Nscib CC 0132539 ST
Nscib CC 0132539 ST
Nscib CC 0132539 ST
Security Target
LEGAL INFORMATION
1
Security Target ZTE RAN Solution
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular
purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages
resulting from the use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
Version Date Comment
0.1 Oct 23 2019 First version
0.2 Dec 16 2019 General revision
0.3 Jan 14 2020 General revision applying changes
0.4 Jan 22 2020 General revision applying changes
0.7 July 27 2020 Minor revision applying changes
0.9 August 6 2020 SPD and security objectives added.
0.10 August 10 2020 UME components changed
0.11 August 14 2020 Update UME components
0.12 August 17 2020 Fix SFR operations
0.13 August 19, 2020 Fix minor issues
0.14 August 21, 2020 Minor fixes and an application note added to
FTP_ITC.1/BBU-UE.
0.15 August 27, 2020 Change UME version and minor fix in SFR operations.
0.16 September 1, 2020 Accepted changes
0.17 September 29, 2020 Section 6.2 updated
0.18 October 10, 2020 FTA_MCS.1/BBU and TSS updated
0.19 October 22, 2020 FTA_MCS.1/BBU Basic limitation on multiple concurrent
sessions updated
0.20 December 17, 2020 Updated after evaluator’s feedback.
0.21 January 19, 2021 FAU_STG.4/BBU added to Security Functional
Requirements Rationale and the dependencies table.
0.22 February 4, 2021 Fixed versions of the acceptance procedure documents
[UG-BBU-ACP] and [UG-UME-ACP].
2
Contents
1 ST Introduction..................................................................................................... 6
1.1 ST reference ....................................................................................................... 6
1.2 TOE reference .................................................................................................... 6
1.3 TOE Overview and usage ................................................................................... 6
1.3.1 Major security features..................................................................................... 7
1.3.2 Non-TOE Hardware/Software/Firmware .......................................................... 8
1.4 TOE Description .................................................................................................. 8
1.4.1 Physical scope ................................................................................................. 8
1.4.2 Logical scope ................................................................................................. 10
7 Rationales ........................................................................................................... 37
7.1 Security Objectives Rationale ........................................................................... 37
7.2 Security Functional Requirements Rationale.................................................... 38
7.3 Dependencies ................................................................................................... 40
3
Security Target ZTE RAN Solution
5
Security Target ZTE RAN Solution
1 ST Introduction
1.1 ST reference
The TOE is a New Generation Radio Access Network (NG-RAN) system solution
for NR (new radio) network plus an UME. The solution interfaces with User
Equipment (UE) and implements such functions as radio resource management,
data stream IP header compression and encryption, attach progress selection,
user plane data routing, data scheduling and transmission, and mobility
management. The UME is used to manage the system via web interface.
The TOE consists of three parts; a baseband unit (BBU), a remote RF unit (RRU)
or an active antenna unit (AAU) and a unified management expert (UME):
BBU is the device processing the analog to digital conversion of the
signal;
RRU is the remote radio unit transceiver;
AAU incorporates a radio frequency processing module and antenna;
6
Security Target ZTE RAN Solution
The RAN which is equivalent to gNodeB has the following general functionalities:
Radio resource management: radio bearer control, radio admission control;
Access mobility management;
IP header compression and user data stream encapsulation;
Paging message scheduling and transmission;
Broadcast message scheduling and transmission;
7
Security Target ZTE RAN Solution
Secure management and usage of the TOE, to ensure that only properly
authorized staff can manage and/or use the TOE;
Provides secure interaction between various parts of the TOE and between
the TOE and various machines in the environment, so that user data
and/or management commands cannot be read or modified in between;
Provides logging and auditing of user actions.
8
Security Target ZTE RAN Solution
The TOE hardware parts are delivered by courier, while software parts are either
installed in the hardware or installed by ZTE engineers. The following documents
are delivered by the ZTE engineers to the customer during the TOE installation:
9
Security Target ZTE RAN Solution
Installation
ZXSDR R8998E S3700 TDD Multi-Path Remote Radio Unit Hardware
1.0 PDF
Installation
ZXSDR R8852E Macro Remote Radio Unit Hardware Installation 1.0 PDF
ZXSDR R8854E Macro Radio Remote Unit Hardware Installation 1.0 PDF
ZXSDR R8894E Macro Radio Remote Unit Hardware Installation 1.0 PDF
ZXSDR R8894E Macro Radio Remote Unit Hardware Installation 1.0 PDF
10
Security Target ZTE RAN Solution
2 Conformance Claims
11
Security Target ZTE RAN Solution
This section describes the assets, thread agents and threads to the TOE.
