6.1.1.1 Normal Vendor-Supported Products |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_SUPPLIER_VULN_MONITORING | |
| Threat Reference | TBD |
|
| Requirement Name | Vendor-Supported Products |
|
| Requirement Reference | TBD |
|
| Requirement Description | Software and hardware of the system must be covered by security vulnerability support from the supplier. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Validate that the supplier provides continuous vulnerability monitoring, timely advisories, and effective updates for all in-use software and hardware. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | The following are acceptable:
|
|
| PDFs | 872e82db67b57d9700223a33e0c549ce | |
6.1.1.10 Configurable and Exchangeable Cryptographic Methods |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_CONFIGURABLE_CRYPTO_METHODS | |
| Threat Reference | TBD |
|
| Requirement Name | Configurable Cryptographic Methods |
|
| Requirement Reference | TBD |
|
| Requirement Description | Applications must support configuration of cryptographic methods and provide functions to exchange encryption algorithms. Deactivation and modification capabilities (e.g., cipher suite adjustments) must be built during development. Functions to exchange encryption algorithms (re-encryption) apply only to persistent data storage, not to transport encryption. This enables substitution of broken schemes due to new attacks or future computing architectures. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Verify that cryptographic methods are configurable and that applications can exchange encryption algorithms for persistent data storage. Ensure that cipher suite modification and algorithm substitution functions are implemented and usable. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 9983cdf9017281888a89ba0c591142a3 | |
6.1.1.11 Continuous Integration/Continuous Delivery Separation |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_CI/CD_SEPARATION | |
| Threat Reference | TBD |
|
| Requirement Name | CI/CD Separation |
|
| Requirement Reference | TBD |
|
| Requirement Description | The CI/CD chain must be separate from systems that use it; there must exist no shared hosts/components/networks. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | The goal of this test is to verify that the CI/CD chain is fully separated from software/systems that use it (tenants), and that no tenant workloads (including jobs executed on runners) can reach or use CI/CD internal components (e.g., Source Code Management Database, runner management endpoints, internal message bus, package registry internals, artifact storage internals, management UIs). |
|
| Pre-Conditions |
a. SCM application nodes (control plane/API/UI) b. SCM internal DB (e.g., PostgreSQL) c. Runner management/control interfaces d. Internal message bus/queues (if any) e. Artifact store internal endpoints (not the public download URL) f. Container/package registry internal endpoints g. Admin/management interfaces (UI/API)
|
|
| Execution Steps |
a. Collect host inventory: confirm CI/CD nodes and tenant application nodes are distinct (no shared VMs/nodes). b. Collect subnet/VLAN/Security Group definitions: CI/CD internals isolated from tenant subnets. c. If Kubernetes is used, verify no shared Kubernetes namespaces or nodes between CI/CD control plane/runners and tenant apps.
a. Verify CI/CD admin accounts are not used for tenant repos or pipelines. b. Verify runner registration tokens/credentials are not exposed in tenant projects. c. Confirm tenant maintainers cannot access CI/CD system/global settings.
Using the probe job in a tenant pipeline (non-privileged runner): a. Attempt TCP/UDP connections to each CI/CD internal component (list from Preconditions #3). b. Attempt HTTP(S) GET/POST to CI/CD admin/management endpoints and runner management endpoints. c. Attempt DNS resolution of internal hostnames (if split-DNS is used). d. Attempt access to SCM internal DB (e.g., TCP 5432) and message bus ports. e. Attempt access to artifact/registry internal endpoints (not public URLs). f. Record results (connectivity blocked/allowed, HTTP status codes, TLS handshake outcomes).
a. Inspect runner configuration: ensure no "privileged" or host-mounted sensitive paths that could expose CI/CD internals (e.g., docker.sock, host networking). b. Validate runner scope: project/group-scoped; not shared globally with CI/CD internals. c. If Kubernetes executors are used, validate network policies (no egress to CI/CD internals; default-deny/explicit-allow only to public endpoints required for builds).
a. From a tenant maintainer account, attempt to reach admin areas (system settings, user management, runner admin pages). b. Verify HTTP(S) returns 403.404 or redirects to login without privilege escalation.
a. Confirm that blocked access attempts from the probe job are logged by Firewall/Web Application Firewall/service-mesh (and optionally alerted). b. Verify CI/CD app logs show no successful privileged access from tenant identities.
a. Create a repo that stores CI/CD deployment code (e.g., Ansible/Terraform) inside the CI/CD. b. Ensure pipelines that would deploy/redeploy the CI/CD are disabled or blocked (e.g., protected branch rules, approval gates that prohibit execution, or policy-as-code denying these jobs). c. Attempt to run a deployment pipeline; verify it is prevented per policy (store/test allowed; deploy not allowed). |
|
| Expected Results |
a. No shared compute nodes between CI/CD internals and tenant systems. b. CI/CD internal subnets not routable from tenant runners/namespaces (default-deny in place).
a. Tenant identities cannot view/modify CI/CD global settings, runners, or secrets. b. Runner tokens/registrations are compartmentalized; no cross-tenant leakage.
