Cell Broadcast Centre
Cell Broadcast Centre
i
Document History
Sl. No ITSAR Reference Title Remarks
1
ii
Contents
A) Outline ......................................................................................................................................................... iv
B) Scope ..............................................................................................................................................................v
C) References .................................................................................................................................................... v
D) Definitions and Acronyms ..................................................................................................................... v
E) Conventions ................................................................................................................................................. x
Chapter 1 – Introduction ............................................................................................................................. 1
Chapter 2 – Common Security Requirements ..................................................................................... 5
Chapter 3 Specific Security Requirements ......................................................................................... 31
Appendix ......................................................................................................................................................... 32
iii
A) Outline
This document specifies the security requirements of Cell Broadcast Centre which is used
by Indian TSPs to disseminate ‘one to many’ cell broadcast messages to the receivers (cell
phones/mobile handsets that have been configured to receive) within a particular
geographical area. These areas may comprise of one or more cells, or may comprise the
entire PLMN. The Cell Broadcast service is mainly used at providing location information
to customers who have been served by the particular cell site. Indian TSPs also use
the Cell Broadcast services for campaigns and providing VAS. The Emergency
Alert/Public Warning is one of the established use cases for Cell Broadcast service. In
India, National Disaster Monitoring Authority is working on a project which will use Cell
Broadcast as one of the channels for sending alerts in an emergency situation.
The objective of this document is to present a comprehensive, country specific security
requirements for Cell Broadcast Centre. There are various international standardization
bodies/associations like 3GPP, ATIS ETSI etc who have been working on the security
aspects related to Cell Broadcasting. The specifications produced by these bodies along
with the country specific security requirements are the basis for this document.
This document commences with a concise description of Cell Broadcasting and proceeds
to address the common and entity specific security requirements of Cell Broadcast
Centre.
iv
B) Scope
This document lays down the security requirements of Cell Broadcast Centre (CBC)
deployed in GSM/W-CDMA/LTE/LTE-A networks. This document does not cover the
security requirements of interfaces between CBC and the respective RAN nodes of
2G/3G/4G mobile network elements. The requirements specified here are binding on
both operators (aka Telecommunication Service Provider- TSP) and Cell Broadcast
equipment providers (aka OEMs-Original Equipment Manufacturer).
The regulations regarding Remote Access and Lawful Interceptions are not part of this
ITSAR. Similarly, the security features of Public Warning System are not considered here.
C) References
1. 3GPP TS 23 041, Version 11.0.0 Technical realization of Cell Broadcast Service (CBS)
2. 3GPP TS 22.268 Version 11.5.0 Public Warning System Requirements
3. TEC ER No.: TEC/ER/MT/CBC-001/01/APRIL 2018 Cell Broadcast Centre
4. TEC GR 22140:2015 Generic Requirement for Short Message Service Cell Broadcast
(SMSCB)
5. TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0: "Catalogue of General Security Assurance
Requirements".
6. 3GPP TS 44.012 - Short Message Service Cell Broadcast (SMSCB)
7. GSMA- A report on Mobile Networks Public Warning Systems and the rise of Cell
Broadcast
D.1 Definitions
1. 3GPP: The 3rd Generation Partnership Project (3GPP) unites seven
communications standard development organizations (ARIB, ATIS, CCSA, ETSI,
TTA, TTC, TSDSI) known as Organizational Partners to develop specifications
related to 3GPP technologies.
2. Administration involves keeping track of resources in the networks and how they
are assigned so as to meet service quality objectives. It deals with all the
“housekeeping” that is necessary to keep things under control.
3. C-interface: Reference Point C is the secure interface between the Govt Alert
Gateway and the Cell Broadcast System.
4. Cell: In a wireless communication, cell is the smallest geographical area
encompassing the signal range from one Base Station.
5. Cell Broadcast Entity (CBE): It is not owned by the operator and is responsible for
originating cell broadcast messages. It is also responsible for all aspects of
formatting cell broadcast messages, including the splitting of a cell broadcast
message into a number of pages. Cell broadcast messages may originate from a
v
number of Cell Broadcast Entities (CBEs), which are connected to the Cell
Broadcast Centre.
6. Cell Broadcast Centre: It is the heart of the Cell broadcasting system and is located
in operator’s domain. It may be implemented in redundant configuration. Cell
Broadcast Centre provides facility for accepting and storing messages from Cell
Broadcast Entities and forwarding these messages to their destination
BSCs/RNCs/MMEs of GSM/WCDMA/LTE network at the appropriate time.
7. Cell Broadcast Messages: A Cell Broadcast message consists of a 88 octets of
information. The first 6 Octets are used to identify and define the message
characteristics, the next 82 are used to carry the message payload itself. This
allows for a total number of 93 Characters (GSM 7-bit alphabet) to be used in a
single message page, a total message may consist of 15 concatenated pages. Thus,
a Cell broadcast message may have the maximum length of 15X93=1395
characters.
