1 Introduction
This document describes the security functions implemented by the Call Session Control Function (CSCF). It also describes the security-related procedures that can be performed by the system administrators.
The CSCF is an essential module in IP Multimedia Subsystem (IMS) for processing signaling data, using Session Initiation Protocol (SIP) and Diameter as signaling protocols. It supports Internet Protocols on a scalable and high-performance platform. The CSCF can be deployed as a virtual network element in an IMS network. For details about the CSCF, the supported functionality, and the nodes it communicates with, refer to CSCF Technical Description.
1.1 Prerequisites
This section describes the prerequisites; conditions and information required for performing security management on the CSCF.
1.1.1 Conditions
Before performing the procedures in Section 3.1 Procedures, ensure that the following conditions are met:
- The CSCF Virtual Network Function (VNF) is installed and initially configured. The initial configuration includes the necessary settings for the authentication of Northbound Interface (NBI) users and their authorization.
- The intended software level to be run in the CSCF is installed. The release information can be found in delivery reports, delivery specifications, delivery notes, release notes, or correction notes.
- The user has the required access privileges, and the required usernames and passwords are known.
- A System Security Administrator access role is required.
1.2 Environment
This section describes the environment requirements for product operations.
The CSCF belongs to the IP Multimedia Core Network (IMCN) and it is indirectly connected to the access network by the Session Border Gateway (SBG) which offers firewall capabilities and provides protection from external attacks.
The CSCF is placed in the Service & Control Virtual Private Network (VPN) group which includes Network Functions handling signaling traffic without direct connection to external networks.
The following VPNs exist in the group:
- The Signaling Service Control VPN for signaling traffic to and from other IMS Network Nodes.
- The Operation and Maintenance Service Control VPN for Operation & Maintenance (O&M) traffic used for IMS Network nodes in the group.
- Charging VPN for offline (Rf) and online (Ro) traffic.
For more details, refer to CSCF VNF Network Connectivity Overview.
2 Product Security Functionality
The following security functionality is supported in the product:
- Authentication
- Authorization
- Accountability
- Integrity
- Confidentiality
2.1 Authentication
2.1.1 Subscriber Authentication
The CSCF supports the following authentication procedures:
- IMS Authentication and Key Agreement (AKA)
- Authentication through trusted gateway
- Authentication through trusted Application Server (AS)
- NASS Bundled Authentication (NBA)
- GPRS IMS Bundled Authentication (GIBA)
- Digest authentication
- Optimized Digest
2.1.2 O&M User Authentication
The CSCF supports O&M password-based user authentication. For more information, refer to User Management.
2.1.3 Mutual Authentication of Communication Channel Peers
The CSCF supports certificate-based mutual authentication for the following:
- Lightweight Directory Access Protocol (LDAP) over Transport Layer Security (TLS), between the CSCF and the LDAP server, refer to Certificate Management.
- Internet Key Exchange version 2 (IKEv2) during the establishment of the IP Security (IPsec) Security Associations, between the CSCF and any peer, refer to eVIP Management Guide.
2.2 Authorization
The CSCF supports O&M User Authorization.
Authorization is the capability to validate if the logged in user is allowed to perform a certain operation to a certain Managed Object (MO). The authorization is role-based, that is, the logged in user is mapped to a role and each role has one or several rules defining the access right to an MO.
For a description of the user management principles, user administration, and user roles, refer to User Management.
2.3 Accountability
The audit log enables logging and tracking access to files, directories, and resources of the system, as well as tracing system calls. It enables monitoring of the system for application misbehavior or code malfunctions.
For more information, refer to Audit Information.
2.4 Integrity
2.4.1 Node Integrity
The CSCF supports node integrity in the following ways:
- Verification and protection of the integrity of the system configuration files.
- Protect and prevent unauthorized modification of the selected files or folders.
- O&M Roles and Rules provide integrity protection by role and target-based access control.
2.4.2 Communication Integrity
The CSCF supports communication integrity in the following ways:
- Integrity protection of O&M traffic (also including Charging Data Records, backups, logs)
- Integrity protection of signaling traffic
- TLS provides for integrity protection
2.5 Confidentiality
The CSCF supports communication confidentiality in the following ways:
- Confidentiality protection of O&M traffic (including Charging Data Records, backups, logs)
- Confidentiality protection of signaling traffic
- TLS provides for confidentiality and integrity protection, and mutual authentication of the peers
- NETCONF is protected using Secure Shell (SSH), in addition TLS can also be used
- Signaling traffic like SIP and Diameter can be protected by IPsec tunnels with authentication
3 Security Configuration
3.1 Procedures
This section provides the instructions for operating the security functionality of the product.
