CSCF Security User Guide
Call Session Control Function

Contents

1Introduction
1.1Prerequisites
1.2Environment

2

Product Security Functionality
2.1Authentication
2.2Authorization
2.3Accountability
2.4Integrity
2.5Confidentiality

3

Security Configuration
3.1Procedures
3.2Recommended Periodic Operations
3.3Handling of Patches

4

Default Parameter Values

5

Services, Ports, and Protocols
5.1Listening Services
5.2External Traffic Port Numbers
5.3Operation and Maintenance Port Numbers
5.4Diameter Port Numbers
5.5SIP IP Flows
5.6DNS IP Flows
5.7Diameter IP Flows
5.8IP Flow through DUA-DB LDAP

6

Privacy
6.1Notice
6.2Consent
6.3Handling of Personal Subscriber Data
6.4Classification of Personal Subscriber Data

1   Introduction

This document describes the security functions implemented by the Call Session Control Function (CSCF). It also describes the security-related procedures that can be performed by the system administrators.

The CSCF is an essential module in IP Multimedia Subsystem (IMS) for processing signaling data, using Session Initiation Protocol (SIP) and Diameter as signaling protocols. It supports Internet Protocols on a scalable and high-performance platform. The CSCF can be deployed as a virtual network element in an IMS network. For details about the CSCF, the supported functionality, and the nodes it communicates with, refer to CSCF Technical Description.

1.1   Prerequisites

This section describes the prerequisites; conditions and information required for performing security management on the CSCF.

1.1.1   Conditions

Before performing the procedures in Section 3.1 Procedures, ensure that the following conditions are met:

1.2   Environment

This section describes the environment requirements for product operations.

The CSCF belongs to the IP Multimedia Core Network (IMCN) and it is indirectly connected to the access network by the Session Border Gateway (SBG) which offers firewall capabilities and provides protection from external attacks.

The CSCF is placed in the Service & Control Virtual Private Network (VPN) group which includes Network Functions handling signaling traffic without direct connection to external networks.

The following VPNs exist in the group:

For more details, refer to CSCF VNF Network Connectivity Overview.

2   Product Security Functionality

The following security functionality is supported in the product:

2.1   Authentication

2.1.1   Subscriber Authentication

The CSCF supports the following authentication procedures:

2.1.2   O&M User Authentication

The CSCF supports O&M password-based user authentication. For more information, refer to User Management.

2.1.3   Mutual Authentication of Communication Channel Peers

The CSCF supports certificate-based mutual authentication for the following:

2.2   Authorization

The CSCF supports O&M User Authorization.

Authorization is the capability to validate if the logged in user is allowed to perform a certain operation to a certain Managed Object (MO). The authorization is role-based, that is, the logged in user is mapped to a role and each role has one or several rules defining the access right to an MO.

For a description of the user management principles, user administration, and user roles, refer to User Management.

2.3   Accountability

The audit log enables logging and tracking access to files, directories, and resources of the system, as well as tracing system calls. It enables monitoring of the system for application misbehavior or code malfunctions.

For more information, refer to Audit Information.

2.4   Integrity

2.4.1   Node Integrity

The CSCF supports node integrity in the following ways:

2.4.2   Communication Integrity

The CSCF supports communication integrity in the following ways:

2.5   Confidentiality

The CSCF supports communication confidentiality in the following ways:

3   Security Configuration

3.1   Procedures

This section provides the instructions for operating the security functionality of the product.

3.1.1   Hardening

Perform hardening of the CSCF node according to the procedures, refer to CSCF Hardening Guideline, including the following steps:

The operator can have own security policies, where the node must be hardened according to operator requirements, for example defining specific secure protocols or other ports different than the default ones.

After the hardening activities have been performed, create a backup of the system. It is also recommended to upload the backup to external storage.

3.1.2   Authentication and User Management

For instructions on how to create users and user groups, and assign privileges to a group, refer to User Management. Always use personal accounts instead of shared or generic user accounts.

The CSCF has the following predefined default roles. The roles, and the corresponding rules, cannot be modified:

LDAP must be configured with the strongest possible ciphers.

For details on LDAP Authentication, Local Authorization, Roles, and Rules, refer to User Management.

3.1.3   Audit Trails

The audit log enables logging and tracking access to files, directories, and resources of the system, as well as tracing system calls. It enables monitoring of the system for application misbehavior or code malfunctions.

