Top Banner

of 21

Nsn Bss Mbss

Feb 09, 2018

Download

Documents

Suresh Rao J
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/22/2019 Nsn Bss Mbss

    1/21

    Node Name

    BSS__________________________________________________________________________________________________________________

    Uninor Internal 1

    Minimum Baseline Security StandardBase Station SubsystemMake: NSNPlatform: DX-200O&M unit: OMU (Operation and Maintenance Unit)

    Unitech Wireless Tamilnadu (P) Ltd.

  • 7/22/2019 Nsn Bss Mbss

    2/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 2

    Copyright

    All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in adatabase or retrieval system, without prior written permission of Unitech Wireless Tamilnadu (P) Ltd. The informationcontained in this document is confidential and proprietary to Unitech Wireless Tamilnadu (P) Ltd. and may not be used ordisclosed except as expressly authorized in writing by Unitech Wireless Tamilnadu (P) Ltd.

    Trademarks

    Other product names mentioned in this document may be trademarks or registered trademarks of their respective companiesand are hereby acknowledged.

  • 7/22/2019 Nsn Bss Mbss

    3/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 3

    Table of Contents

    Introduction......................................................................................................................................................................................... 4Use of the Document........................................................................................................................................................................... 4Warning................................................................................................................................................................................................. 4Purpose.................................................................................................................................................................................................. 5General Security Controls.................................................................................................................................................................. 6Control Categories............................................................................................................................................................................... 7

    Detailed security controls:................................................................................................................................................................. 8

  • 7/22/2019 Nsn Bss Mbss

    4/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 4

    Introduction

    This document is to assist operations team to deploy minimum baseline security configuration on the node. These configurationstandard, detail many important items such as user account management, password management, interfaces, ports, audit logging,monitoring or node specific security configuration etc. However, due to the constant changes and variations in operating systemsecurity issues and configurations, this document should be considered a general guideline and starting point.

    Use of the Document

    The MBSS document is for INTERNAL USE ONLY. They should be kept within the organizations and to be treated as Uninor Internalas per the Information Classification Guidelines mentioned in Uninor Information Security Policy ver 3.0. Not to be distributed to the

    Original Equipment Manufacturers and/or to Managed Service Partners.

    Warning

    This MBSS document and the accompanying guidance material is technically complex and is designed for use by trained securityspecialists performing the work under the direction of either a security partner or manager. Operations teams wishing to have theseservices performed for an organization should contact the designated security support staff within their office or territory. Partners ormanagers should ensure that staff assigned to perform the work have the necessary technical training and have the appropriatetechnical reference materials and specialist support. Staff should, therefore, obtain partner approval before using this material.

  • 7/22/2019 Nsn Bss Mbss

    5/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 5

    Purpose

    This MBSS document relates to the Base Station Subsyatem (BSS) of Nokia Siemens Network. It is intended for use by technical

    security practitioners for implementation of minimum General Security Controls.

    A technical environment is comprised of a number of inter-related elements that include:

    Applications; Databases; Communications infrastructure elements; and Hardware.

    The primary focus of this technical practice aid is to provide minimum baseline security standard for Base Station Subsystem (BSS)that includes properties, features and operating system of the respective product.

  • 7/22/2019 Nsn Bss Mbss

    6/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 6

    General Security Controls

    General Security Controls work requires the examination of both technology-specific and technology independent controls. For

    example, configuration parameter, program and data file security controls will normally be specific to the underlying technicalenvironment, whereas, security process review controls will largely be independent of the technical environment in use.

    Often, it is a combination of these two types of controls that provide the most robust approach to the implementation of an effectivecontrol environment. For example, whilst a number of technology-specific auditing controls can be implemented, unless a procedureexists for reviewing and acting upon the logged information, the technical control is ineffective.

    To complete a comprehensive general security controls, in addition to the MBSS document, the operations team will require anunderstanding of the following platform independent areas:

    Uninor Information security policy and procedures; Change and Problem Management; Incident Management; System Development; Disaster Recovery and Contingency Planning; and Physical Security.

  • 7/22/2019 Nsn Bss Mbss

    7/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 7

    Control CategoriesThe following control categories are included in the MBSS document.

    Control Category 1: User Accounts and GroupsA control that restricts user access to the technology. This includes account permissions, sensitive systemuser interfaces, and related items.

    Control Category 2: Password ManagementA control that must be enabled/implemented to ensure true and authorized users to gain access on asystem. This includes password complexity, aging, account locking, etc. parameters.

    Control Category 3: Interface,Ports and ServicesA control that must be performed either manually or automated on a regular basis to disable or deleteunused ports and services and restrict services that transfer data in clear text.