8. Common Alerting Protocol (CAP): CAP is an open, non-proprietary digital message
format for distributing all types of alerts and notifications to organizations
responsible for the dissemination of the emergency notification (e.g. TV/Radio
Broadcast companies, network operators) to individuals.
CAP messages can be sent in several language and can be targeted to specific
geographical areas. CAP contains information such as the nature of the alert (e.g.
fire), the severity (e.g. extreme), affected area, broadcast repetition rate and
advice/instructions, etc. CAP data is described in terms of XML facilitating its
exchange across different formats. CAP format is standardized by OASIS i.e
Organization for the Advancement of Structured Information Standard. CAP was
also recommended by the International Telecommunication Union (ITU) vide
X.1303.
9. Commercial Mobile Alert System (aka, Wireless Emergency Alert): Public
Warning System that delivers Warning Notifications provided by Warning
Notification Providers to CMAS capable PWS-UEs. CMAS defines the following
classes of Warning Notifications: Presidential, Imminent Threat, Public Safety,
Child Abduction Emergency, and State/Local WEA Test.
10. Earthquake and Tsunami Warning System: Public Warning System that delivers
Warning Notifications specific to Earthquake and Tsunami provided by Warning
Notification Providers to the UEs which have the capability of receiving Primary
and Secondary Warning Notifications within Notification Areas through the 3GPP
network
11. Firmware refers to the programs and data components of an ICT product that are
stored in hardware (e.g., ROM, PROM, EPROM, EEPROM or FLASH) and cannot be
dynamically written or modified during execution. It is said to be hard-wired and
a hybrid between hardware and software.
12. Hardware refers to the physical objects, components, circuits and sub-assemblies
that are physically and electronically coupled to process programs and data.
13. Local access: The access from Console interface, from local Console network, from
LMT (Local Maintenance Terminal interface) or from CBC’s local hardware
interface.
vi
14. Machine Accounts: These will be used for authentication and authorization from
system to system or between applications on a system and cannot be assigned to
a single person or a group of persons.
15. Maintenance refers to activities, such as tests, measurements, replacements,
adjustments, and repairs, upgrades/updates necessary to restore or maintain a
network resource in a specified state so that the resource can perform its required
functions. It also involves corrective and preventive proactive measures.
16. MS/UE: These entities receive and display Cell Broadcast messages based on
filtering criteria defined by the user with respect to desired categories.
17. NMS: A Network Management System is a network management layer ( ITU-T
M.3010) operations system.
18. Network Management: It refers to activities, methods, procedures and tools that
pertains to operation, administration, maintenance and provision of networked
systems (OAMP).
19. Network Operations Centre (NOC): NOC handles the operation and maintenance
at network levels. The functions of network operations like fault
management/service restoration, configuration management, performance
management/traffic management, security management, accounting
management, report management and inventory management are administered
at NOC. A network will generally have only one NOC. NOC is focused on network
management functions such as network monitoring traffic management and
signaling management. NOC is also responsible for gathering statistics and
generating reports for management, system support, and users.
20. Octet is a 8 bit of data.
21. Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
the problems as soon as possible, ideally before service is affected. In short, it
refers to the processes and procedures used to manage and control
telecommunications network devices and telecommunications management
Network (TMN)-related devices.
22. Operations Support System (OSS) is a server that hosts the implementation of the
OSS Application layer in the form of one or more specific OSS applications; the
applications might be implemented by Enterprise Java Beans, CORBA objects or
Web Services. While eMS and NMS are responsible for managing the network and
network resources, OSS supports the operation of network and service
management systems.
23. Public Warning System (PWS) is a service offered by authorities to alert the public
of an impending emergency situations that are caused by earthquake, tsunami,
cyclone, flood, act of terrorism etc. These alerts will help public to prepare better
and act in a timely manner to minimize the impact of such disasters. Some
countries use this to notify people of a Child Abduction Emergency (e.g., AMBER
alert), prison escape etc. The different warning system supported by 3GPP are:
ETWS (Rel 8), CMAS (Rel 9), KPAS (Rel 10), EU-ALERT (Rel 11).
24. Provisioning is concerned with configuring resources in the network to support a
given service to users. The act of specifying parameters necessary when
assigning/de-assigning network resources to/from the control plane or to
vii
invoke/remove services provided by a control plane instance. These parameters
are specific to a resource or service request, causing changes to these parameters
to only impact a specific resource or service request. Therefore, provisioning is
allowed in the initialization and operations phases of control plane lifecycle.
25. Remote Access: The access which is not Local access. This includes access from the
EMS (Element Management System) network, and access that originates or passes
through the internet.