3.1.1 Hardening
Perform hardening of the CSCF node according to the procedures, refer to CSCF Hardening Guideline, including the following steps:
- Allow or block ports for all listening services
- Change default passwords, including predefined password for root that can be known by many persons
- Disable root access through NBI, remote logon for root user is enabled by default
- Enable strong password enforcement
- Force password change and aging
- Configure Ericsson Command-Line Interface (ECLI) inactivity timer
- Create emergency user, at least one emergency user must be configured in the system
- Delete unused local Linux® accounts, if additional users are created during installation, and they are not to be used, they must be deleted
- Block Network File System (NFS) against access from external networks
The operator can have own security policies, where the node must be hardened according to operator requirements, for example defining specific secure protocols or other ports different than the default ones.
After the hardening activities have been performed, create a backup of the system. It is also recommended to upload the backup to external storage.
3.1.2 Authentication and User Management
For instructions on how to create users and user groups, and assign privileges to a group, refer to User Management. Always use personal accounts instead of shared or generic user accounts.
The CSCF has the following predefined default roles. The roles, and the corresponding rules, cannot be modified:
- CSCF Application Administrator
- CSCF Application Operator
- CSCF Application Security Administrator
- Local Authentication Administrator
- Self
- System Administrator
- System Read Only
- System Security Administrator
LDAP must be configured with the strongest possible ciphers.
For details on LDAP Authentication, Local Authorization, Roles, and Rules, refer to User Management.
3.1.3 Audit Trails
The audit log enables logging and tracking access to files, directories, and resources of the system, as well as tracing system calls. It enables monitoring of the system for application misbehavior or code malfunctions.
For information about where to find the audit and syslog log files, and how to read them, refer to Audit Information.
3.1.4 Change Logon Banner
By default, no information is provided to the user when logging on using the CLI. The operator can define own customized greeting message or legal message when a user logs on through the CLI.
The system provides the file /cluster/etc/motd, which allows a text message to be created and later displayed when user logs on to the system through CLI.
3.1.5 IPsec Support
If there are requirements to protect Signaling traffic, for example SIP or Diameter (when transferring charging or malicious call tracing data) IPsec tunnels can be used.
For a description of the procedures for setting up IPsec tunnels to protect signaling traffic, refer to eVIP Management Guide.
3.2 Recommended Periodic Operations
The product must be properly hardened before it is taken into use. Nevertheless, it is important that the daily operations on the product are performed in such a way that the security status of the product is not weakened.
New vulnerabilities that must be mitigated are frequently found in the existing products. Therefore it is necessary to maintain the security posture of the product in service on a regular, ongoing basis.
The recommended periodic security-related operations are the following:
- Ensure that the latest software version is installed. It is recommended to get the latest available Emergency Package (EP) version of the CSCF.
- Perform system backups regularly.
- Export backups to external storage regularly.
- Export logs to external storage regularly.
- Fetch Performance Management (PM) data from the CSCF regularly and store externally.
- Check the TLS certificates regularly to ensure that they do not expire.
- Run password checkers periodically to find weak passwords.
This is done using third-party software.
- Note:
- Do not install third-party software tools as part of the CSCF distribution.
- Monitor the file system integrity periodically, either manually or as a scheduled task. For more information, refer to CSCF Health Check.
- Ensure that no unnecessary listening ports are open, for example by using external tools such as "Nessus" to monitor the ports and check with the system documentation or by checking the system manually.
- Ensure that the ports for the insecure protocols Telnet and File Transfer Protocol (FTP) are closed.
- Ensure that no shared user accounts are used.
- Ensure that administrative user rights are assigned only to real needs.
- Check the audit logs that are related to potential security events regularly. Check anything that can be considered as strange according to the traffic model of the operator besides error cases, such as failures to authenticate, too much user activity, and too many dropped or rejected sessions.
- Analyze log data and counters regularly to reconsider the chosen security-related attributes.
