON parsers. |
|
| Requirement Reference | ||
| Requirement Description | Parsers used by Network Functions (NF) shall not execute JavaScript or any other code contained in JSON objects received on Service Based Interfaces (SBI). Further, these parsers shall not include any resources external to the received JSON object itself, such as files from the NF's filesystem or other resources loaded externally. |
|
| Test Purpose | NFs implementing SBI transfer application data serialized as JSON objects. When receiving such data, an NF parses this JSON representation and creates equivalent internal data structures. Since the contents of the JSON objects must be considered untrusted, blindly executing code fragments or loading resources from a local path or Uniform Resource Identifier (URI) must not be possible. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | da9d05a575d39328a7256ee91ec287c5 | |
4.3.6.3 Unique key values in IEs |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10  33117-i20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust
|
|
| Requirement Name | Validation of the unique key values in IEs. |
|
| Requirement Reference | 3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2. |
|
| Requirement Description | "For data structures where values are accessible using names (sometimes referred to as keys), e.g. a JSON object, the name shall be unique. The occurrence of the same name (or key) twice within such a structure shall be an error and the message shall be rejected". |
|
| Test Purpose | Verify that the API implementation fullfills the requirements as specified in 29.501 [13], clause 6.2. |
|
| Pre-Conditions | Test environment with network product under test. Rest of the network and network products may be simulated. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 750142222346ffbc2b6dcccc16d2d4ec | |
4.3.6.3 Unique key values in IEs |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 33117-i20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust
|
|
| Requirement Name | Validation of the unique key values in IEs. |
|
| Requirement Reference | 3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2. |
|
| Requirement Description | "For data structures where values are accessible using names (sometimes referred to as keys), e.g. a JSON object, the name shall be unique. The occurrence of the same name (or key) twice within such a structure shall be an error and the message shall be rejected". |
|
| Test Purpose | Verify that the API implementation fullfills the requirements as specified in 29.501 [13], clause 6.2. |
|
| Pre-Conditions | Test environment with network product under test. Rest of the network and network products may be simulated. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 750142222346ffbc2b6dcccc16d2d4ec | |
4.3.6.4 The valid format and range of values for IEs |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust
|
|
| Requirement Name | Validation of the IEs limits. |
|
| Requirement Reference | 3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2 |
|
| Requirement Description | "The valid format and range of values for each IE, when applicable, shall be defined unambiguously:
|
|
| Test Purpose | Verify that the API implementation fullfills the requirements as specified in 29.501[13], clause 6.2. |
|
| Pre-Conditions | Test environment with network product under test. Rest of the network may be simulated. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 832b2f50a5a00d6a2af28464fc2effaf | |
4.3.6.4 The valid format and range of values for IEs |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust
|
|
| Requirement Name | Validation of the IEs limits. |
|
| Requirement Reference | 3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2 |
|
| Requirement Description | "The valid format and range of values for each IE, when applicable, shall be defined unambiguously:
|
|
| Test Purpose | Verify that the API implementation fullfills the requirements as specified in 29.501[13], clause 6.2. |
|
| Pre-Conditions | Test environment with network product under test. Rest of the network may be simulated. |
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 832b2f50a5a00d6a2af28464fc2effaf | |
4.4.2 Port Scanning |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 → 33117-j10 33117-j20 | |
| Test Name | TC_BVT_PORT_SCANNING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Port scaning |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | It shall be ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system. The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | To ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system |
|
| Pre-Conditions | A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:
The port scanning tool that is used shall be capable to detect open ports on the relevant transport layer protocols.
|
|
| Execution Steps | The tester is required to execute the following steps:
a. Verification that the list of available network services is available in the documentation of the Network Product b. Validation that all entries in the list of services are meaningful and reasonably necessary for the operation of the Network Product class
|
|
| Expected Results | The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output containing all the technically relevant information about test results is evidence and shall be part of the testing documentation. All discrepancies between the list of identified open ports and the list of available network services in the documentation shall be highlighted in the testing documentation. |
|
| Expected Format of Evidence | Output of portscan and list of identified discrepancies. |
|
| PDFs | 96416441476010691b5e89dead2d23ee | |
4.4.2 Port Scanning |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 → 33117-j10 33117-j20 | |
| Test Name | TC_BVT_PORT_SCANNING | |
| Threat Reference | ||
| Requirement Name | Port scaning |
|
| Requirement Reference | ||
| Requirement Description | It shall be ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system. The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | To ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system |
|
| Pre-Conditions | A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:
The port scanning tool that is used shall be capable to detect open ports on the relevant transport layer protocols.
