[{"name":"S3-222504","title":"Evaluation of tenet 1 on resources","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":10,"status":"merged","reservation_date":"2022-09-30 04:21:45","uploaded":"2022-10-03 10:06:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222504.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222505","title":"Evaluation of tenet 2 on secure communication","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":50,"status":"merged","reservation_date":"2022-09-30 04:21:45","uploaded":"2022-10-03 10:06:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222505.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222517","title":"Evaluation of tenet 5 on security posture","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":130,"status":"merged","reservation_date":"2022-09-30 04:21:45","uploaded":"2022-10-03 10:06:27","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222517.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222588","title":"New Key Issue on Potential Excessive Trust of NFs","source":"China Telecom Corporation Ltd.","contact":"Kun Jiang","contact-id":97696,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":210,"status":"noted","reservation_date":"2022-09-30 15:45:41","uploaded":"2022-10-02 08:43:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222588.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222676","title":"ZT Tenet 7","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Daphanie Nisbeth","contact-id":94229,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2022-10-02 19:46:32","uploaded":"2022-10-02 19:50:51","revisionof":"","revisedto":"S3-223079","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222676.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222678","title":"ZT Tenet 6","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Daphanie Nisbeth","contact-id":94229,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2022-10-02 19:55:22","uploaded":"2022-10-02 19:57:08","revisionof":"","revisedto":"S3-223078","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222678.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222679","title":"ZT Tenet 1","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2022-10-02 20:08:56","uploaded":"2022-10-02 20:11:09","revisionof":"","revisedto":"S3-223075","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222679.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222680","title":"ZT Tenet 5","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Daphanie Nisbeth","contact-id":94229,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2022-10-02 20:12:14","uploaded":"2022-10-02 20:14:06","revisionof":"","revisedto":"S3-223077","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222680.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222681","title":"ZT Tenet 3","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2022-10-02 20:14:25","uploaded":"2022-10-02 20:16:39","revisionof":"","revisedto":"S3-223076","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222681.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222682","title":"ZT Tenet 4","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2022-10-02 20:19:08","uploaded":"2022-10-02 20:21:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222682.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222720","title":"Evaluation of Tenet #1","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":40,"status":"merged","reservation_date":"2022-10-03 07:38:50","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222720.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222721","title":"Evaluation of Tenet #2","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2022-10-03 07:41:21","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"S3-222992","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222721.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222722","title":"Evaluation of Tenet #3","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":100,"status":"merged","reservation_date":"2022-10-03 07:42:54","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222722.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222724","title":"Evaluation of Tenet #4","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2022-10-03 07:44:13","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222724.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222725","title":"Evaluation of Tenet #5","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":150,"status":"merged","reservation_date":"2022-10-03 07:45:47","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222725.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222727","title":"Evaluation of Tenet #6","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"Evaluation of Tenet #6","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":170,"status":"merged","reservation_date":"2022-10-03 07:47:29","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222727.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222728","title":"Evaluation of Tenets #7","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":190,"status":"merged","reservation_date":"2022-10-03 07:49:16","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222728.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222730","title":"Evaluation of Tenets and current security mechanisms","source":"Lenovo, US NSA","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2022-10-03 07:51:07","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"S3-222994","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222730.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222732","title":"Key Issue on Need for continuous security monitoring and Trust evaluation","source":"Lenovo, Nokia, Nokia Shanghai Bell, Rakuten Mobile Inc., Interdigital, US NSA, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security, China Mobile, ZTE, CableLabs","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":220,"status":"revised","reservation_date":"2022-10-03 07:53:31","uploaded":"2022-10-03 12:56:11","revisionof":"","revisedto":"S3-222999","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222732.