3.3 Handling of Patches
Patches are delivered in the form of EPs. The process to load EPs is described in the upgrade instruction for the actual CSCF EP.
4 Default Parameter Values
No parameters are set with default values.
5 Services, Ports, and Protocols
This section provides information about network services in the system that are available from External Networks.
5.1 Listening Services
The listening services are shown in Table 1.
|
Port |
Protocol |
Description |
Listening Only on the Internal Network |
|---|---|---|---|
|
22 |
Secure Shell (SSH/Secure File Transfer Protocol (SFTP)) |
No, configurable | |
|
67 |
Dynamic host configuration service (DHCP) |
Yes | |
|
69 |
File transfer service (TFTP) |
Yes | |
|
111 |
TCP/UDP |
Portmap service (portmap) |
No. The service is listening on the External Network, but it is serving only on the internal network. |
|
123 |
Time synchronization service (NTP) |
No | |
|
514 |
Log service (syslog) |
Yes | |
|
1022 |
SSH/SFTP (only for LDEwS) |
Yes | |
|
1128 |
Alarm service |
Yes | |
|
1129–1131 |
TCP/UDP |
Node service |
Yes |
|
2049 |
TCP/UDP |
Network File System (NFS) |
No. The service is listening on the External Network, but it is serving only on the internal network. |
|
7788 |
Disk replication service (DRBD) |
Yes |
The standard SSH server is started up by Linux® Distribution Extensions (LDE) with a default configuration, listening on default port 22 on all networks. Also on Linux Distribution Extensions with SUSE™ Linux Enterprise Server (LDEwS), a second SSH server is listening on port 1022 on the internal network.
5.2 External Traffic Port Numbers
The ports listed in Table 2 need to be available for external SIP and DNS traffic through the External Network Traffic VIP interfaces. The Access List, as part of the firewall policy in the VIP Gateway Router, is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. These ports are used for If1, ISC, Ma, Mw, Mg/Mj, Mr, and Ml interfaces. Other VIP Gateway Routers belonging to Operation and Maintenance (O&M), Charging, and Signaling Networks must block the access to the listed external ports in Table 2.
|
Port Number |
Protocol |
Server Side |
Use (Comment) |
|---|---|---|---|
|
53 |
DNS server |
||
|
53 |
DNS server |
||
|
5060 |
For SIP used by I-, S-, or E-CSCF, or EATF, or BCF, other port numbers can be used. | ||
|
5060 |
For SIP used by I-, S-, or E-CSCF, or EATF, or BCF, other port numbers can be used. |
5.3 Operation and Maintenance Port Numbers
The ports listed in Table 3 need to be available through O&M VIP Interface. The Access List, as part of the firewall policy in the O&M VIP Gateway Router, is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. All the VIP Gateway Routers belonging to Charging and HSS/SLF must block the access to the listed external ports in Table 3.
|
Port Number |
Protocol |
Server Side |
Use (Comment) |
|---|---|---|---|
|
161 |
SNMP requests to Platform (Fault Management). | ||
|
162 |
SNMP traps (messages) from Platform to SNMP Manager. Port number is configurable in Platform. | ||
|
830 |
NETCONF | ||
|
2022 |
|||
|
2028 |
|||
|
6513 |
NETCONF over TLS |
5.4 Diameter Port Numbers
The ports listed in Table 4 need to be available through the Charging or Signaling Diameter VIP interface. The Access List, as part of the firewall policy, in the Charging or Signaling Diameter VIP Gateway Router is used to accomplish this availability. How to configure the router Access List depends on which router is used and is described in the documentation for the specific router chosen. These ports are used for Charging or Signaling Diameter networks. All the VIP Gateway Routers belonging to Traffic and O&M Networks must block the access to the listed external ports in Table 4.
|
Port Number |
Protocol |
Server Side |
Use (Comment) |
|---|---|---|---|
|
3868 |
CSCF Diameter |
Default Diameter port | |
|
3869(1) |
CSCF Diameter |
Additional Diameter port | |
|
3870 (1) |
CSCF Diameter |
Additional Diameter port | |
|
3871 (1) |
CSCF Diameter |
Additional Diameter port | |
|
3872 (1) |
CSCF Diameter |
Additional Diameter port |
(1) Port numbers 8700–8732
could also be used
5.5 SIP IP Flows
SIP IP flows are described in Section 5.5.1 Ma Interface, Section 5.5.2 Mw Interface, Section 5.5.3 Mg/Mj Interface, Section 5.5.4 Mr Interface, Section 5.5.5 ISC Interface, Section 5.5.6 I4 Interface, and Section 5.5.7 I5 Interface.