3.1 Assets
A.TSF_DATA TSF data stored and managed by the UME and the BBU
and that is used to enforce the security mechanism, such
as the stored user passwords, the user attributes, or the
encryption keys for the trusted channels. This data shall
only be modified by users with A.ADMIN_ACCESS
3.3 Threats
13
Security Target ZTE RAN Solution
3.4 Assumptions
14
Security Target ZTE RAN Solution
4 Security Objectives
The security objectives describe how the threats described in the previous section
will be addressed. It is divided into:
The Security Objectives for the TOE, describing what the TOE will do to
address the threats
The Security Objectives for the Operational Environment, describing
what other entities must do to address the threats
A rationale that the combination of all of these security objectives indeed
addresses the threats may be found in section 7.1 of this Security Target.
15
Security Target ZTE RAN Solution
16
Security Target ZTE RAN Solution
5 Security Requirements
5.2 Definitions
5.2.1 Subjects:
S.UME-user: the users with access to the UME and that are responsible
for the TOE management and that are connected through the IP
Management network;
S.BBU-user: the users with access to the BBU and that are responsible for
the BBU management and that are connected through the local network.
5.2.2 Operations
OP.lockUnlockUser: to unlock or lock a user. A locked user is not able to
log-in to the UME or BBU;
OP.lockUnlockRole: to lock or unlock a role. A locked role prevents users
that only have the locked role to operate the UME, excluding the following
functions:
o Change their password;
o Log out from UME;
o View UME version information;
o Set time zone and DST;
o Change view language.
OP.enableDisableUser: to enable or disable a user account. A disabled
user account cannot login to the UME or BBU;
OP.userManagement: to perform user management functions, which
include to add, remove users or modify user attributes from UME and
BBU;
OP.logReview: to review the logs generated by the UME;
OP.RuleManagement: to perform security rule management functions,
which include managements functions include add, remove or modify
security rule;
OP.idleTimeout: to set the amount of time that a user can remain idle
before it is logged out from the UME or BBU.
5.2.3 Objects
O.user: this object includes all information of the user account. The
specific fields can be seen in the following section as these are considered
security attributes;
O.role: this object includes all information of the role object. The specific
fields can be seen in the following section as these are considered security
attributes;
17
Security Target ZTE RAN Solution
O.rule: this object includes all information of the security rule. The specific
fields can be seen in the following section as these are considered security
attributes;
O.setting: this object includes all information of the security common
settings. The specific fields can be seen in the following section as these
are considered security attributes.
18
Security Target ZTE RAN Solution
The AAU/RRU and the BBU are connected through an optical fiber and
communicate through the standard CPRI protocol. The following figure shows the
CPRI packet format:
The following notational conventions are used in the requirements. Operations are
indicated in bold, except refinements, which are indicated in bold italic. In general
19
Security Target ZTE RAN Solution
refinements were applied to clarify requirements and/or make them more readable.
Iterations were indicated by adding three letters to the component name.
The security functional requirements are for UME and BBU. Since AAU/RRU that
only enhances 3D beam forming for cubic coverage does not contain the security
function, this section does not describe the security function requirements of AAU
and RRU.
1
If the username is chang, “gnahc” is not allowed
20
Security Target ZTE RAN Solution
FTA_MCS.1.1 The TSF shall restrict the maximum number of concurrent sessions
that belong to the same S.UME-user.
FTA_MCS.1.2 The TSF shall enforce, by default, a limit of 1 session per S.UME-
user.
FAU_GEN.1.1 The UME shall be able to generate an audit record of the following
auditable events:
a) Start-up and shutdown of the audit functions;
b) All auditable events for the not specified level of audit; and
c) The following auditable events:
S.UME-user authentication (security log);
OP.lockUnlockUser (security log);
OP.enableDisableUser (operation log);
OP.userManagement (operation log);
OP.ruleManagement (operation log);
OP.idleTimeout (operation log).
FAU_GEN.1.2 The TSF shall record within each audit record at least the following
information:
a) Date and time of the event, type of event, subject identity (if applicable),
and the outcome (success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST, none.
Application note: Start-up and shutdown of the audit functions is not explicitly
logged, however the logging functionality is enabled at start-up and cannot be
disabled.
FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the
user to interpret the information.
21
Security Target ZTE RAN Solution
FAU_STG.1.1 The TSF shall protect the stored audit records in the audit trail from
unauthorised deletion.
FAU_STG.4.1 The TSF shall overwrite the oldest stored audit records2 if the
audit trail is full.
