4.2.1.1 De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI |
Home → UDM → 18.1.0 |
| 33514-h00 33514-h10 → 33514-i00 →  33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | TC_DE-CONCEAL_SUPI_from_SUCI_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.1, Incorrect SUCI de-concealment. |
|
| Requirement Name | De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Requirement Reference | TS 33.501 [2], clause 5.8.2. |
|
| Requirement Description | The SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI as specified in TS 33.501 [2], clause 5.8.2. |
|
| Test Purpose | Verify that the SIDF De-conceals the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Tester shall capture the entire authentication procedure between UE and AMF over N1, N12 and N13 interface using any network analyser.
|
|
| Expected Results | SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 0632fb0a1641535185c06808f1fd6783 | |
4.2.1.1 |
Home → UDM → 17.0.0 |
|  33514-h00 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | TC_DE-CONCEAL_SUPI_from_SUCI_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.1, Incorrect SUCI de-concealment. |
|
| Requirement Name | De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Requirement Reference | TS 33.501 [2], clause 5.8.2. |
|
| Requirement Description | "The SIDF shall resolve the SUPI from the SUCI based on the protection scheme used to generate the SUCI." as specified in TS 33.501 [2], clause 5.8.2. |
|
| Test Purpose | Verify that the SIDF De-conceals the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Tester shall capture the entire authentication procedure between UE and AMF over N1, N12 and N13 interface using any network analyser.
|
|
| Expected Results | SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | d7aceeeaa98e8d1c0f97c25ac8681d33 | |
4.2.2.1 Synchronization failure handling |
Home → UDM → 18.1.0 |
| 33514-h00 → 33514-h10 → 33514-i00  33514-i10 → 33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause E.2.2.2, Synchronization failure. |
|
| Requirement Name | Synchronization failure handling |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.3.3.2. |
|
| Requirement Description | When the UDM/ARPF receives an Nudm_UEAuthentication_Get Request message with a "synchronisation failure indication" it acts as described in TS 33.102 [7], clause 6.3.5 where ARPF is mapped to HE/AuC. The UDM/ARPF sends an Nudm_UEAuthentication_Get Response message with a new authentication vector for either EAP-AKA' or 5G-AKA depending on the authentication method applicable for the user to the AUSF as specified in TS 33.501 [2], clause 6.1.3.3.2. |
|
| Test Purpose | Verify that synchronization failure is recovered correctly in the home network. |
|
| Pre-Conditions | Test environment with an AUSF. The AUSF or AMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The UDM sends an Nudm_UEAuthentication_Get Response message with a new authentication vector to the AUSF.
|
|
| Expected Format of Evidence | ||
| PDFs | f86fa52fa7c9af271980c5d5068a3be7 | |
4.2.2.1 Synchronization failure handling |
Home → UDM → 17.0.0 |
|  33514-h00 → 33514-h10 → 33514-i00 33514-i10 → 33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4], clause E.2.2.2, Synchronization failure. |
|
| Requirement Name | Synchronization failure handling |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.3.3.2. |
|
| Requirement Description | "When the UDM/ARPF receives an Nudm_UEAuthentication_Get Request message with a "synchronisation failure indication" it acts as described in TS 33.102 [9], clause 6.3.5 where ARPF is mapped to HE/AuC. The UDM/ARPF sends an Nudm_UEAuthentication_Get Response message with a new authentication vector for either EAP-AKA' or 5G-AKA depending on the authentication method applicable for the user to the AUSF.as specified in TS 33.501 [2], clause 6.1.3.3.2. |
|
| Test Purpose | Verify that synchronization failure is recovered correctly in the home network. |
|
| Pre-Conditions | Test environment with an AUSF. The AUSF or AMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The UDM sends an Nudm_UEAuthentication_Get Response message with a new authentication vector to the AUSF.
|
|
| Expected Format of Evidence | ||
| PDFs | 5632da0927db93aa46bff2304dba0a23 | |
4.2.2.2 Storing of authentication status of UE by UDM |
Home → UDM → 18.1.0 |
| 33514-h00 33514-h10 → 33514-i00 →  33514-i10 33514-i20 33514-i30 → 33514-j00 → 33514-j10 | |
| Test Name | TC_AUTH_STATUS_STORE_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.3, Failure to store of authentication status. |
|
| Requirement Name | Storing of authentication status of UE by UDM. |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.4.1a |
|
| Requirement Description | The UDM stores the authentication status of the UE (SUPI, authentication result, timestamp, and the serving network name) after authentication as specified in TS 33.501 [2], clause 6.1.4.1a. |
|
| Test Purpose | Verify that the UDM under test stores the authentication status of UE, which is identical to the UE authentication information sent to/from the AUSF and the AMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The storing of authentication status (SUPI, authentication result, timestamp, and the serving network name) of UE at the UDM is verified. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture.