The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.
- Note:
- The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.
5.5.1 Ma Interface
The flows that must be available on the Ma interface are shown in Table 5.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
Allocated ports to the AS |
I-CSCF port |
||||
|
I-CSCF port |
Any |
5.5.2 Mw Interface
The flows that must be available on the Mw interface are shown in Table 6.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
I-CSCF Mw port |
S-CSCF Mw port |
||||
|
BCF Mw port |
S-CSCF Mw port |
||||
|
I-CSCF Mw port |
Any |
||||
|
S-CSCF Mw port |
Any |
||||
|
S-CSCF Mw port |
Any |
||||
|
S-CSCF Mw port |
Any |
||||
|
E-CSCF Mw port |
Any |
5.5.3 Mg/Mj Interface
The flows that must be available on the Mg/Mj interface are shown in Table 7.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
MGC Mj port |
I-CSCF Mg/Mj port |
||||
|
MGC Mj port |
S-CSCF Mg/Mj port |
||||
|
MGC Mj port |
E-CSCF Mg/Mj port |
||||
|
MGC Mj port |
BCF/I-CSCF VIP |
BCF/I-CSCF Mg/Mj port |
|||
|
I-CSCF Mj port |
Any |
||||
|
S-CSCF Mj port |
Any |
||||
|
E-CSCF Mj port |
Any |
5.5.4 Mr Interface
The flows that must be available on the Mr interface are shown in Table 8.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
MRF Mr port |
I-CSCF Mr port |
||||
|
MRF Mr port |
S-CSCF Mr port |
||||
|
I-CSCF Mr port |
Any |
||||
|
S-CSCF Mr port |
Any |
5.5.5 ISC Interface
The flows that must be available on the ISC interface are shown in Table 9.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
Any |
5.5.6 I4 Interface
The flows that must be available on the I5 interface are shown in Table 10.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
E-CSCF I4 port |
EATF Port number |
||||
|
EATF I4 port |
E-CSCF Port number |
5.5.7 I5 Interface
The flows that must be available on the I5 interface are shown in Table 11.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
I-CSCF I5 port |
EATF Port number |
||||
|
EATF I5 port |
I-CSCF Port number |
5.6 DNS IP Flows
DNS IP flows are described in Section 5.6.1 If1 Interface.
The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.
- Note:
- The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.
5.6.1 If1 Interface
The flows that must be available on the If1 interface are shown in Table 12.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
I-CSCF If1 port |
Any |
UDP/TCP | |||
|
S-CSCF If1 port |
Any |
UDP/TCP | |||
|
E-CSCF If1 port |
Any |
UDP/TCP | |||
|
EATF If1 port |
Any |
UDP/TCP | |||
|
BCF If1 port |
Any |
UDP/TCP |
5.7 Diameter IP Flows
Diameter IP flows are described in Section 5.7.1 Cx and Dx Interfaces, Section 5.7.2 Rf Interface, Section 5.7.3 Ro Interface, Section 5.7.4 Ml Interface, Section 5.7.5 Sh and Dh Interface, and Section 5.5.1 Ma Interface.
The ports listed in the following subsections are configurable for all the external interfaces. The default port for SIP is 5060 according to RFC 3261 SIP: Session Initiation Protocol.
- Note:
- The CSCF originating port for TCP is ephemeral for outgoing traffic towards the remote nodes. Therefore, the origin port for the TCP is not applicable in the tables in the subsections.