    Control Category 4: System UpdatesA control that must be performed either manually or automated on a regular basis. This includes anyprocedure that a security administrator or system administrator would continually or periodicallyperform such as installation of hot fixes, security patches, etc.

    Control Category 5: File Access ControlA control that restricts access to critical configuration files, operating systems, etc.

    Control Category 6: Audit logging and MonitoringAny control that logs user, administrative or system activity. Any control that assists in, or performs,system event logging or the monitoring of the security of the system.

    Control Category 7: Node properties and feature configurations-A control that must be enabled/implemented via a system-level parameter, or upon installation of thenode/device that affects the technology at an overall system level. This includes network servicesenabling/disabling, boot sequence parameters, system interface, etc.

  • 7/22/2019 Nsn Bss Mbss

    8/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 8

    Detailed security controls:

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    1. User Accounts and Groups

    1.1 UniqueUser ID

    Individual usersshould be assignedwith a separateuser-id for BSCauthentication inaccordance withUninor Security

    policy.

    The audit trail is of limited orno use if there are sharedaccounts. The use of individualaccounts creates accountabilityfor each individual.

    Assign unique IDs for all usershaving access to the system

    Implemented.All users haveunique user id.

    1.2 Privilegedaccounts

    User IDs whichdisclose theprivilegesassociated with it,should not becreated.(For e.g.ADMINISTRATOR,monitor, config,etc.)

    Knowing the name of anaccount on a machine can bevaluable information to anattacker. Enforcing this securitycontrol makes it more difficultfor unauthorized users to guessand gain access to the accountssuch as ADMINISTRATOR,monitor, config, etc. andultimately the system.

    Delete all the privileged IDs fromthe system and review the systemID periodically.Instead, another user accountwith equal administratorprivileges to be created so thatADMINISTRATOR, etc useraccount can be deleted.

    Implemented

    1.3 Account

    expiry

    Third party user

    accounts created toaccess the BSCmust have anassociated expirydate.

    Attributing expiry date to a

    third party user account withrespect to the duration of theservice contract will ensureautomatic disabling of suchaccounts and hence strengthenthe user access management.

    Identify and review third party

    user ID created on system.Keep documented evidence in aseparate file for the expiry date ofthird party user ID withadministrator.

    Implemented

    (same is validatedby Uninorpasswordauthorizationform)

  • 7/22/2019 Nsn Bss Mbss

    9/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 9

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    1.4 Default

    Accounts

    Factory default user

    accounts and guestuser accounts onBSCs such asROOT, SYS,ericsson, zte, etc.must be removedfrom the systems.

    Disabling the factory default

    user accounts will preventunknown users beingauthenticated as ericsson, zte,SYS, etc. Disabling theseaccounts will reduce thesystem's remoteunauthenticated attack surfaceand ensure that only specificsecurity principals can accessresources on the system.

    Delete all the privileged IDs from

    the system and review the systemID periodically.In case any of the factory accountis required then a different useraccount with equal privileges canbe created so that factory defaultaccounts can be deleted.

    Implemented

    (some of theprofile in NSNsystem cannot beremoved due tosystem limitationas those are fix forOSS usage andcritical for KPIs ).Exceptions to beapproved byUninor IS team.

    1.5 Dormant

    Accounts

    Dormant user

    accounts should bedeactivated afterthe number of daysthat is specified inthe UninorInformationSecurity Policyguidelines forinactive accounts.

    Dormant user accounts increase

    the risk that unauthorized userscould potentially use theseaccounts to gain access to thesystem.

    Delete all the system/default IDs

    from the system and review thesystem ID periodically.

    Implemented,

    validation, signoffis done quarterly.

    1.6 Log ONerrormessage

    System errormessage should notdisclose any detailson logon failures.

    Logon failure message may actas a source of information foran unauthorized user to accessthe system. Information such asinvalid user ID or invalidpassword would help anunauthorized user tounderstand his mistakes whileaccessing the system. Logon

    Configure logon banner on thesystem

    Incorrect loginshows: userauthorizationfailure and afterthree consecutivefailure time delay isapplicable.

  • 7/22/2019 Nsn Bss Mbss

    10/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 10

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    failure messages may further let

    an attacker to guess the invalidinput.

    1.7 Passwordprompt

    Unattendedterminals mustautomatically blankthe screen andsuspend the sessionafter the amount oftime specified in theUninor InformationSecurity Policy. Re-establishment of

    the session musttake place only afterthe user hasprovided a validpassword.

    Unattended workstations whereusers have left themselveslogged in present a specialattraction for vandals. A vandalcan access the person's fileswith impunity. Alternatively,the vandal can use the person'saccount as a starting point forlaunching an attack against thesystem or the entire network:

    any tracing of the attack willusually point fingers backtoward the account's owner, notto the vandal.