FTP_TRP.1.1 The TSF shall provide a communication path between itself and
S.UME-user that is logically distinct from other communication paths and provides
assured identification of its end points and protection of the communicated data
from modification and disclosure.
FTP_TRP.1.2 The TSF shall permit S.UME-user to initiate communication via the
trusted path.
FTP_TRP.1.3 The TSF shall require the use of the trusted path for initial user
authentication and all UME management functions defined in
FMT_SMF.1/UME.
FIA_ATD.1.1 The TSF shall maintain the following list of security attributes
belonging to individual S.UME-user:
User.username;
User.password;
User.passwordHistory;
User.rolesList;
User.rule;
User.isLocked;
User.isEnable;
2
The operation was completed to “take no other actions”, and this was subsequently refined away
to make the sentence more readable.
22
Security Target ZTE RAN Solution
o Supervisor
FDP_ACC.2.1 The TSF shall enforce the Role-based Access Control Policy on
Subjects:
o S.UME-user
Objects:
o O.user;
23
Security Target ZTE RAN Solution
o O.role;
o O.rule;
o O.setting.
and all operations among subjects and objects covered by the SFP.
FDP_ACC.2.2 The TSF shall ensure that all operations between any subject
controlled by the TSF and any object controlled by the TSF are covered by an
access control SFP
FDP_ACF.1.1 The TSF shall enforce the Role-based Access Control Policy to
objects based on the following:
Subjects:
o S.UME-user, with security attributes:
User.rolesList;
User.rule;
User.isLocked;
User.isEnable;
Objects:
o O.user;
o O.role.
o O.rule;
o O.setting.
FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on
the following additional rules:
S.UME-user is locked (User.isLocked is True);
S.UME-user is not enabled (User.isEnable is False);
S.UME-user has no role assigned (User.rolesList is empty);
S.UME-user password has expired (current time >=
User.rule.passwordExpirationDate);
S.UME-user source IP is not allowed (not included in
User.rule.allowedIPs);
S.UME-user session has been terminated due to:
o Inactivity (Setting.idleTimeout);
o His role is being edited by a security administrator
(User.rolesList).
The operation is performed outside the allowed time schedule of
S.UME-user (User.rule.allowedWorkSchedule);
Role.type security administrator is locked.
24
Security Target ZTE RAN Solution
FMT_MSA.1.1 The TSF shall enforce the UME Access Control Policy to restrict
the ability to change_default and modify, delete the security attributes:
Rule.passwordExpirationDate
Rule.passwordHistoryNumber
Rule.allowedIPs
Rule.allowedWorkSchedule
Rule.authenticationAttempts
Rule.lockedPeriod
Setting.idleTimeout
User.username
User.password
User.passwordHistory
User.rolesList
User.rule
User.isLocked
User.isEnable
Role.type
Role.islocked
to Security Administrator.
FMT_MSA.3.1 The TSF shall enforce the UME Access Control Policy to provide
restrictive default values for security attributes that are used to enforce the SFP.
25
Security Target ZTE RAN Solution
The range of the password minimum length is 6~20, and the default
recommended value is 12. including four types: number, upper case
letter, lower case letter, other characters;
The new password cannot be the same as one of the last
(Rule.passwordHistoryNumber) passwords set in
User.passwordHistory.
FTA_MCS.1.2 The TSF shall enforce, by default, a limit of 5 sessions per user.
FAU_GEN.1.1 The BBU shall be able to generate an audit record of the following
auditable events:
a) Start-up and shutdown of the audit functions;
b) All auditable events for the not specified level of audit; and
c) The following auditable events:
S.BBU-user authentication (security log);
OP.lockUnlockUser (security log);
OP.userManagement (operation log);
OP.idleTimeout (operation log).
FAU_GEN.1.2 The TSF shall record within each audit record at least the following
information:
a) Date and time of the event, type of event, subject identity (if applicable),
and the outcome (success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST, none.
26
Security Target ZTE RAN Solution
Application note: Start-up and shutdown of the audit functions is not explicitly
logged, however the logging functionality is enabled at start-up and cannot be
disabled.
FAU_STG.1.1 The TSF shall protect the stored audit records in the audit trail from
unauthorised deletion.
FAU_STG.4.1 The TSF shall overwrite the oldest stored audit records3 if the
audit trail is full.
FTP_ITC.1.1 The BBU shall provide a communication channel between itself and
SEG that is logically distinct from other communication channels and provides
assured identification of its end points and protection of the channel data from
modification or disclosure.
FTP_ITC.1.2 The BBU shall permit the BBU and the SEG to initiate
communication via the trusted channel.