5.7.1 Cx and Dx Interfaces
The flows that must be available on the Cx and Dx interfaces are shown in Table 13.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
Cx | |||||
|
HSS Cx stack port |
I-CSCF CSCFCX stack port |
||||
|
HSS Cx stack port |
S-CSCF CSCFCX stack port |
||||
|
HSS Cx stack port |
BCF CSCFCX stack port |
||||
|
I-CSCF CSCFCX stack port |
Any |
||||
|
S-CSCF CSCFCX stack port |
Any |
||||
|
BCF CSCFCX stack port |
Any |
||||
|
Dx | |||||
|
SLF Dx stack port |
I-CSCF CSCFDX stack port |
||||
|
SLF Dx stack port |
IS-CSCF CSCFDX stack port |
||||
|
I-CSCF CSCFDX stack port |
Any |
||||
|
S-CSCF CSCFDX stack port |
Any |
||||
5.7.2 Rf Interface
The flows that must be available on the Rf interface are shown in Table 14.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
Offline Charging System to S-CSCF (Diameter) |
IP address range or ranges allocated to Offline Charging system. |
Offline Charging System CSCFRF stack port |
S-CSCF CSCFRF stack port |
||
|
Offline Charging System to E-CSCF (Diameter) |
IP address range or ranges allocated to Offline Charging system. |
Offline Charging System CSCFRF stack port |
E-CSCF CSCFRF stack port |
||
|
S-CSCF to Offline Charging System (Diameter) |
S-CSCF CSCFRF stack port |
IP address range or ranges allocated to Offline Charging system. |
Any |
||
|
E-CSCF to Offline Charging System (Diameter) |
E-CSCF CSCFRF stack port |
IP address range or ranges allocated to Offline Charging system. |
Any |
5.7.3 Ro Interface
The flows that must be available on the Ro interface are shown in Table 15.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
Online Charging System to S-CSCF (Diameter) |
IP address range or ranges allocated to Online Charging System. |
Online Charging System CSCFRO stack port |
S-CSCF CSCFRO stack port |
||
|
S-CSCF to Online Charging System (Diameter) |
S-CSCF CSCFRO stack port |
IP address range or ranges allocated to Online Charging System. |
Any |
5.7.4 Ml Interface
The flows that must be available on the Ml interface are shown in Table 16.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
E-CSCF MI port |
LRF Port number |
HTTP/SIP | |||
|
LRF MI port |
E-CSCF Port Number |
HTTP/SIP |
5.7.5 Sh and Dh Interface
The flows that must be available on the Sh and Dh interfaces are shown in Table 17.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
HSS Sh/Dh port |
E-CSCF CSCFCX stack port |
||||
|
E-CSCF CSCFCX stack port |
Any |
5.8 IP Flow through DUA-DB LDAP
The flows that must be available on the DUA-DB LDAP interface are shown in Table 18.
|
Traffic Flow |
Origin IP |
Origin Port |
Destination IP |
Destination Port |
Protocol |
|---|---|---|---|---|---|
|
LDAP Port number |
6 Privacy
The CSCF handles personal subscriber data to be able to provide services in the network. The personal subscriber data is handled in a secure way and the product supports different measures to protect the privacy of the subscribers. The CSCF stores personal subscriber data that is read from the Home Subscriber Server (HSS) when a subscriber registers and uses the personal subscriber data received through signaling for IMS session handling. Charging data is collected and sent to an external system for billing. Personal subscriber data can also be stored in logs when specific events happen in the system. The personal subscriber data that is handled by the CSCF is described in Section 6.4 Classification of Personal Subscriber Data.
6.1 Notice
This product processes personal subscriber data. Depending on the local legislation where the product is deployed and operated, the use of this product can require providing notice of the privacy policy of the operator to subscribers.
Ericsson discloses personal subscriber data to customers, professional advisors, suppliers, or other third parties engaged to perform administrative or other business management services. This disclosure is always on a confidential basis or otherwise in accordance with law. Ericsson may also disclose personal subscriber data with the consent of the individual or if disclosure is required or authorized by law.
Ericsson takes reasonable steps in all circumstances to ensure that the personal subscriber data it holds is protected from misuse, from interference and loss, and from unauthorized access, modification, or disclosure. Ericsson holds personal subscriber data in both hard copy and electronic forms in secure databases on secure premises, accessible only by authorized personnel.
Ericsson destroys or deidentifies personal subscriber data in circumstances where it is no longer required, unless Ericsson is otherwise required or authorized by law to retain that data.
6.2 Consent
This product processes personal subscriber data. Depending on the local legislation where the product is deployed and operated, the subscriber must give consent upon buying this service to do the following:
- Collect and maintain personal subscriber data, aimed at holding securely this information.
- Fulfill the purpose of installing, upgrading, and administering
the CSCF.
The system can be required to activate trace information. The purpose of these traces is only for troubleshooting. Depending on the trace level, it can contain personal subscriber data.