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222910","title":"Alignment of 3GPP\u2019s 5G Security to the first NIST Tenet of ZTA","source":"Ericsson","contact":"Helena Flygare","contact-id":93435,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":20,"status":"merged","reservation_date":"2022-10-03 12:20:03","uploaded":"2022-10-03 13:05:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222910.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222911","title":"Alignment of 3GPP\u2019s 5G Security to the second NIST Tenet of ZTA","source":"Ericsson LM","contact":"Helena Flygare","contact-id":93435,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2022-10-03 12:24:25","uploaded":"2022-10-03 13:05:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222911.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222924","title":"Alignment of 3GPP\u2019s 5G Security to the third NIST Tenet of ZTA","source":"Ericsson LM","contact":"Helena Flygare","contact-id":93435,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":80,"status":"merged","reservation_date":"2022-10-03 12:48:20","uploaded":"2022-10-03 13:05:35","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222924.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222992","title":"Evaluation of Tenet #2","source":"Lenovo, US National Security Agency, Ericsson, Huawei, HiSilicon","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":29920,"status":"approved","reservation_date":"2022-10-14 18:05:26","uploaded":"2022-10-15 10:22:29","revisionof":"S3-222721","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222992.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222994","title":"Evaluation of Tenets and current security mechanisms","source":"Lenovo, US National Security Agency","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":29940,"status":"approved","reservation_date":"2022-10-14 18:09:34","uploaded":"2022-10-14 18:39:38","revisionof":"S3-222730","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222994.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-222999","title":"Key Issue on Need for continuous security monitoring and Trust evaluation","source":"Lenovo, Nokia, Nokia Shanghai Bell, Rakuten Mobile Inc., Interdigital, US National Security Agency, Motorola Solutions, Johns Hopkins University APL, Intel, Center for Internet Security, China Mobile, ZTE, CableLabs","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":29990,"status":"approved","reservation_date":"2022-10-14 18:12:54","uploaded":"2022-10-14 18:39:38","revisionof":"S3-222732","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-222999.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223075","title":"ZT Tenet 1","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30750,"status":"revised","reservation_date":"2022-10-16 20:27:27","uploaded":"2022-10-16 20:46:34","revisionof":"S3-222679","revisedto":"S3-223134","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223075.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223076","title":"ZT Tenet 3","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30760,"status":"revised","reservation_date":"2022-10-16 20:50:34","uploaded":"2022-10-16 21:01:16","revisionof":"S3-222681","revisedto":"S3-223135","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223076.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223077","title":"ZT Tenet 5","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30770,"status":"approved","reservation_date":"2022-10-16 21:05:48","uploaded":"2022-10-16 21:16:46","revisionof":"S3-222680","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223077.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223078","title":"ZT Tenet 6","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30780,"status":"approved","reservation_date":"2022-10-16 21:20:03","uploaded":"2022-10-16 21:29:10","revisionof":"S3-222678","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223078.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223079","title":"ZT Tenet 7","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"This submission contains a gap analysis comparing the NIST zero trust tenets to current 3GPP security mechanisms for the 5G Core. For this analysis, some thought was put into how the tenets specifically apply to a 5G Core since the NIST Special Publicatio","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30790,"status":"approved","reservation_date":"2022-10-16 21:32:46","uploaded":"2022-10-16 21:39:57","revisionof":"S3-222676","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223079.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223121","title":"draft TR 33.894 v0.3.0","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":31210,"status":"approved","reservation_date":"2022-10-17 07:53:43","uploaded":"2022-10-20 12:22:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.3.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223121.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223134","title":"ZT Tenet 1","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS,Ericsson, Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30751,"status":"approved","reservation_date":"2022-10-19 13:15:21","uploaded":"2022-10-19 13:19:04","revisionof":"S3-223075","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223134.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-223135","title":"ZT Tenet 3","source":"US National Security Agency, NIST, CISA ECD, Lenovo, CableLabs, InterDigital, AT&T, Johns Hopkins University APL, CIS, Nokia, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":23,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30761,"status":"approved","reservation_date":"2022-10-19 13:20:32","uploaded":"2022-10-19 13:21:53","revisionof":"S3-223076","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.2.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_108e-AdHoc\/Docs\/S3-223135.zip","group":"S3","meeting":"S3-108-Ad Hoc-e","year":2022,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]