For information about where to find the audit and syslog log files, and how to read them, refer to Audit Information.

3.1.4   Change Logon Banner

By default, no information is provided to the user when logging on using the CLI. The operator can define own customized greeting message or legal message when a user logs on through the CLI.

The system provides the file /cluster/etc/motd, which allows a text message to be created and later displayed when user logs on to the system through CLI.

3.1.5   IPsec Support

If there are requirements to protect Signaling traffic, for example SIP or Diameter (when transferring charging or malicious call tracing data) IPsec tunnels can be used.

For a description of the procedures for setting up IPsec tunnels to protect signaling traffic, refer to eVIP Management Guide.

3.2   Recommended Periodic Operations

The product must be properly hardened before it is taken into use. Nevertheless, it is important that the daily operations on the product are performed in such a way that the security status of the product is not weakened.

New vulnerabilities that must be mitigated are frequently found in the existing products. Therefore it is necessary to maintain the security posture of the product in service on a regular, ongoing basis.

The recommended periodic security-related operations are the following:

3.3   Handling of Patches

Patches are delivered in the form of EPs. The process to load EPs is described in the upgrade instruction for the actual CSCF EP.

4   Default Parameter Values

No parameters are set with default values.

5   Services, Ports, and Protocols

This section provides information about network services in the system that are available from External Networks.

5.1   Listening Services

The listening services are shown in Table 1.

Table 1    Listening Services Ports and Protocols Used by the CSCF

Port

Protocol

Description

Listening Only on the Internal Network

22

TCP

Secure Shell (SSH/Secure File Transfer Protocol (SFTP))

No, configurable

67

UDP

Dynamic host configuration service (DHCP)

Yes

69

UDP

File transfer service (TFTP)

Yes

111

TCP/UDP

Portmap service (portmap)

No. The service is listening on the External Network, but it is serving only on the internal network.

123

UDP

Time synchronization service (NTP)

No

514

UDP

Log service (syslog)

Yes

1022

TCP

SSH/SFTP (only for LDEwS)

Yes

1128

TCP

Alarm service

Yes

1129–1131

TCP/UDP

Node service

Yes

2049

TCP/UDP

Network File System (NFS)

No. The service is listening on the External Network, but it is serving only on the internal network.

7788

TCP

Disk replication service (DRBD)

Yes

The standard SSH server is started up by Linux® Distribution Extensions (LDE) with a default configuration, listening on default port 22 on all networks. Also on Linux Distribution Extensions with SUSE™ Linux Enterprise Server (LDEwS), a second SSH server is listening on port 1022 on the internal network.

5.2   External Traffic Port Numbers

The ports listed in Table 2 need to be available for external SIP and DNS traffic through the External Network Traffic VIP interfaces. The Access List, as part of the firewall policy in the VIP Gateway Router, is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. These ports are used for If1, ISC, Ma, Mw, Mg/Mj, Mr, and Ml interfaces. Other VIP Gateway Routers belonging to Operation and Maintenance (O&M), Charging, and Signaling Networks must block the access to the listed external ports in Table 2.

Table 2    External Access Ports and Protocols Used by the CSCF

Port Number

Protocol

Server Side

Use (Comment)

53

TCP

DNS server

DNS

53

UDP

DNS server

DNS

5060

TCP

CSCF

For SIP used by I-, S-, or E-CSCF, or EATF, or BCF, other port numbers can be used.

5060

UDP

CSCF

For SIP used by I-, S-, or E-CSCF, or EATF, or BCF, other port numbers can be used.

5.3   Operation and Maintenance Port Numbers

The ports listed in Table 3 need to be available through O&M VIP Interface. The Access List, as part of the firewall policy in the O&M VIP Gateway Router, is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. All the VIP Gateway Routers belonging to Charging and HSS/SLF must block the access to the listed external ports in Table 3.

Table 3    Standard O&M Ports and Protocols Used by the CSCF

Port Number

Protocol

Server Side

Use (Comment)

161

UDP

CSCF O&M

SNMP requests to Platform (Fault Management).

162

UDP

OSS

SNMP traps (messages) from Platform to SNMP Manager. Port number is configurable in Platform.