26. Sensitive Data: data that may be used for authentication or may help to identify
the user, such as user names, passwords, PINs, cryptographic keys, IMSIs, IMEIs,
MSISDNs, or IP addresses of the UE, as well as files of a system that are needed for
the functionality such as firmware images, patches, drivers or kernel modules.
27. Software refers to the programs and data components which are usually stored
on erasable media (e.g., disk), that can be dynamically written and modified during
execution. Two general categories of software are system software and
application software.
28. 10/100/1000 Base-T: Ethernet connection method which operates at 10,
100,1000 Mbps and uses twister pair cables. Base here denotes that base band
transmission is used.
D.2 Acronyms
3GPP: Third Generation Partnership Project
ATIS: Alliance for Telecommunications Industry solutions
BSC: Base Station Controller
BTS: Base Transceiver Station/System
CAP: Common Alerting Protocol
CBC: Cell Broadcast Centre
CBE: Cell Broadcast Entity
CBS: Cell Broadcast Service
CMAS: Commercial Mobile Alert System
CMSP: Commercial Mobile Service Provider
CVSS: Common Vulnerability Scoring System
CWE: Common Weakness Enumeration
CVE: Common Vulnerabilities and Exposures
EAS: Emergency Alert System
ENTEL: Emergency Communications
ETSI: European Telecommunications Standards Institute
viii
ETWS: Earthquake and Tsunami Warning System
EU-Alert: European Union-Alert
IEEE: Institute of Electrical and Electronics Engineers
IETF: Internet Engineering Task Force
ITU-T: International Telecommunication Union-Telecommunication Standardization
KPAS: Korean Public Alert System
LCT: Local Craft Terminal
MME: Mobility Management Entity
MS: Mobile Station
OASIS: Organization for the Advancement of Structured Information Standards
PLMN: Public Land Mobile Network
PPDR: Public Protection and Disaster Relief
PSAP: Public Safety Answering Point
PWS: Public Warning System
RNC: Radio Network Controller
TDM: Time Division Multiplexing
TEC: Telecommunication Engineering Centre
UE: User Equipment
VAS: Value Added Service
WEA: Wireless Emergency Alert
ix
E) Conventions
x
Chapter 1 – Introduction
Cell Broadcast message may originate from a number of Cell Broadcast Entities connected
to CBC. CBS messages are broadcast cyclically by the cell at a frequency and for a duration,
which can be specified. The mobile stations/user equipments within the catchment area
of the transmitting BTS/Node B/e-NodeB will be able to receive the broadcast messages,
provided that they are switched on and in the idle state.
The CBS messages may be broadcast on two different (basic & extended) channels, which
are characterised by different Quality of Service (QoS).
To permit mobiles to selectively display only those messages required by the MS/ UE
user, CBS messages are assigned a message class, which categorises the type of
information that they contain and the language (Data coding Scheme). The subscriber
may be able to select which message classes he/she wishes to have displayed on his/her
receiver. A network may be able to remotely activate mobile terminals in order to enable
them to receive CBS messages, according to regulatory requirements. The service is
asymmetric, as messages originate from Cell Broadcast Entity (CBE) and are received by
mobile subscribers but mobile subscribers cannot originate messages. The service
facilitates scheduling and repeated transmissions of messages with each message having
associated with it a repetition rate and a required number of broadcasts
1) Cell Broadcast messages are location based and will be receivable by even in-
roamers.
2) Cell broadcast messages are unidirectional and unacknowledged broadcast where
messages are transmitted from network to mobile terminals.
3) Cell Broadcast service does not violate privacy of citizens.
4) Cell Broadcast messages are fast and allows text or binary messages.
Cell Broadcast services are mainly for disseminating alert in case of disasters. In case of
M2M messaging, M2M server can send the trigger to M2M device through cell broadcast
in an efficient manner that can reduce traffic, and provide for less battery drain. Some
operators are using Cell Broadcasting for providing Value Added Services.
1
a) Cell Broadcast Centre
CBC is the heart of the Cell Boradcast Service architecture. The CBC may be connected to
several BSCs/RNCs/MMEs. The CBC may be connected to several CBEs. The CBC shall be
responsible for the management of CBS messages including:
- allocation of serial numbers;
- modifying or deleting CBS messages held by the BSC/RNC/eNodeB;
- initiating broadcast by sending fixed length CBS messages to a BSC/RNC/e Node
B for each language provided by the cell, and where necessary padding the pages to a
length of 82 octets;
- determining the set of cells to which a CBS message should be broadcast, and
indicating within the Serial Number the geographical scope of each CBS message;
- determining the time at which a CBS message should commence being broadcast;
- determining the time at which a CBS message should cease being broadcast and
subsequently instructing each BSC/RNC/e-Node B node to cease broadcast of the CBS
message;
- determining the period at which broadcast of the CBS message should be
repeated;
- determining the cell broadcast channel in GSM, on which the CBS message should
be broadcast.