FTP_ITC.1.3 The BBU shall initiate communication via the trusted channel for
transmission of user data.
FTP_ITC.1.1 The BBU shall provide a communication channel between itself and
another BBU that is logically distinct from other communication channels and
provides assured identification of its end points and protection of the channel data
from modification or disclosure.
FTP_ITC.1.2 The BBU shall permit the BBU and the other BBU to initiate
communication via the trusted channel.
FTP_ITC.1.3 The BBU shall initiate communication via the trusted channel for
transmission of user data.
FTP_ITC.1.1 The TSF shall provide a communication channel between itself and
UE that is logically distinct from other communication channels and provides
3
The operation was completed to “take no other actions”, and this was subsequently refined away
to make the sentence more readable.
27
Security Target ZTE RAN Solution
assured identification of its end points and protection of the channel data from
modification or disclosure.
FTP_ITC.1.2 The TSF shall permit the TSF and the UE to initiate communication
via the trusted channel.
FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for
transmission of user data.
Application note: This SFR is enforced by default by the BBU. However, the 3GPP
specification [TS33-501] requires that the BBU allows non-encrypted connections
from the UE.
FIA_ATD.1.1 The TSF shall maintain the following list of security attributes
belonging to individual S.BBU-user:
User.username;
User.password;
User.rolesList;
User.isLocked;
User.isEnable;
User.passwordHistory;
User.rule.allowedIPs;
User.rule.passwordHistoryNumber;
User.rule.authenticationAttempts;
User.Rule.lockedPeriod;
28
Security Target ZTE RAN Solution
FDP_ACC.2.1 The TSF shall enforce the BBU Access Control Policy on:
Subjects:
S.BBU.
Objects:
O.user;
O.role;
O.rule;
O.Setting.
and all operations among subjects and objects covered by the SFP.
FDP_ACC.2.2 The TSF shall ensure that all operations between any subject
controlled by the TSF and any object controlled by the TSF are covered by an
access control SFP.
FDP_ACF.1.1 The TSF shall enforce the Role-based Access Control Policy to
objects based on the following:
Subjects:
o S.BBU-user, with security attributes:
User.rolesList;
User.isLocked;
User.isEnable;
User.rule.passwordExpirationDate;
Role.type;
Objects:
o O.user;
o O.role.
29
Security Target ZTE RAN Solution
FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on
the following additional rules:
S.BBU-user is locked (User.isLocked is True);
S.BBU-user is not enabled (User.isEnable is False)
S.BBU-user has no role assigned (User.rolesList is empty);
S.BBU-user session has been terminated due to inactivity
(Setting.idleTimeout);
S.BBU-user source IP is not allowed (not included in
User.rule.allowedIPs);
S.BBU-user password has expired (current time >=
User.rule.passwordExpirationDate);
Role.type Administrator is locked.
FMT_MSA.1.1 The TSF shall enforce the BBU Access Control Policy to restrict
the ability to change_default and modify the security attributes:
Rule.passwordExpirationDate
Rule.passwordHistoryNumber
Rule.allowedIPs
Rule.authenticationAttempts
Rule.lockedPeriod
Setting.idleTimeout
User.username
User.password
User.rolesList
User.rule
User.isLocked
User.isEnable
Role.type
Role.islocked
to Administrator.
FMT_MSA.3.1 The TSF shall enforce the BBU Access Control Policy to provide
permissive default values for security attributes that are used to enforce the SFP.
FMT_MSA.3.2 The TSF shall allow the Administrator to specify alternative initial
values to override the default values when an object or information is created.
30
Security Target ZTE RAN Solution
The assurance requirements are EAL3+ ALC_FLR.2 and have been summarized
in the following table:
Assurance Components
Assurance Class
Identifier Name
31
Security Target ZTE RAN Solution
32
Security Target ZTE RAN Solution
This chapter describes how the TOE implements the security functional
requirements defined in chapter 5. The description covers both UME and BBU
SFRs unless explicitly stated.
The TOE users are required to identify and authenticate themselves before they
can perform any action using the TOE. User authentication is based on the
username and password provided by the users and has a limited number of
attempts before the user account is locked. Users can be unlocked by the security
administrator in the UME and by the administrator in the BBU. Users can also wait
to be automatically unlocked after a period of time that is configurable by the
security administrator in the UME and by the administrator in the BBU.
The TOE maintains user information in order to enforce authentication and access
control. The following information is maintained for each user:
User name and password;
Password history;
List of user roles;
User rules, including expiration date, the length of password history, allowed IPs,
allowed authentication time, number of authentication attempts and locked
period;
Locked and enabled status indicators.