830

TCP

CSCF O&M

NETCONF

2022

TCP

CSCF O&M

Ericsson Command-Line Interface (ECLI) over SSH

2028

TCP

CSCF O&M

SFTP over SSH

6513

TCP

CSCF O&M

NETCONF over TLS

5.4   Diameter Port Numbers

The ports listed in Table 4 need to be available through the Charging or Signaling Diameter VIP interface. The Access List, as part of the firewall policy, in the Charging or Signaling Diameter VIP Gateway Router is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. These ports are used for Charging or Signaling Diameter networks. All the VIP Gateway Routers belonging to Traffic and O&M Networks must block the access to the listed external ports in Table 4.

Table 4    Standard Diameter Ports and Protocols Used by the CSCF

Port Number

Protocol

Server Side

Use (Comment)

3868

TCP or SCTP

CSCF Diameter

Default Diameter port

3869(1)

TCP or SCTP

CSCF Diameter

Additional Diameter port

3870 (1)

TCP or SCTP

CSCF Diameter

Additional Diameter port

3871 (1)

TCP or SCTP

CSCF Diameter

Additional Diameter port

3872 (1)

TCP or SCTP

CSCF Diameter

Additional Diameter port

(1)  Port numbers 8700–8732 could also be used


5.5   SIP IP Flows

SIP IP flows are described in Section 5.5.1 Ma Interface, Section 5.5.2 Mw Interface, Section 5.5.3 Mg/Mj Interface, Section 5.5.4 Mr Interface, Section 5.5.5 ISC Interface, Section 5.5.6 I4 Interface, and Section 5.5.7 I5 Interface.

The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.

Note:  
The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.

5.5.1   Ma Interface

The flows that must be available on the Ma interface are shown in Table 5.

Table 5    Ma Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

AS to CSCF (SIP)

IP address range or ranges allocated to AS.

Allocated ports to the AS

I-CSCF VIP

I-CSCF port

UDP and TCP

CSCF to AS (SIP)

I-CSCF VIP

I-CSCF port

IP address range or ranges allocated to AS.

Any

UDP and TCP

5.5.2   Mw Interface

The flows that must be available on the Mw interface are shown in Table 6.

Table 6    Mw Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

I-CSCF to S-CSCF (SIP)

IP address range or ranges allocated to I-CSCF.

I-CSCF Mw port

S-CSCF VIP

S-CSCF Mw port

UDP and TCP

BCF to S-CSCF (SIP)

IP address range or ranges allocated to BCF.

BCF Mw port

S-CSCF VIP

S-CSCF Mw port

UDP and TCP

I-CSCF to P-CSCF (SIP)

I-CSCF VIP

I-CSCF Mw port

IP address range or ranges allocated to P-CSCF.

Any

UDP and TCP

S-CSCF to P-CSCF (SIP)

S-CSCF VIP

S-CSCF Mw port

IP address range or ranges allocated to P-CSCF.

Any

UDP and TCP

S-CSCF to P-CSCF (SIP)

S-CSCF VIP

S-CSCF Mw port

IP address range or ranges allocated to S-CSCF.

Any

UDP and TCP

S-CSCF to BCF (SIP)

S-CSCF VIP

S-CSCF Mw port

IP address range or ranges allocated to BCF.

Any

UDP and TCP

E-CSCF to P-CSCF (SIP)

E-CSCF VIP

E-CSCF Mw port

IP address range or ranges allocated to P-CSCF.

Any

UDP and TCP

5.5.3   Mg/Mj Interface

The flows that must be available on the Mg/Mj interface are shown in Table 7.

Table 7    Mg/Mj Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

MGC to I-CSCF (SIP)

IP address range or ranges allocated to MGC.

MGC Mj port

I-CSCF VIP

I-CSCF Mg/Mj port

UDP and TCP

MGC to S-CSCF (SIP)

IP address range or ranges allocated to MGC.

MGC Mj port

S-CSCF VIP

S-CSCF Mg/Mj port

UDP and TCP

MGC to E-CSCF (SIP)

IP address range or ranges allocated to MGC.

MGC Mj port

E-CSCF VIP

E-CSCF Mg/Mj port

UDP and TCP

MGC to BCF (SIP)

IP address range or ranges allocated to MGC.

MGC Mj port

BCF/I-CSCF VIP

BCF/I-CSCF Mg/Mj port

UDP and TCP

I-CSCF to MGC (SIP)

I-CSCF VIP

I-CSCF Mj port

IP address range or ranges allocated to MGC.

Any

UDP and TCP

S-CSCF to MGC (SIP)

S-CSCF VIP

S-CSCF Mj port

IP address range or ranges allocated to MGC.