- when CBS transmits emergency messages, allocation of "emergency indication" to
differentiate it from normal CBS messages, including the "Cell ID/Service Area ID list",
"warning type", "warning message". If "warning type" is of 'test', only UEs which are
specially designed for testing purposes may display warning message.
2
The structure of CBC may be divided in the following components:
i. CBC Hardware
ii. Operating System
iii. Relational Database Management
iv. CBC software platform
v. Interfaces
b) Cell Broadcast Entity: Cell broadcast messages originate from a number of Cell
Broadcast Entities (CBEs). There can be many CBEs in a CB system.
The CBE functionality shall be as follows:
i. Submit CBM requests: It shall be possible to enter a message and its associated
broadcast information (broadcast times, rates etc.) and commit this information to the
database.
ii. Query CBM requests: It shall be possible to query any pending or live message requests
generated by the CBE. It shall be possible to view the broadcast status of the request, the
scheduling information or the success or failure of the broadcast.
iii. Cancel CBM requests: It shall be possible to cancel any pending or live message
requests generated by the CBE.
iv. Modify CBM requests: It shall be possible to modify any information pertaining to an
existing message request.
c) Operation, Administration and Management System: Typically CBCs are located at
operator premises and are managed by operator.
d) Geographical Information System (GIS): The Geographical Information System gives
the geographical nature of the Cell Broadcast System. The GIS provides a powerful means
of interpreting and representing data relating to network coverage areas.
III Public Warning System(PWS) : Emergency alert is one of the proven and established
use cases of Cell Broadcasting . Cell Broadcasting is an ideal solution for emergency alert
due to
1) Over the radio channels, CB messages are carried with the highest priority
(3G/4G) or is carried on a dedicated CBCH channel(2G)
2) Alerts can be transmitted in near real time to millions of users.
3) Alerts can be supported in multiple languages
4) It does not require user interaction.
5) Alerts can be sent in unique and dedicated ringtone and specific vibration on a
mobile phone.
6) No knowledge of mobile numbers required.
7) CB messages can be received even without SIM card.
8) Cell Broadcast messages can be sent only by an authorized and verified sources.
9) The load on the network is low as the messages are sent once from CBC to cells
where it is broadcast repeatedly.
3
A sample Public Warning System architecture is shown below in Fig 2.
4
Chapter 2 – Common Security Requirements
_____________________________________________________________________________________________________
Section 1: Access and Authorization
5
This means that authentication based on a parameter that can be spoofed is not
permitted. Exceptions are attributes that cannot be faked or spoofed by an attacker.
Minimum two of the above Authentication attributes shall be mandatorily combined for
protecting all the accounts from misuse. An exception to this requirement is machine
accounts where atleast one authentication attribute shall be supported.
Requirement:
Login to CBC as root or equivalent highest privileged user shall be limited to the system
console only. Root user will not be allowed to login to CBC remotely.
This remote root user access restriction is also applicable to application software’s / tools
such as TeamViewer, desktop sharing which provide remote access to the CBC.
Requirement:
The authorizations for accounts and applications shall be reduced to the minimum
required for the tasks they have to perform.
Authorizations to a system shall be restricted to a level in which a user can only access
data and use functions that he needs in the course of his/her work. Suitable
authorizations shall also be assigned for access to files that are components of the
operating system or of applications or that are generated by the same (e.g. configuration
and logging files).
Alongside access to data, execution of applications and components shall also take place
with rights that are as low as possible. Applications should not be executed with
administrator or system rights.
Requirement:
Users shall be identified unambiguously by the CBC.
CBC shall support assignment of individual accounts per user, where a user could be a
person, or, for Machine Accounts, an application, or a system.
CBC shall not enable the use of group accounts or group credentials, or sharing of the
same account between several users.
6
___________________________________________________________________________________________________
Section 2: Authentication Attribute Management
7
mandatorily supported by CBC. An exception to this requirement is machine accounts.
8
2.2.6 Password Changes
Requirement:
If a password is used as an authentication attribute, then the system shall offer a function
that enables a user to change his/her password at any time. When an external centralized
system for user authentication is used it is possible to implement this function on this
system.
Password change shall be enforced after initial login.
CBC shall enforce password change based on password management policy.
In particular, the system shall enforce password expiry. CBC shall support a configurable
period for expiry of passwords.
Previously used passwords shall not be allowed upto a certain number (Password
History).
The number of disallowed previously used passwords shall be:
Configurable;
Greater than 0;
And its minimum value shall be 3. This means that the CBC shall store at least the three
previously set passwords. The maximum number of passwords that the CBC can store for
each user is up to the manufacturer.
When a password is about to expire, a password expiry notification shall be provided to
the user.
