[{"name":"S3-232427","title":"Add Tenets to Tenet Evaluation Summary","source":"Johns Hopkins University APL","contact":"Juliette Garcia-Flahaut","contact-id":95799,"tdoctype":"pCR","for":"Approval","abstract":"Add Tenets to Tenet Evaluation Summary","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":24270,"status":"withdrawn","reservation_date":"2023-11-05 17:02:25","uploaded":"2023-05-11 17:04:18","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232427.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232487","title":"Add Tenets to Tenet Evaluation Summary","source":"Johns Hopkins University APL, Lenovo","contact":"Juliette Garcia-Flahaut","contact-id":95799,"tdoctype":"pCR","for":"Approval","abstract":"Add Tenets to Tenet Evaluation Summary","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":24870,"status":"not treated","reservation_date":"2023-12-05 15:49:15","uploaded":"2023-05-12 16:40:48","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232487.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232776","title":"Evaluation for tenet 4","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":27760,"status":"not treated","reservation_date":"2023-05-15 07:33:36","uploaded":"2023-05-15 12:40:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232776.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232777","title":"Additions to evaluation of tenet 6","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":27770,"status":"revised","reservation_date":"2023-05-15 07:33:36","uploaded":"2023-05-15 12:40:40","revisionof":"","revisedto":"S3-233320","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232777.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232778","title":"Additions to evaluation of tenet 7","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":27780,"status":"not treated","reservation_date":"2023-05-15 07:33:36","uploaded":"2023-05-15 12:40:40","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232778.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233085","title":"Update to Tenet #7","source":"Lenovo, US National Security Agency, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30850,"status":"not treated","reservation_date":"2023-05-15 12:27:09","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233085.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233086","title":"Update to Tenet #6","source":"Lenovo, US National Security Agency, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30860,"status":"merged","reservation_date":"2023-05-15 12:30:35","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233086.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233088","title":"Update to Tenet #5","source":"Lenovo, US National Security Agency, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30880,"status":"not treated","reservation_date":"2023-05-15 12:32:47","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233088.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233089","title":"New clause on actual tenets information","source":"Lenovo, US National Security Agency, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30890,"status":"not treated","reservation_date":"2023-05-15 12:34:44","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233089.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233090","title":"Discussion on agreed threat scenarios and the need to collect data","source":"Lenovo, US National Security Agency, Johns Hopkins University APL, Telefonica","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30900,"status":"noted","reservation_date":"2023-05-15 12:37:46","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233090.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233091","title":"Data collection for Security Monitoring","source":"Lenovo, Charter Communications, US National Security Agency, Telefonica, Rakuten Mobile, Center for Internet Security, Cablelabs, Johns Hopkins University APL","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30910,"status":"revised","reservation_date":"2023-05-15 12:43:30","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"S3-233325","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233091.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233092","title":"Conclusion to KI#1","source":"Lenovo, US National Security Agency, Telefonica, Nokia, Nokia Shanghai Bell","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30920,"status":"revised","reservation_date":"2023-05-15 12:48:21","uploaded":"2023-05-15 13:50:34","revisionof":"","revisedto":"S3-233326","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233092.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233136","title":"ZTA approach: NF to NF Communication Access Control via PDP and PEP","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"This approach implements the zero trust logical functions Policy Decision Point (PDP) and Policy Enforcement Point (PEP) to aid in zero trust access control functionality within the 5GC SBA.","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":31360,"status":"not treated","reservation_date":"2023-05-15 15:09:48","uploaded":"2023-05-15 15:16:19","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233136.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233320","title":"Additions to evaluation of tenet 6","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":27771,"status":"approved","reservation_date":"2023-05-30 11:50:31","uploaded":"2023-05-30 11:50:31","revisionof":"S3-232777","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233320.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233325","title":"Data collection for Security Monitoring","source":"Lenovo, Charter Communications, US National Security Agency, Telefonica, Rakuten Mobile, Center for Internet Security, Cablelabs, Johns Hopkins University APL","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30911,"status":"noted","reservation_date":"2023-05-30 12:45:08","uploaded":"2023-05-30 12:45:08","revisionof":"S3-233091","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233325.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233326","title":"Conclusion to KI#1","source":"Lenovo, US National Security Agency, Telefonica, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":30921,"status":"noted","reservation_date":"2023-05-30 12:45:08","uploaded":"2023-05-30 12:45:08","revisionof":"S3-233092","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.6.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233326.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233448","title":"Draft TR 33.894","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":60,"ainumber":"5.21","ainame":"Study on applicability of the Zero Trust Security principles in mobile networks","tdoc_agenda_sort_order":344800,"status":"approved","reservation_date":"2023-05-30 14:14:00","uploaded":"2023-06-01 12:11:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.894","crspecversion":"0.7.0","workitem":[{"winame":"FS_ZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233448.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]