Any

UDP and TCP

E-CSCF to MGC (SIP)

E-CSCF VIP

E-CSCF Mj port

IP address range or ranges allocated to MGC.

Any

UDP and TCP

5.5.4   Mr Interface

The flows that must be available on the Mr interface are shown in Table 8.

Table 8    Mr Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

MRF to I-CSCF (SIP)

IP address range or ranges allocated to MRF.

MRF Mr port

I-CSCF VIP

I-CSCF Mr port

UDP and TCP

MRF to S-CSCF (SIP)

IP address range or ranges allocated to MRF.

MRF Mr port

S-CSCF VIP

S-CSCF Mr port

UDP and TCP

I-CSCF to MRF (SIP)

I-CSCF VIP

I-CSCF Mr port

IP address range or ranges allocated to MRF.

Any

UDP and TCP

S-CSCF to MRF (SIP)

S-CSCF VIP

S-CSCF Mr port

IP address range or ranges allocated to MRF.

Any

UDP and TCP

5.5.5   ISC Interface

The flows that must be available on the ISC interface are shown in Table 9.

Table 9    ISC Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

AS to CSCF (SIP)

IP address range or ranges allocated to AS.

AS ISC port

S-CSCF VIP

S-CSCF ISC port

UDP and TCP

CSCF to AS (SIP)

S-CSCF VIP

S-CSCF ISC port

IP address range or ranges allocated to AS.

Any

UDP and TCP

5.5.6   I4 Interface

The flows that must be available on the I5 interface are shown in Table 10.

Table 10    I4 Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

E-CSCF to EATF

E-CSCF IP Address

E-CSCF I4 port

EATF VIP

EATF Port number

SIP

EATF to E-CSCF

EATF VIP

EATF I4 port

E-CSCF IP address

E-CSCF Port number

SIP

5.5.7   I5 Interface

The flows that must be available on the I5 interface are shown in Table 11.

Table 11    I5 Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

I-CSCF to EATF

I-CSCF IP Address

I-CSCF I5 port

EATF VIP

EATF Port number

SIP

EATF to I-CSCF

EATF VIP

EATF I5 port

I-CSCF IP address

I-CSCF Port number

SIP

5.6   DNS IP Flows

DNS IP flows are described in Section 5.6.1 If1 Interface.

The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.

Note:  
The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.

5.6.1   If1 Interface

The flows that must be available on the If1 interface are shown in Table 12.

Table 12    If1 Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

I-CSCF to DNS

I-CSCF VIP

I-CSCF If1 port

IP address range or ranges allocated to DNS.

Any

UDP/TCP

S-CSCF to DNS

S-CSCF VIP

S-CSCF If1 port

IP address range or ranges allocated to DNS.

Any

UDP/TCP

E-CSCF to DNS

E-CSCF VIP

E-CSCF If1 port

IP address range or ranges allocated to DNS.

Any

UDP/TCP

EATF to DNS

EATF VIP

EATF If1 port

IP address range or ranges allocated to DNS.

Any

UDP/TCP

BCF to DNS

BCF VIP

BCF If1 port

IP address range or ranges allocated to DNS.

Any

UDP/TCP

5.7   Diameter IP Flows

Diameter IP flows are described in Section 5.7.1 Cx and Dx Interfaces, Section 5.7.2 Rf Interface, Section 5.7.3 Ro Interface, Section 5.7.4 Ml Interface, Section 5.7.5 Sh and Dh Interface, and Section 5.5.1 Ma Interface.

The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.

Note:  
The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.

5.7.1   Cx and Dx Interfaces

The flows that must be available on the Cx and Dx interfaces are shown in Table 13.

Table 13    Cx and Dx Interfaces

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

Cx

HSS to I-CSCF (Diameter)

IP address range or ranges allocated to HSS.

HSS Cx stack port

I-CSCF CSCFCX stack VIP

I-CSCF CSCFCX stack port

TCP or SCTP or both

HSS to S-CSCF (Diameter)

IP address range or ranges allocated to HSS.

HSS Cx stack port

S-CSCF VIP

S-CSCF CSCFCX stack port

TCP or SCTP or both

HSS to BCF (Diameter)

IP address range or ranges allocated to HSS.

HSS Cx stack port

BCF VIP

BCF CSCFCX stack port

TCP or SCTP or both

I-CSCF to HSS (Diameter)

I-CSCF CSCFCX stack VIP

I-CSCF CSCFCX stack port

IP address range or ranges allocated to HSS.