Above requirements shall be applicable for all passwords used (e.g. application-level, OS-
level, etc.). An exception to this requirement is machine accounts.
If a central system is used for user authentication password policy, then additional
assurance shall be provided that the central system enforces the same password change
policies as laid down for the local system in this subclause.
And if a central system is not used for user authentication, the assurance on password
changes rules shall be performed on the CBC.
9
Normally, authentication attributes such as password or cryptographic keys will be
preconfigured from producer, OEM or developer of a system. Such authentication
attributes shall be changed by automatically forcing a user to change it on 1st time login
to the system or the OEM provides instructions on how to manually change it.
To this end, the CBC has a list of public keys or certificates of authorised software sources
and uses the keys to verify that the software update is originated from only these sources.
(a) CBC Software package integrity shall be validated in the installation /upgrade stage.
(b) CBC shall support software package integrity validation via cryptographic means, e.g.
digital signature, code signing certificate (valid and not time expired) and using the
secure cryptographic controls prescribed in Table1 of the latest document
“Cryptographic Controls For Indian Telecom Security Assurance Requirements (ITSAR)”
only. To this end, the CBC shall have a list of public keys or certificates of authorised
software sources and uses the keys to verify that the software update is originated from
only these sources.
(c) Tampered software shall not be executed or installed if integrity check fails.
(d) A security mechanism is required to guarantee that only authorized individuals can
initiate and deploy a software upgrade and modify the list mentioned in (b) above
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.2.3.3.5]
____________________________________________________________________________________________________
2.3.3 Source code security assurance
Requirement:
a) OEM shall follow the best security practices including secure coding for software
development. Source code shall be made available either at TSTL premises or at the
10
mutually agreed location for source code review by the designated TSTL. It may be
supported by furnishing the Software Test Document (STD).
(ii) CBC software shall be free from CWE top 25 and OWASP top10 security weaknesses
on the date of offer of product to the designated TTSL for testing. For other security
weaknesses, OEM shall give mitigation plan.
(iii) The binaries for CBC and upgrades/updates thereafter generated from the source
code are free from all known security vulnerabilities stated in bullet (ii) above.
Requirement:
Software components or parts of software packages which are not needed for operation
or functionality of the CBC shall not be present.
Orphaned software components /packages shall not be present in CBC.
OEM shall provide the list of software that are necessary for CBC’s operation.
In addition, OEM shall furnish an undertaking as
“CBC does not contain Software that is not used in the functionality of CBC”
Requirement:
CBC shall only run protocol handlers and services which are needed for its operation and
which do not have any known security vulnerabilities. By default, all other ports and
services will be permanently disabled. CBC shall not support following services
- FTP
- TFTP
- Telnet
- rlogin, RCP, RSH
11
- HTTP
- SNMPv1 and v2
- SSHv1
Requirement:
CBC shall boot only from memory devices intended for this purpose.
Requirement:
CBC shall provide reliable time and date information provided through NTP/PTP server.
CBC shall establish secure communication channel with the NTP/PTP server.
CBC shall establish secure communication channel strictly using the secure cryptographic
controls prescribed in Table1 of the latest document “Cryptographic Controls For Indian
Telecom Security Assurance Requirements (ITSAR) ”with NTP/PTP server.
CBC shall generate audit logs for all changes to time settings.
_____________________________________________________________________________________________________
2.3.9 Restricted reachability of services
Requirement:
The CBC shall restrict the reachability of services such that they can be reached only on
interfaces meant for the purpose. On interfaces where services are active, the reachability
should be limited to legitimate communication peers.
Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the
12
management plane for separation of management traffic from user traffic.
CBC shall not contain any wireless access mechanism which is unspecified or not
declared. An undertaking shall be given by the OEM as follows:
“The CBC does not contain any wireless, optical, magnetic or any other component that
may be used as a covert channel”.
13
Section 5: User Audit
____________________________________________________________________________________________________
2.5.1 Audit trail storage and protection
Requirement:
The security event log shall be access controlled (file access rights) such that only
privilege users including the administrator have access to read the log files. The only
Event Types
Event data to be
(Mandatory or Description
logged
optional)
Username
Source (IP address) if
Incorrect login attempts Records any user incorrect login remote access
(Mandatory) attempts to the CBC. Outcome of event
(Success or failure)
Timestamp
Username,
Timestamp,
Records any access attempts to Length of session
Administrator access
accounts that have system Outcome of event
(Mandatory)
privileges. (Success or failure)
Source (IP address) if
remote access
Administrator
username,
Records all account Administered account,
Account administration administration activity, i.e. Activity performed
(Mandatory) configure, delete, copy, enable, and (configure, delete,
disable. enable and disable)
Outcome of event
(Success or failure)
14
Timestamp
Value exceeded,
Value reached
Records events that have been (Here suitable threshold
triggered when system parameter values shall be defined
Resource Usage
values such as disk space, CPU load
depending on the
(Mandatory)
over a longer period have individual system.)
exceeded their defined thresholds.