The collected data is only be accessed by Ericsson personnel or specific third parties that are in charge of these activities. The collected data is not distributed to third parties for other purposes.
When the personal subscriber data is no longer required, an official procedure is followed to dispose of this data.
6.3 Handling of Personal Subscriber Data
6.3.1 CSCF Functions with Privacy Impact
The following CSCF functions collect personal subscriber data:
- Offline and Online Charging
The CSCF collects offline and online charging data for billing purposes. Normally, the CSCF directly transfers offline charging data. When a connectivity problem occurs, offline charging data is temporarily stored before it is forwarded to an external Charging Data Function. The CSCF does not analyze the collected charging data.
- Traceability and Troubleshooting
In the CSCF, the Network Tracing, and User Tracing functions collect personal subscriber data for troubleshooting purposes. When an incident occurs, that data is analyzed to resolve it.
- User Data Output
The CSCF functionality User Data Output collects and prints user data for troubleshooting purposes. For more information about User Data Output, refer to CSCF User Data Output Guideline.
6.3.2 Personal Subscriber Data Collection and Removal
The following personal subscriber data types are collected by the CSCF:
- Semi-permanent data
This type of data is downloaded from the HSS when a subscriber registers and stored in the CSCF to enable processing of subscriber requests.
- Dynamic data
This data includes dynamic registration data and dynamic session data related to subscriber activities. Dynamic data is stored in the CSCF.
- Personal subscriber data in Event History
Event History collects and logs personal subscriber data for troubleshooting.
- Personal subscriber data in Network Tracing
Network Tracing collects and logs personal subscriber data for troubleshooting.
- Personal subscriber data during a system crash
During a crash of the system, the core dump can include personal subscriber data. Activation of the CSCF Health Check can start the collection of the core dump.
The CSCF removes semi-permanent and dynamic data when the user deregisters successfully. The use cases are described in the Function Specification CSCF Data Model, 19/155 17-AVA 901 19.
Removing stored personal subscriber data can be done in the following ways, depending on the type of log or file:
- The data is overwritten at regular intervals.
- Automatic file removal is configured, see Section 6.3.3.5 File Removal.
- The operator removes the files manually, see Section 6.3.3.5 File Removal.
6.3.3 Overview of Personal Subscriber Data Handling Configuration
6.3.3.1 Role-Based Access
Role-Based Access Control can be used to limit and control the access to personal subscriber data. For more information about Role-Based Access Control, refer to User Management.
6.3.3.2 Privacy Event Logging
All privacy events, such as access to or modification of personal subscriber data, are logged in the audit trail log. For more information about the audit trail log, refer to Audit Information,
6.3.3.3 Data Level Minimization
The level of logged data can be reduced by setting the NetTrace trace level to minimum. For more information about setting the trace levels in NetTrace, refer to CSCF Network Tracing.
6.3.3.4 File Access Limitation
Access to log files that contain sensitive data can be limited through Security Management rules. Refer to Handling Files for more information.
6.3.3.5 File Removal
It is important to clean up files that are no longer needed. It is possible to clean up files automatic and manual.
To remove files automatically, follow the instructions in Configure Preventive Maintenance Policy Deleting Files in Logical File System.
To remove a file manually, follow the instructions in Delete File in Logical File System.
6.4 Classification of Personal Subscriber Data
Table 19 lists the personal subscriber data handled by the CSCF.
|
Personal Subscriber Data Category |
Data Item |
|---|---|
|
Basic data |
IP address |
|
IMSI | |
|
IMEI code | |
|
Mobile Number | |
|
Mobile Device Serial Number | |
|
First name | |
|
Last name | |
|
User ID | |
|
SIP address | |
|
Logon details | |
|
Other Basic Data |
Access-type |
|
Authentication information (digest, AKA) | |
|
Public ID (IMPU) | |
|
Private ID (IMPI) | |
|
NoOfContacts/Contact | |
|
Registered status | |
|
wPSI/Wimpu | |
|
Sensitive Data |
Call history |
|
Event Monitoring: event-based monitoring, call trace recordings, general performance event handling, and so on. | |
|
Metadata showing user activity | |
|
Content of communication: voice, text, sound, picture, or other content of the communication | |
|
Location: LAC / CellID | |
|
Location History | |
|
Barred calling subscribers (Blacklist) |

Contents