a. All direct connections from tenant jobs to CI/CD internals fail (SYN blocked, TLS handshake fails, HTTP 403.404 for public edges). b. DNS for internal hostnames not resolvable from tenant jobs.
a. Runners are non-privileged for tenant projects; no host networking, no docker.sock, no sensitive mounts (any volume/pipe/socket/device a runner job mounts that could give it control of the host, access to CI/CD internals, or long-lived secrets/credentials beyond that job's scope). b. Runner scope does not include CI/CD administrative projects or org level.
a. Tenant maintainers cannot access admin/management pages or APIs.
a. Blocked attempts are recorded with source project/runner identity and destination component; optional alert raised.
a. Storing/testing CI/CD deployment code is allowed. b. Any attempt to deploy CI/CD from within CI/CD is blocked by policy/gates; evidence shows prevented execution.
a. If any internal endpoint is reachable from tenant jobs, this is a FAIL (a requirement violation). b. Pay special attention to "hidden" internals exposed by misconfigured service discovery, sidecars, or shared node-locals (e.g., metadata services, registries on host network). c. For Kubernetes: verify NetworkPolicy/CNI enforces default-deny egress from runner pods. |
|
| Expected Format of Evidence |
|
|
| PDFs | 9536dc6e490c30923d8298e7881e0fc0 | |
6.1.1.12 Log Leak of LI Identifiers During LI Provisioning |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_LOG_IDENTIFIER_LEAK_PROVISIONING | |
| Threat Reference | T-LOG-01 |
|
| Requirement Name | Confidentiality of LI Identifiers |
|
| Requirement Reference | TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties |
|
| Requirement Description | General-purpose logs must not contain Lawful Interception (LI) identifiers or other sensitive LI information. Only LI-protected audit logs, only accessible to LI-cleared personnel, may contain such details. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Validate that LI identifiers and LI-specific events are not written during provisioning activities to general-purpose system or application logs accessible by non-LI-authorized administrators. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 96b188e6ad19843e210885e373d5292e | |
6.1.1.13 Log Leak of LI Identifiers During Communication Time |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_LOG_IDENTIFIER_LEAK_RUN_TIME | |
| Threat Reference | T-LOG-01 |
|
| Requirement Name | Confidentiality of LI Identifiers |
|
| Requirement Reference | TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties |
|
| Requirement Description | General-purpose logs must not contain sensitive LI information. Only LI-protected audit logs, only accessible to LI-cleared personnel, may contain such details. When identifiers of intercepted targets appear in general-purpose logs (e.g., as part of routine signaling or service activity), no additional information shall indicate that the subscriber is subject to Lawful Interception. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Validate that general-purpose logs, while possibly containing subscriber identifiers as part of normal service records, do not contain information or markers that reveal LI surveillance activity. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a) Explicit LI-related flags, tags, or annotations. b) Error messages referencing LI functions. c) Duplicated or anomalous log entries indicating redirection or duplication of traffic.
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 053ab7975a6131bc7ca42f34fd537212 | |
6.1.1.14 Log Segregation |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_LOG_SEGREGATION | |
| Threat Reference | TBD |
|
| Requirement Name | Segregation of LI Logging |
|
| Requirement Reference | TS 33.126: R6.6 - 30 Undetectability by Non-Authorized Parties |
|
| Requirement Description | LI audit and operational logs must be segregated from all non-LI logging subsystems. Access to LI logs must be restricted to LI-cleared personnel only. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Validate that the LI logging subsystem is logically and physically segregated from non-LI (general purpose) logs, ensuring that LI log data cannot be accessed through non-LI interfaces or roles. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | df477ab9f8be79e9870746c9d96c4425 | |
6.1.1.2 Open-Source Products |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_OPEN_SOURCE_VULN_SUPPORT | |
| Threat Reference | TBD |
|
| Requirement Name | Vendor-Supported Products |
|
| Requirement Reference | TBD |
|
| Requirement Description | Software and hardware of the system must be covered by security vulnerability support from the supplier. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Ensure open-source components are covered by a reliable vulnerability management program (community or designated third party). |
|
| Pre-Conditions |
|
|
| Execution Steps | Note: the following shall be performed for each artifact.
|
|
| Expected Results |
|
|
| Expected Format of Evidence | The following are acceptable:
|
|
| PDFs | cd5783f6e29e40336f4e11efe583a2f0 | |
6.1.1.3 Trusted Sources |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_TRUSTED_SOURCES | |
| Threat Reference | TBD |
|
| Requirement Name | Trusted sources |
|
| Requirement Reference | TBD |
|
| Requirement Description | All software used on the system (firmware, OS, libraries, applications, appliances, containers) must be obtained from trusted sources (official supplier channels, authorized distributors, or official provisioning servers with validated cryptographic protection). References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Ensure software is only obtained from official supplier channels, authorized distributors, or trusted provisioning servers. |
|
| Pre-Conditions |
|
|
| Execution Steps | Note: the following shall be performed for each artifact.