Outcome of event
(Threshold Exceeded)
Timestamp
Change made
Timestamp
Configuration change Changes to configuration of the
(Mandatory) network device Outcome of event
(Success or failure)
Username
Action performed (boot,
This event records any action on reboot, shutdown, etc.)
the network device/CBC that Username (for
Reboot/shutdown/
forces a reboot or shutdown OR intentional actions)
Crash (Mandatory)
where the network device/CBC Outcome of event
has crashed. (Success or failure)
Timestamp
Interface name and type
Status (shutdown, down
Change to the status of interfaces
Interface status change missing link, etc.)
on the network device/CBC (e.g.
(Mandatory) Outcome of event
shutdown)
(Success or failure)
Timestamp
Administrator
username,
Administered account,
Change of group Activity performed
Any change of group membership
membership or accounts (group added or
for accounts
(Optional) removed)
Outcome of event
(Success or failure)
Timestamp.
Administrator username
Administered account
Resetting Passwords Resetting of user account
(Optional) passwords by the Administrator Activity performed
(configure, delete,
enable and disable)
15
Outcome of event
(Success or failure)
Timestamp
Service identity
Activity performed
Starting and Stopping of Services (start, stop, etc.)
Services (Optional)
(if applicable) Timestamp
Outcome of event
(Success or failure)
Timestamp
X.509 Certificate Unsuccessful attempt to validate a Reason for failure
Validation (Optional) certificate Subject identity
Type of event
User identity
Attempt to initiate manual update, Timestamp
Secure Update
initiation of update, completion of Outcome of event
(Optional)
update (Success or failure)
Activity performed
Old value of time
New value of time
Timestamp
origin of attempt to
Time change change time (e.g.IP
Change in time settings
(Mandatory) address)
Subject identity
Outcome of event
(Success or failure)
User identity
User identity (wherever
applicable)
Any attempts at unlocking of an
interactive session, termination of Timestamp
Session unlocking/ a remote session by the session Outcome of event
termination (Optional) locking mechanism, termination of (Success or failure)
an Subject identity
interactive session. Activity performed
Type of event
Trusted Communication Timestamp
paths with IT entities Initiation, Termination and Initiator identity (as
such as Authentication Failure of trusted Communication applicable)
Server, Audit Server, paths Target identity (as
NTP Server, etc. and for applicable)
16
authorised remote User identity (in case of
administrators Remote administrator
(Optional) access)
Type of event
Outcome of event
(Success or failure, as
applicable)
Timestamp
Type of event (audit data
deletion, audit data
modification)
Outcome of event
(Success or failure)
Audit data changes Changes to audit data including
(Optional) deletion of audit data Subject identity
User identity
origin of attempt to
change time (e.g.IP
address)
Details of data deleted or
modified
Any attempt to scan the network Date
interface shall lead to triggering of Time Stamp
Port Scan attempts
logging of the appropriate Source IP address
parameters Destination Port address
User identity
Origin of attempt (IP
All use of Identification and address)
User Login (Mandatory)
authentication mechanisms. Outcome of event
(Success or failure)
Timestamp
17
shall have sufficient memory (minimum 100 MB) allocated for this purpose. The OEM to
submit justification document for sufficiency of local storage requirement.
(e) Secure Log export shall comply the secure cryptographic controls prescribed in
Table1 of the latest document “Cryptographic Controls For Indian Telecom Security
Assurance Requirements (ITSAR)” only
OEM shall submit to TSTL, the list of the connected entities with CBC and the method of
secure communication with each entity with details of interface, protocol stack
implemented, configuration, detailed procedure of establishing the communication with
each entity and any other details required for verifying this requirement.
OEM shall also submit cryptographic module testing document and the detailed self / Lab
test report along with test results for scrutiny
CBC shall support the minimum security level of 2 as defined in FIPS 140-2.
18
Till further instructions, this clause will be considered ‘complied’ by submission of an
undertaking by the OEM in specified format along with self-certified test reports.
OEM shall submit cryptographic algorithm implementation testing document and the
detailed self / Lab test report along with test results for scrutiny.
19
2.6.6 Protection against Copy of Data
Requirement:
a) Without authentication, CBC shall not create a copy of data in use or data in transit.
b) Protective measures should exist against use of available system functions / software
residing in CBC to create copy of data for illegal transmission.
c) The software functions, components in the CBC for creation of data copy are to be
disabled or sufficiently secured to prevent illegal copy of data.
_____________________________________________________________________________________________________
2.6.7 Protection against Data Exfiltration - Overt Channel
Requirement:
a) CBC shall have mechanisms to prevent data exfiltration attacks for theft of data in use
and data in transit.
b) Establishment of outbound overt channels such as HTTPS, IM, P2P, Email etc. are to be
forbidden if they are auto-initiated by / auto-originated from the CBC.
