9
Home NWDAF

4.2.1.2.6 Protecting data and information -- Data masking on integration analysis

Home NWDAF17.0.0
 33521-h00 33521-h10   33521-h20   33521-i00   33521-j00   33521-k00  
Test Name TC_DATA_MASKING
Threat Reference

TR 33.926 [ 4], clause 5.3.6.7, Personal Identification Information Violation

Requirement Name

Data masking on integration analysis about personal data

Requirement Reference

TBA.

Requirement Description

NWDAF can collect data from UE, NF, OAM, etc. used for analytics. Personal data of the UE's user are involved also. When NWDAF uses such personal data in analytics with other information together, such data correlation operation could bind more personal information with the user's identity. Thus, privacy sensitive information about that specific user could be revealed to the person who is allowed to operate data correlation for analytics but not allowed to know the privacy information as the result of data correlation. Therefore, applicable measures (e.g. data masking) shall be applied to mitigate such privacy violation risk.

Test Purpose

Verify that no privacy information of operators' users is revealed to the party who is not allowed to have.

Pre-Conditions

The vendor shall provide the documentation describing how to create an account for accessing the analytics results.

Privacy information list (should be specified based on local policy, regulation and others).

Execution Steps
  1. Review the documentation provided by the vendor describing how to create the account for accessing the analytics results provided by the NWDAF.

  2. The tester creates the account, and retrieves the analytics results from the NWDAF using the account.

Expected Results
Expected Format of Evidence
PDFs 2c1a6c153513148b7128bbfa5c2ee779

4.2.1.2.6 Protecting data and information -- Data masking on integration analysis

Home NWDAF20.0.0
33521-h00   33521-h10   33521-h20   33521-i00   33521-j00    33521-k00
Test Name TC_DATA_MASKING
Threat Reference

TR 33.926 [ 4], clause 5.3.6.7, Personal Identification Information Violation

Requirement Name

Data masking on integration analysis about personal data

Requirement Reference

In accordance with industry best practice..

Requirement Description

NWDAF can collect data from OAM, MDAF and/or 5GC NFs (e.g. AMF) etc. for analytics purposes. Since personal data of the users could be involved , there is a potential privacy impact. As the NWDAF can expose its service operations with a request for bulked data, anonymization of data fields shall be applied to avoid exposing undesired information, aggregation levels.

Test Purpose

Verify that no privacy-related information of the subscribers is disclosed to any entity who is not authorized to access such information.

Pre-Conditions

Privacy information list (contains e.g. PII, location data, network identifiers, session information; should be specified based on local policy, regulation and others).

NOTE: If user consent check is implemented, user consent for data collection is granted.

The following entities are operational, integrated and simulated:

  • NWDAF.

  • 'data producer' (NF- or OAM as source for data collection which generates user data containing privacy info, e.g. AMF).

  • 'analytics consumer' (NF- or OAM to which the NWDAF exposes analytics).

The data producer is configured to receive and accept subscription requests from the NWDAF for events according to TS 29.552 [6], clause 5.5.1.1.

Execution Steps
  1. Tester triggers behaviour so that the 'data producer' is required to handle privacy information (e.g. for AMF trigger registration request at UE).

  2. The tester sends an Nnwdaf_AnalyticsInfo_Request request message from the 'analytics consumer' to NWDAF according to TS 29.552 [6], clause 5.2.3.1. The request message shall be crafted to capture information from step 1.

  3. The tester retrieves the Nnwdaf_AnalyticsInfo_Request response message from the NWDAF.

Expected Results

The analytics results do not reveal subscriber permanent identifier nor any other data listed on the Privacy information list.

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot, pcap trace, log files containing the results.

PDFs 910f575dd12365a62a614d0418ed112b

4.2.2
Finding the right NF instance are serving the UE

Home NWDAF17.0.0
 33521-h00 33521-h10   33521-h20   33521-i00   33521-j00   33521-k00  
Test Name TC_NWDAF_FIND_NF_SRVING_UE
Threat Reference

TS 33.926 [4], [clause X.Y]{.mark}.

Requirement Name

Finding the right NF instance are serving the UE

Requirement Reference

TS 23.288 [2], clause 6.2.2.1.

Requirement Description

To retrieve data related to a specific UE, the NWDAF shall first determine which NF instances are serving this UE as stated in table 4.2.2.1-2 unless the NWDAF has already obtained this information due to recent operations related to this UE.

Table 4.2.2.1-2: NF Services consumed by NWDAF to determine which NF instances are serving a UE

----------------------------------------------------------------------------------------------------------------------------------------------- Type of NF instance (serving the UE) to determine NF to be contacted by NWDAF Service Reference in TSĀ 23.502 [3] ------------------------------------------------------- --------------------------------- ------------------ ---------------------------------- UDM NRF Nnrf_NFDiscovery 5.2.7.3

AMF UDM Nudm_UECM 5.2.3.2

SMF UDM Nudm_UECM 5.2.3.2

BSF NRF Nnrf_NFDiscovery 5.2.7.3

PCF BSF Nbsf_Management 5.2.13.2

NEF NRF Nnrf_NFDiscovery 5.2.7.3 -----------------------------------------------------------------------------------------------------------------------------------------------

"as specified in TS 23.288 [2], clause 6.2.2.1.

Test Purpose

Verify that the NWDAF always find a recent NF from operations related to the UE.

Editor's Note: Purpose of test to be clarified.

Pre-Conditions

Test environment with UE, source AMF, and target AMF and UDM. UE, source AMF, target AMF and UDM may be simulated.

The UE is registrated on the source AMF and the UDM, and the NWDAF subscribes analytics A which needs to collect the UE's information on the source AMF.

Execution Steps
Expected Results
Expected Format of Evidence
PDFs 2a09d043500caa223900bdb5fd1e0b70

4.2.2 Does not exist in this document version
BEWARE: This could be caused by a parsing error. Please check original document!

Home NWDAF20.0.0