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 6acd39e682a865248c865621cfbab879 | |
6.1.1.4 Integrity |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_INTEGRITY_CHECKING | |
| Threat Reference | TBD |
|
| Requirement Name | Integrity checking |
|
| Requirement Reference | TBD |
|
| Requirement Description | All software used on the system (e.g., firmware, OS, libraries, applications, appliances, containers) must be verified for integrity before installation (e.g., supplier-provided hashes, signatures, Certificate of Authenticity on physical media) References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Ensure downloaded software is integrity-verified using supplier-provided checksums or signatures. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | c8d1ceea7f4b6e62928fc328073340d8 | |
6.1.1.5 Feature Deactivation |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_FEATURE_DEACTIVATION | |
| Threat Reference | T-INTERFACE-SEC-10, T-FEATURE-11 |
|
| Requirement Name | Feature Deactivation |
|
| Requirement Reference | TBD |
|
| Requirement Description | Features that are not required in the software and hardware used shall be deactivated. References: Asset reference: AS-LI-FUNCTION-05, AS-API-CONF-10 Attacker reference: AT-INTERNAL-01, AT-EXTERNAL-02 |
|
| Test Purpose | During the initial installation of software, default-activated services that are not necessary for the operation and functionality of the specific system shall be disabled. These features typically cannot be uninstalled individually but must be deactivated via configuration settings. Disabled features shall remain permanently inactive across reboots. Similarly, unnecessary hardware functions (e.g., unused interfaces) must be permanently disabled during initial commissioning. Inactive features reduce the system's attack surface and minimize opportunities for unauthorized access, manipulation, or information leakage. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Access a disabled service or interface and confirm rejection. b. Re-enable a disabled feature without explicit administrator action, and confirm block/failure.
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 8d9950fd75b02995077bfa7ffb99c3df | |
6.1.1.6 Service Deactivation |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_SERVICE_DEACTIVATION | |
| Threat Reference | T-INTERFACE-SEC-10, T-FEATURE-11 |
|
| Requirement Name | Service Deactivation |
|
| Requirement Reference | TBD |
|
| Requirement Description | Only services necessary for system operation may remain active. All supplier-preset, local, or network-accessible services that are not required for the LI system (e.g., default web servers or file-sharing daemons that are not part of LI operation) shall be disabled immediately after installation. Further, less secure management protocols (e.g., Telnet, FTP) shall be removed in favor of more secure alternatives. Disabled services shall remain inactive across system restarts. References: Asset reference: AS-LI-FUNCTION-05, AS-API-CONF-10 Attacker reference: AT-INTERNAL-01, AT-EXTERNAL-02 |
|
| Test Purpose | Unnecessary services increase the system's attack surface and risk of compromise, particularly since such services are rarely optimized for secure operation. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 9aaa7bd4f40b6f20bffe280d946c30f7 | |
6.1.1.7 Standardized Cryptographic Algorithms and Primitives |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_STANDARDIZED_CRYPTO_ALGORITHMS | |
| Threat Reference | TBD |
|
| Requirement Name | Standard Cryptographic Primitives |
|
| Requirement Reference | TBD |
|
| Requirement Description | Only standardized cryptographic algorithms and primitives published by accredited organizations shall be used. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | All cryptographic algorithms, primitives, protocols, and parameters used in development and integration shall conform to standards published by accredited bodies (e.g., ETSI, SOGIS, NIST, ISO/IEC, IETF, BSI). Any deviation shall be itemized and justified. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 679563b03e0e783bae76421fb5a0f15e | |
6.1.1.8 Use of Well-Established and Up-to-Date Crypto Libraries |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_CRYPTO_LIBRARIES | |
| Threat Reference | TBD |
|
| Requirement Name | Standard Crypto Libraries |
|
| Requirement Reference | TBD |
|
| Requirement Description | Well-established and up-to-date cryptographic libraries must be used to implement cryptographic algorithms. The use of self-implemented cryptographic methods is prohibited unless explicitly required, in which case such implementations must follow industry best practices. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Ensure that only well-established and up-to-date cryptographic libraries are used. Self-implemented cryptographic methods shall be avoided unless justified. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 61c0dfe4612270aefc84b24cfe140878 | |
6.1.1.9 Replaceable Cryptographic Modules |
Home → LI baseline → 0.0.9 |
|  33129-1-009 | |
| Test Name | TC_LI_COMMON_REPLACEABLE_CRYPTO_MODULES | |
| Threat Reference | TBD |
|
| Requirement Name | Modular Cryptographic Implementations |
|
| Requirement Reference | TBD |
|
| Requirement Description | Cryptographic methods must be implemented in replaceable modules. Static implementations are prohibited, as they hinder corrections, replacements, and upgrades in the event of security incidents, evolving threats (e.g., quantum computing), or changing performance requirements. Implementations must allow seamless substitution of algorithms and provide sufficient hardware resources to support stronger cryptographic methods. References: Asset reference: AS-LI-FUNCTION-05 Attacker reference: TBD |
|
| Test Purpose | Verify that cryptographic methods are implemented in modular, replaceable components such that algorithms, key lengths, or libraries can be substituted without requiring major redesign or system downtime. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | b5954cebee3b111b5217d01990616c4e | |