Session logs shall be generated for establishment of any session initiated by either user
or CBC.
_____________________________________________________________________________________________________
2. 6.8 Protection against Data Exfiltration - Covert Channel
Requirement:
a) CBC shall have mechanisms to prevent data exfiltration attacks for theft of data in use
and data in transit.
b) Establishment of outbound covert channels and tunnels such as DNS Tunnel, HTTPS
Tunnel, ICMP Tunnel, TLS, SSL, SSH, IPSEC VPN, RTP Encapsulation etc. are to be
forbidden if they are auto-initiated by / auto-originated from the CBC.
c) Session logs shall be generated for establishment of any session initiated by either user
or CBC system.
_____________________________________________________________________________________________________
Section 7: Network Services
Requirement:
CBC shall support physical or logical separation of Operation & Management traffic and
control plane traffic. See RFC 3871 for further information.
Requirement:
CBC shall not process IP Packets if their source address is not reachable via the incoming
interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides this
function.
20
Section 8: Attack Prevention Mechanisms
_____________________________________________________________________________________________________
2.8.1 Network Level and application-level DDoS
Requirement:
CBC shall have protection mechanism against Network level and Application-level DDoS
attacks.
CBC shall provide security measures to deal with overload situations which may occur as
a result of a denial-of-service attack or during periods of increased traffic. In particular,
partial or complete impairment of system availability shall be avoided.
Potential protective measures include:
- Restricting of available RAM per application
- Restricting of maximum sessions for a Web application
- Defining the maximum size of a dataset
- Restricting CPU resources per process
- Prioritizing processes
- Limiting of amount or size of transactions of an user or from an IP address in a specific
time range
- Limiting of amount or size of transactions to an IP address/Port Address in a specific
time range
Requirement:
CBC shall act in a predictable way if an overload situation cannot be prevented. CBC shall
be built in this way that it can react on an overload situation in a controlled way.
However, it is possible that a situation happens where the security measures are no
longer sufficient. In such case it shall be ensured that CBC cannot reach an undefined and
thus potentially insecure, state. In an extreme case, CBC shall continue to work in
degraded mode with less traffic handling capacity but without loss of system security
functions.
Requirement:
IP packets with unnecessary options or extension headers shall not be processed. IP
options and extension headers (e.g. source routing) are only required in exceptional
cases. So, all packets with enabled IP options or extension headers shall be filtered.
21
Section 9: Vulnerability Testing Requirements
Requirement:
It shall be ensured that on all network interfaces of CBC, only documented ports on the
transport layer respond to requests from outside the system.
22
Type Type (IPv6) Description Send Respond to
(IPv4)
0 129 Echo Reply Optional (i.e.as N/A
automatic reply to
"Echo Request")
CBC shall not respond to, or process (i.e.do changes to configuration), under any
circumstances certain ICMP message types as marked in below table.
23
2.10.3 Authenticated Privilege Escalation only
Requirement:
CBC shall not support a privilege escalation method in interactive sessions (both CLI and
GUI) which allows a user to gain administrator/root privileges from another user account
without re-authentication.
Requirement:
Each system account in CBC shall have a unique identification with appropriate non-
repudiation controls.
2.10.5 OS Hardening
Requirement:
Appropriate OS hardening procedures including security measures required to ensure
the kernel miniaturization etc. shall be implemented in CBC.
Kernel based network functions not needed for the operation of the CBC shall be
deactivated.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.3.3.1.2]
24
2.10.8 External file system mount restrictions
Requirement:
If normal users are allowed to mount external file systems (attached locally or via the
network), OS-level restrictions shall be set properly in CBC in order to prevent privilege
escalation or extended access permissions due to the contents of the mounted file
systems.
OS-level restrictions shall apply to normal users against mount / use of removable media
devices (e.g USB drive, CD ROM etc.) for data transfer.
Requirement:
Scheduled tasks for carrying out the activities such as taking the backups, monitoring disk
space and system maintenance activities shall be executed by the privileged user such as
administrator only. Similarly, TTE CBC shall have feature to restrict Scripts / Batch-
processes / Macros usage among various users. It shall be possible to administratively
configure scheduled tasks usage i.e Cron-Job usage (permit / deny) among various users
like Normal users, privileged users.
Requirement:
CBC shall restrict software-based system restart options usage among various users. The
software reset / restart either through command or use of key-combinations like
CTRL+ALT+DEL is not available to normal users for prevention of unintended / malicious
trigger of system reset / restart.
_____________________________________________________________________________________________________
Section 11: Web Servers
____________________________________________________________________________________
This entire section of the security requirements is applicable if the CBC supports web
management interface.