|
|
| PDFs | e6289db881cf18a7afd015bd7012c0a7 | |
4.2.2.2 |
Home → UDM → 17.0.0 |
|  33514-h00 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 → 33514-j00 → 33514-j10 | |
| Test Name | TC_AUTH_STATUS_STORE_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.3, Failure to store of authentication status. |
|
| Requirement Name | Storing of authentication status of UE by UDM. |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.4.1a |
|
| Requirement Description | "The UDM shall store the authentication status of the UE (SUPI, authentication result, timestamp, and the serving network name) after authentication" as specified in TS 33.501 [2], clause 6.1.4.1a. |
|
| Test Purpose | Verify that the UDM under test stores the authentication status of UE, which is identical to the UE authentication information sent to/from the AUSF and the AMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The storing of authentication status (SUPI, authentication result, timestamp, and the serving network name) of UE at the UDM is verified. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture.
|
|
| PDFs | ffc81f3c574afdf5833c9da3c5e74963 | |
4.2.7.1 UP Security enforcement configuration for TSC service |
Home → UDM → 18.1.0 |
| 33514-h00 → 33514-h10 → 33514-i00  33514-i10 33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "After the 5GS TSC-enabled UE is authenticated and data connection is set up, any data received from a TSC bridge or another 5GS TSC-enabled UE shall be transported between DS-TT (in the UE) and NW-TT (in the UPF) in a protected way using the mechanisms for UP security as described in clause 6.6. The UP security enforcement information shall be set to "required" for data transferred from gNB to a 5GS TSC-enabled UE. This is also applicable to the gPTP messages sent in the user plane." as specified in TS 33.501 [2], clause L.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security enforcement information is set to "required" for dedicated TSC service. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the TSC service. The security policy is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security enforcement information are set to "required". |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | dd737ba47acf39486fa6902cfd0c069c | |
4.2.7.1 UP Security enforcement configuration for TSC service |
Home → UDM → 17.0.0 |
|  33514-h00 → 33514-h10 → 33514-i00 33514-i10 33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "After the 5GS TSC-enabled UE is authenticated and data connection is set up, any data received from a TSC bridge or another 5GS TSC-enabled UE shall be transported between DS-TT (in the UE) and NW-TT (in the UPF) in a protected way using the mechanisms for UP security as described in clause 6.6. The UP security enforcement information shall be set to "required" for data transferred from gNB to a 5GS TSC-enabled UE. This is also applicable to the gPTP messages sent in the user plane." as specified in TS 33.501 [2], clause L.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security enforcement information is set to "required" for dedicated TSC service. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the TSC service. The security policy is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security enforcement information are set to "required". |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | dd737ba47acf39486fa6902cfd0c069c | |
4.2.8.1 UP security policy configuration for 5G LAN service |
Home → UDM → 18.1.0 |
| 33514-h00 → 33514-h10 → 33514-i00  33514-i10 33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "To reduce incremental complexity added by security, all PDU sessions associated with a specific 5G LAN group should have the same UP security policy. When generating the policy enforcement information, and to avoid the redundant double protection, the SMF may consider information by a DN-AAA about DN protection mechanisms already applied." as specified in TS 33.501 [2], clause K.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security policy is set to the same for all the 5G LAN UEs. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the 5G LAN service. The security policy of the 5G LAN service is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security policy1 and UP security policy2 are the same. |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 733e1931f01c54e3a5fbbfa0deb63c61 | |
4.2.8.1 UP security policy configuration for 5G LAN service |
Home → UDM → 17.0.0 |
|  33514-h00 → 33514-h10 → 33514-i00 33514-i10 33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "To reduce incremental complexity added by security, all PDU sessions associated with a specific 5G LAN group should have the same UP security policy. When generating the policy enforcement information, and to avoid the redundant double protection, the SMF may consider information by a DN-AAA about DN protection mechanisms already applied." as specified in TS 33.501 [2], clause K.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security policy is set to the same for all the 5G LAN UEs. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the 5G LAN service. The security policy of the 5G LAN service is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security policy1 and UP security policy2 are the same. |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 733e1931f01c54e3a5fbbfa0deb63c61 | |