Any

TCP or SCTP

S-CSCF to HSS (Diameter)

S-CSCF CSCFCX stack VIP

S-CSCF CSCFCX stack port

IP address range or ranges allocated to HSS.

Any

TCP or SCTP

BCF to HSS (Diameter)

BCF CSCFCX stack VIP

BCF CSCFCX stack port

IP address range or ranges allocated to HSS.

Any

TCP or SCTP

Dx

SLF to I-CSCF (Diameter)

IP address range or ranges allocated to SLF.

SLF Dx stack port

I-CSCF CSCFDX stack VIP

I-CSCF CSCFDX stack port

TCP or SCTP

SLF to S-CSCF (Diameter)

IP address range or ranges allocated to SLF.

SLF Dx stack port

S-CSCF VIP

IS-CSCF CSCFDX stack port

TCP or SCTP

I-CSCF to SLF (Diameter)

I-CSCF CSCFDX stack VIP

I-CSCF CSCFDX stack port

IP address range or ranges allocated to SLF.

Any

TCP or SCTP

S-CSCF to SLF (Diameter)

S-CSCF CSCFDX stack VIP

S-CSCF CSCFDX stack port

IP address range or ranges allocated to SLF.

Any

TCP or SCTP

5.7.2   Rf Interface

The flows that must be available on the Rf interface are shown in Table 14.

Table 14    Rf Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

Offline Charging System to S-CSCF (Diameter)

IP address range or ranges allocated to Offline Charging system.

Offline Charging System CSCFRF stack port

S-CSCF CSCFRF stack VIP

S-CSCF CSCFRF stack port

TCP or SCTP or both

Offline Charging System to E-CSCF (Diameter)

IP address range or ranges allocated to Offline Charging system.

Offline Charging System CSCFRF stack port

E-CSCF CSCFRF stack VIP

E-CSCF CSCFRF stack port

TCP or SCTP or both

S-CSCF to Offline Charging System (Diameter)

S-CSCF CSCFRF stack VIP

S-CSCF CSCFRF stack port

IP address range or ranges allocated to Offline Charging system.

Any

TCP or SCTP

E-CSCF to Offline Charging System (Diameter)

E-CSCF CSCFRF stack VIP

E-CSCF CSCFRF stack port

IP address range or ranges allocated to Offline Charging system.

Any

TCP or SCTP

5.7.3   Ro Interface

The flows that must be available on the Ro interface are shown in Table 15.

Table 15    Ro Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

Online Charging System to S-CSCF (Diameter)

IP address range or ranges allocated to Online Charging System.

Online Charging System CSCFRO stack port

S-CSCF CSCFRO stack VIP

S-CSCF CSCFRO stack port

TCP or SCTP or both

S-CSCF to Online Charging System (Diameter)

S-CSCF CSCFRO stack VIP

S-CSCF CSCFRO stack port

IP address range or ranges allocated to Online Charging System.

Any

TCP or SCTP

5.7.4   Ml Interface

The flows that must be available on the Ml interface are shown in Table 16.

Table 16    Ml Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

E-CSCF to LRF

E-CSCF VIP

E-CSCF MI port

Location Repository Function (LRF) IP address.

LRF Port number

HTTP/SIP

LRF to E-CSCF

LRF IP address

LRF MI port

E-CSCF VIP

E-CSCF Port Number

HTTP/SIP

5.7.5   Sh and Dh Interface

The flows that must be available on the Sh and Dh interfaces are shown in Table 17.

Table 17    Sh/Dh Interfaces

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

HSS to E-CSCF (Diameter)

IP address range or ranges allocated to HSS.

HSS Sh/Dh port

E-CSCF VIP

E-CSCF CSCFCX stack port

TCP or SCTP or both

E-CSCF to HSS (Diameter)

E-CSCF CSCFCX stack VIP

E-CSCF CSCFCX stack port

IP address range or ranges allocated to HSS.

Any

TCP or SCTP

5.8   IP Flow through DUA-DB LDAP

The flows that must be available on the DUA-DB LDAP interface are shown in Table 18.

Table 18    DUA-DB LDAP Interface

Traffic Flow

Origin IP

Origin Port

Destination IP

Destination Port

Protocol

I-CSCF to DUA-DB (LDAP)

I-CSCF IP Address

I-CSCF LDAP port

IP address range or ranges allocated to DUA-DB.