25
2.11.1 HTTPS
Requirement:
The communication between Web client and Web server shall be protected strictly using
the Secure cryptographic controls prescribed in Table1 of the latest document
“Cryptographic Controls For Indian Telecom Security Assurance Requirements ( ITSAR ) ”
only.
- Access timestamp
- Source (IP address)
- Account (if known)
- Attempted login name (if the associated account does not exist)
26
2.11.5 No unused HTTPS methods
Requirement:
HTTPS methods that are not required for CBC operation shall be deactivated.
27
the web server process or to a user with system privileges.
Restrictive access rights shall be assigned to all files which are directly or indirectly reside
in the CBC web server's document directory.
In particular, the CBC web server shall not be able to access files which are not meant to
28
be delivered.
Requirement:
Once the CBC software image is legally updated/upgraded with New Software Image, it
should not be possible to roll back to a previous software image.
29
In case roll back is essential, it shall be done only by the administrator with appropriate
non-repudiation controls.
CBC shall support a well-established control mechanism for rolling back to previous
software image.
2.12.4 Software Integrity Check –Installation
Requirement:
CBC shall validate the software package integrity before the installation/upgrade stage
strictly using the Secure cryptographic controls prescribed in Table1 of the latest
document “Cryptographic Controls For Indian Telecom Security Assurance Requirements
(ITSAR)” only.
Tampered software shall not be executed or installed if integrity check fails.
Requirement:
The CBC shall verify the integrity of a software component by comparing the result of a
measurement of the component, typically a standard cryptographic hash generated
strictly using the Secure cryptographic controls prescribed in Table1 of the latest
document “Cryptographic Controls For Indian Telecom Security Assurance Requirements
(ITSAR)” to the expected reference value.
_____________________________________________________________________________________________________
2.12. 6 Unused Physical and Logical Interfaces Disabling
Requirement:
CBC shall support the mechanism to verify both the physical and logical interfaces exist
in the product.
Physical and logical accessible Interfaces (except console interface) which are not under
use shall be disabled so that they remain inactive even in the event of reboot.
_____________________________________________________________________________________________________
2.12.7 No Default Profile
Requirement:
Predefined or default user accounts in CBC shall be deleted or disabled.
No pre-defined user accounts other than Admin / Root user account would be available.
Requirement:
It shall not be possible to downgrade security algorithms/protocols supported by CBC to
those not listed in Table 1 of the latest document “Cryptographic Controls For Indian
Telecom Security Assurance Requirements (ITSAR) version 1.0.0”
_____________________________________________________________________________________________________
30
Chapter 3 Specific Security Requirements
3.1 The hardware over which CBC is running shall be free of known vulnerability at the
date of offer of product for testing to the designated TTSL.
3.2 CBC system shall be highly reliable, scalable and fully available without single point
of failure.
3.3 CBC shall support M2M message update to M2M devices using cell broadcast as
bearer.
3.4 CBE-CBSC interface shall be fully redundant and secured with IP Sec VPN. It shall be
possible for both CBE and CBC to mutually authenticate with each other through digital
certificates.
3.5 When the CBE-CBC link is idle beyond the configured time period, the connection shall
be terminated automatically and reinitiated when required.
3.6 The IP addresses of CBEs shall be whitelisted in CBC.
3.7 It shall be possible to prevent spam messages being transmitted.
3.8 CBC shall support an end-to-end testing to check the message delivery to the cell,
without actually broadcasting
3.9 CBC architecture shall support site level and geographic level redundancy. The data
replication between geo redundant sites shall by fully synchronized.
3.10 CBC shall support backup and restore procedures for full and incremental backups.
3.11 CBC shall support the auto cell discovery mechanism as aided by RAN
3.12 CBC-GIS interface shall be well defined and it should be possible to map geo-
coordinates with the corresponding cells seamlessly.
3.13 The databases used in CBC shall be fully secured.
3.14 CBC shall be protected by Firewall and IDS/IPS.
3.15 CBC shall meet the functional requirements that will aid in the implementation of
Public Warning System security (as and when specified and mandated).
31
Appendix
List of Submissions
1. Source Code Security Assurance (against test case 2.3.3)
2. Known Malware and backdoor Check (against test case 2.3.4)
3. Communication Matrix (against test case 2.3.6)
4. No unsupported components (against test case 2.4.2)
5. Avoidance of Unspecified Wireless Access (against test case 2.4.3)
6. Secure Log Export -Sufficiency of local storage (against test case 2.5.3 IV)
7. Cryptographic Based Secure Communication (against test case 2.6.1)
8. Cryptographic Module Security Assurance (against test case2.6.2)
9. Cryptographic Algorithms implementation Security Assurance (against test case
2.6.3)
10. Hardware - Absence of known vulnerability/security weakness (against test case
3.1.2)
-End of Document-
32