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
a. Verification that the list of available network services is available in the documentation of the Network Product b. Validation that all entries in the list of services are meaningful and reasonably necessary for the operation of the Network Product class
|
|
| Expected Results | The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output containing all the technically relevant information about test results is evidence and shall be part of the testing documentation. All discrepancies between the list of identified open ports and the list of available network services in the documentation shall be highlighted in the testing documentation. |
|
| Expected Format of Evidence | Output of portscan and list of identified discrepancies. |
|
| PDFs | 3952b85591c09047e699b044f783a24c | |
4.4.3 Vulnerability scanning |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BVT_VULNERABILITY_SCANNING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Vulnerability scanning |
|
| Requirement Reference | In accordance with industry best practice |
|
| Requirement Description | The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product, both in the OS and in the applications installed, that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces. Vulnerability scanning tools can report false positives and they shall be investigated and documented in the test report. The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces. |
|
| Pre-Conditions | A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:
The used vulnerability scanning tool shall be capable to detect known vulnerabilities on common services. The used vulnerability information shall be reasonably recent at the time of testing. |
|
| Execution Steps | The tester is required to execute the following steps:
|
|
| Expected Results | The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation. The discovered vulnerabilities (including source, example CVE ID), together with a rating of their severity, shall be highlighted in the testing documentation. COTS Vulnerability scanners, by their nature, (e.g. depending on how they are configured) can result in false findings/positives. The tool's documentation even mention to repeat checks to determine a recurring problem. The tester shall make best efforts to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.
|
|
| Expected Format of Evidence | Output of BVT tool. |
|
| PDFs | 56ecbbfb86855049cabc3be0c6538d2f | |
4.4.3 Vulnerability scanning |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BVT_VULNERABILITY_SCANNING | |
| Threat Reference | ||
| Requirement Name | Vulnerability scanning |
|
| Requirement Reference | ||
| Requirement Description | The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product, both in the OS and in the applications installed, that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces. Vulnerability scanning tools may also report false positives and they shall be investigated and documented in the test report. The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below. |
|
| Test Purpose | The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces. |
|
| Pre-Conditions | A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:
The used vulnerability scanning tool shall be capable to detect known vulnerabilities on common services. The used vulnerability information shall be reasonably recent at the time of testing. |
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
|
|
| Expected Results | The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation. The discovered vulnerabilities (including source, example CVE ID), together with a rating of their severity, shall be highlighted in the testing documentation. COTS Vulnerability scanners, by their nature, (e.g. depending on how they are configured) may result in false findings/positives. The tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.
|
|
| Expected Format of Evidence | Output of BVT tool. |
|
| PDFs | 754a116bb0ce8cfda82e45c1e7413301 | |
4.4.4 Robustness and fuzz testing |
Home → General → 18.2.0 |
| 33117-h00 33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 →  33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BVT_ROBUSTNESS AND FUZZ TESTING | |
| Threat Reference | TR 33.926 [4] |
|
| Requirement Name | Robustness and fuzz testing |
|
| Requirement Reference | 4.2.6.2.2. -- Interface Robustness |
|
| Requirement Description | It shall be ensured that externally reachable services are reasonably robust when receiving unexpected input |
|
| Test Purpose | To verify that the network product provides externally reachable services which are robust against unexpected input. The target of this test are the protocol stacks (e.g. diameter stack) rather than the applications (e.g. web app). |
|
| Pre-Conditions |
|
|
| Execution Steps | The tester is required to execute the following steps:
a. Using a network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product, the tester verifies that the packets are correctly processed by the network product. b. The testers verifies that the network product and any running network service does not crash. c. The execution of tests shall run sufficient times. |
|
| Expected Results | A list of all of the protocols of the network product reachable externally on an IP-based interface, together with an indication whether effective available robustness and fuzz testing tools have been used against them, shall be part of the testing documentation. If no tool can be acquired for a protocol, a free form statement shall be used to explain why not. The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation. Any input causing unspecified, undocumented, or unexpected behaviour, and a description of this behaviour shall be highlighted in the testing documentation. COTS fuzzing tools, by their nature, may have an acceptable failure rate (e.g. 0.1%) due to different non-deterministic variables in their implementation. At some point the tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 1ef47c3c558660533c8fab745dbc671d | |
4.4.4 Robustness and fuzz testing |
Home → General → 17.1.0 |
| 33117-h00  33117-h10 33117-h20 33117-h30 33117-h40 33117-h50 33117-i00 33117-i10 → 33117-i20 → 33117-i30 → 33117-j00 33117-j01 33117-j02 33117-j10 → 33117-j20 | |
| Test Name | TC_BVT_ROBUSTNESS AND FUZZ TESTING | |
| Threat Reference | ||
| Requirement Name | Robustness and fuzz testing |
|
| Requirement Reference | 4.2.6.2.2. -- Interface Robustness requirements |
|
| Requirement Description | It shall be ensured that externally reachable services are reasonably robust when receiving unexpected input |
|
| Test Purpose | To verify that the network product provides externally reachable services which are robust against unexpected input. The target of this test are the protocol stacks (e.g. diameter stack) rather than the applications (e.g. web app). |
|
| Pre-Conditions |
|
|
| Execution Steps | The accredited evaluator's test lab is required to execute the following steps:
a. Using a network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product, the tester verifies that the packets are correctly processed by the network product. b. The testers verifies that the network product and any running network service does not crash. c. The execution of tests shall run sufficient times. |
|
| Expected Results | A list of all of the protocols of the network product reachable externally on an IP-based interface, together with an indication whether effective available robustness and fuzz testing tools have been used against them, shall be part of the testing documentation. If no tool can be acquired for a protocol, a free form statement should explain why not. The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation. Any input causing unspecified, undocumented, or unexpected behaviour, and a description of this behaviour shall be highlighted in the testing documentation. COTS fuzzing tools, by their nature, may have an acceptable failure rate (e.g. 0.1%) due to different non-deterministic variables in their implementation. At some point the tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
|
|
| PDFs | 0bf77f56bc41f6ff7eea011b279b2c5a | |