User concurrent sessions are limited to a maximum 1 for each user in the UME,
and 5 for each user of the BBU by default (with 20 as maximum configurable
value). Furthermore, the sessions are automatically terminated after period of
inactivity that is configurable by the security administrator in the UME and by the
administrator in the BBU. A user session is also automatically terminated in the
UME when the security administrator is editing the user roles.
User authentication can be restricted based on the user’s source IP. The
administrator can set an allowed IP (or set of IPs) so the user can only be
successfully authenticated by connecting from the allowed IP. The UME security
administrator can also restrict the time when a user can be authenticated in the
UME by setting an allowed time period on the UME configuration.
User passwords have to meet certain rules to ensure that the passwords cannot be
easily guessed or broken by brute force:
(Only in the UME)At least 8 characters including four types: number, upper
case letter, lower case letter, other characters;
(Only in the BBU )The range of the password minimum length is 6~20, and
the default recommended value is 12. including four types: number, upper
case letter, lower case letter, other characters;
33
Security Target ZTE RAN Solution
(Only in the UME) Cannot be the same as the username, the username in
reverse or a common password dictionary word;
The new password cannot be the same as one of the last
(Rule.passwordHistoryNumber) passwords set in User.passwordHistory.
Passwords that do not meet these rules are rejected by the TOE.
The TOE enforces access control on users based on user roles. Each user role
has an allowed set of allowed actions (including various management actions). A
user can have more than one role, so the user access is the combination of all his
roles.
The following table identify the allowed action for each role in the UME:
The following table identify the allowed action for each role/group in the BBU:
34
Security Target ZTE RAN Solution
Access control also verifies that user information is correct, such as that the user is
enabled and not locked, user is not idle, user’s IP is allowed, user's password is
not expired and user’s role is not locked. The access control on the UME also
checks the user's allowed time interval and if the user’s role is being edited by the
security administrator.
6.3 Audit
The log records include date and time of event, subject identity (if applicable), and
the outcome (success or failure) of the event.
The TOE provides the capability to review the logs to the security administrator of
the UME.
The audit store is protected against manipulation. Log records cannot be edited
and can only be deleted by the administrator of the UME and by the administrator
of the BBU if the records are 30 days old or older.
The log records overwrite themselves when the log trail is full in the UME.
Nonetheless, the records can be automatically sent to a remote server set on the
UME’s management network.
The TOE provides secure interaction between its various parts and between itself
and various machines in the environment, so that user data and/or management
commands cannot be read or modified in between.
Communication between the UME and the UME Client is protected by HTTPS.
35
Security Target ZTE RAN Solution
The connection between the BBU and another BBU is protected by IPSEC.
36
Security Target ZTE RAN Solution
7 Rationales
Assumptions/Threats Objectives
37
Security Target ZTE RAN Solution
38
Security Target ZTE RAN Solution
39
Security Target ZTE RAN Solution
7.3 Dependencies
40
Security Target ZTE RAN Solution
FMT_SMR.1 FMT_SMR.1/BBU
FMT_SMF.1 FMT_SMF.1/BBU
FMT_MSA.3/BBU FMT_MSA.1 FMT_MSA.1/BBU
FMT_SMR.1 FMT_SMR.1/BBU
FPT_STM.1 cannot be implemented by the TOE because it does not have the capability to
generate reliable time stamps, therefore the time information is provided by a NTP server in the
TOE network (OE.TIME).
41
Security Target ZTE RAN Solution
A Abbreviations
AC Alternating Current
BBU baseband unit
BPL Baseband Processing module
CC Control and Clock module
DC Direct Current
EMS Element Management System
EPS Evolved Packet System
eNode B Evolved Node B
UME Unified Management Expert
gNode B generation Node B
NG-RAN NewGeneration -Radio Access Network
FA Fan Array Module
IP Internet Protocol
IPSEC Internet Protocol Secure
NR New Generation
LED Light Emitting Diode
LTE Long Term Evolution
L3 Layer 3
MME Mobility Management Entity
MAC Media Access Control
NAS Non-Access Stratum
NTP Network Time Protocol
PDCP Packet Data Convergence Protocol
PHY Physical Layer
PM Power Module
RF Radio Frequency
RLC Radio Link Control
RRU Remote Radio Unit
SA Site alarm Board
SE Site alarm Extension Board
S-GW Serving Gateway
AMF Access and Mobility Management Function
UPF User Port Function
SEG Security gateway
UE User Equipment
UMTS Universal Mobile Telecommunications System
42
Security Target ZTE RAN Solution
B References
43