LDAP Port number

TCP

6   Privacy

The CSCF handles personal subscriber data to be able to provide services in the network. The personal subscriber data is handled in a secure way and the product supports different measures to protect the privacy of the subscribers. The CSCF stores personal subscriber data that is read from the Home Subscriber Server (HSS) when a subscriber registers and uses the personal subscriber data received through signaling for IMS session handling. Charging data is collected and sent to an external system for billing. Personal subscriber data can also be stored in logs when specific events happen in the system. The personal subscriber data that is handled by the CSCF is described in Section 6.4 Classification of Personal Subscriber Data.

6.1   Notice

This product processes personal subscriber data. Depending on the local legislation where the product is deployed and operated, the use of this product can require providing notice of the privacy policy of the operator to subscribers.

Ericsson discloses personal subscriber data to customers, professional advisors, suppliers, or other third parties engaged to perform administrative or other business management services. This disclosure is always on a confidential basis or otherwise in accordance with law. Ericsson may also disclose personal subscriber data with the consent of the individual or if disclosure is required or authorized by law.

Ericsson takes reasonable steps in all circumstances to ensure that the personal subscriber data it holds is protected from misuse, from interference and loss, and from unauthorized access, modification, or disclosure. Ericsson holds personal subscriber data in both hard copy and electronic forms in secure databases on secure premises, accessible only by authorized personnel.

Ericsson destroys or deidentifies personal subscriber data in circumstances where it is no longer required, unless Ericsson is otherwise required or authorized by law to retain that data.

6.2   Consent

This product processes personal subscriber data. Depending on the local legislation where the product is deployed and operated, the subscriber must give consent upon buying this service to do the following:

The collected data is only be accessed by Ericsson personnel or specific third parties that are in charge of these activities. The collected data is not distributed to third parties for other purposes.

When the personal subscriber data is no longer required, an official procedure is followed to dispose of this data.

6.3   Handling of Personal Subscriber Data

6.3.1   CSCF Functions with Privacy Impact

The following CSCF functions collect personal subscriber data:

6.3.2   Personal Subscriber Data Collection and Removal

The following personal subscriber data types are collected by the CSCF:

The CSCF removes semi-permanent and dynamic data when the user deregisters successfully. The use cases are described in the Function Specification CSCF Data Model, 19/155 17-AVA 901 19.

Removing stored personal subscriber data can be done in the following ways, depending on the type of log or file:

6.3.3   Overview of Personal Subscriber Data Handling Configuration

6.3.3.1   Role-Based Access

Role-Based Access Control can be used to limit and control the access to personal subscriber data. For more information about Role-Based Access Control, refer to User Management.

6.3.3.2   Privacy Event Logging

All privacy events, such as access to or modification of personal subscriber data, are logged in the audit trail log. For more information about the audit trail log, refer to Audit Information,

6.3.3.3   Data Level Minimization

The level of logged data can be reduced by setting the NetTrace trace level to minimum. For more information about setting the trace levels in NetTrace, refer to CSCF Network Tracing.

6.3.3.4   File Access Limitation

Access to log files that contain sensitive data can be limited through Security Management rules. Refer to Handling Files for more information.

6.3.3.5   File Removal

It is important to clean up files that are no longer needed. It is possible to clean up files automatic and manual.

To remove files automatically, follow the instructions in Configure Preventive Maintenance Policy Deleting Files in Logical File System.

To remove a file manually, follow the instructions in Delete File in Logical File System.

6.4   Classification of Personal Subscriber Data

Table 19 lists the personal subscriber data handled by the CSCF.

Table 19    Personal Subscriber Data Handled by the CSCF

Personal Subscriber Data Category

Data Item

Basic data

IP address

MSISDN

IMSI

IMEI code

Mobile Number

Mobile Device Serial Number

First name

Last name

User ID

SIP address

Logon details

Other Basic Data

Access-type

Authentication information (digest, AKA)

Public ID (IMPU)

Private ID (IMPI)

NoOfContacts/Contact

Registered status

wPSI/Wimpu

Sensitive Data

Call history

Event Monitoring: event-based monitoring, call trace recordings, general performance event handling, and so on.

Metadata showing user activity

Content of communication: voice, text, sound, picture, or other content of the communication

Location: LAC / CellID

Location History

Barred calling subscribers (Blacklist)



Copyright

© Ericsson AB 2016–2018. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    CSCF Security User Guide         Call Session Control Function