    This control can be mitigated byusing windows screensaverlockout feature on localworkstations.

    NSN system hasauto logout after 15minute; Localworkstationwindow screensaver lockout isalso activated.

    2. Password Management

    2.1 Complexity

    BSC should enforcethat passwordsmust meet thecomplexityrequirements inaccordance toUninor informationsecurity policy.

    Enforcing password complexityrequirements reduces theprobability of an attackerdetermining a valid credential.Easily derived passwordsundermine system security bymaking user account easy toaccess. Once an intruder gainsaccess to a user account, theycan modify or delete files or

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    11/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 11

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    processes owned by that user.

    2.2 Defaultpasswords

    Default temporarypasswords assignedto the users must bechanged after firstlogin.

    Requiring new users to changetheir password upon first loginensures that the temporarypassword (recorded in written)will not be in use. Additionally,by having users create their ownpasswords the chance of them

    remembering their password issignificantly increased.

    Implemented

    2.3 PasswordAge

    Password should bechanged regularlyin accordance withthe UninorInformationSecurity Policy.

    A passwords lifetime should beshort enough to reduce the riskthat the passwords will becompromised and long enoughthat users will not need to keepa written record of thepassword. The risk thatpasswords will be compromisedis reduced by frequentlychanging the password of all the

    user accounts created to accessthe BSC.

    Strong Password shall --Be at least 10 characters inlength-Contain both upper andlowercase alphabetic characters(e.g. A-Z, a-z)-Have at least one numericalcharacter (e.g. 0-9)-Have at least one specialcharacter (e.g. ~! @#$%^&*()_-

    +=)

    -Last three passwords will not beused again.-Dates of birth, names of familymembers, and other

    Implemented.

  • 7/22/2019 Nsn Bss Mbss

    12/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 12

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    combinations of such personal

    details which can be connected tothe individual or can be easily beguessed should not be used.-Words found in dictionariesshould not be used.

    2.4 AccountLock

    The account lockoutfeature, disablingan account after anumber of failedlogin attempts,should be enabled

    and the relatedparameters shouldbe set in accordancewith the Uninorsecurity policy andguidelines.

    Unauthorized users may gainaccess to a system by running aprogram which guesses userpasswords through brute forceattacks. Without the lockoutfeature enabled the chance of

    successful compromise ofsystem resources through bruteforce password guessing attacksincreases.

    Account lock outfunctionality is notavailable in NSNsystem, but timeduration delay fornext attempt keep

    increasing afterthree consecutivefailed login.

    2.5 Systempasswordstorage

    The Administrativepassword should beprotected using anencryptionalgorithm inaccordance withUninor Securitypolicy. Encrypt theadministrativepassword usinghashing algorithmssuch as MD5

    Administrator account isprivileged with highest accessrights. Availability ofAdministrator's password inclear text from systemconfiguration files would let anunauthorized user gain theaccess of Administratoraccount. Impersonification ofAdministrator can be avoidedby encrypting the Administratorpassword.

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    13/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 13

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    2.6 Default

    Passwords

    Default passwords

    on the BSC shouldbe changed uponinstallation. Inaddition thesepasswords shouldbe complex andconform to UninorSecurity Policy.

    Application default passwords

    are widely known and typicallyinitial targets for attacks. Therisk that unauthorized accesswill be obtained is increased ifthese passwords are notchanged.

    Implemented

    3. Interfaces, Ports and Services

    3.1 Physicalinterfaces

    Disable consolelogin used to accessphysically at BSCSite. Only ethernetport should beallowed.

    If this type of control is notimplemented then anunauthorized user may get anopportunity to login physicallyon the BSC.

    Console login to be restricted tominimum (for emergency useonly).

    Implemented.Allowed foremergency casesonly.

    3.2 Abis-interface

    BSC should containthe configuration(DPC, Signalinglinks, TGs) for onlyauthorized BTS's inthe network.

    In absence of this enforcement,an unused BTS configuration onthe BSC can lead to misuse ofnetwork such as DoS attacks,flooding, etc. on the BSC.

    Ensure that BSC contain theconfiguration for only approvedand authorized DPC, Signallinglinks and TGs.Maintain an approval copy ofchange management form withadministrator.

    Implemented

    3.3 STP

    interface

    BSC should contain

    the configuration(point codes andsignaling links) forauthorized STPsonly in the network.

    In absence of this enforcement,

    an unused STP configuration onthe BSC can lead to misuse ofnetwork such as DoS attacks,flooding, etc. on the BSC.

    Ensure that BSC contain the

    configuration for only approvedand authorized Point codes andfor identified authorized STPs.Maintain an approval copy ofchange management form withadministrator.

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    14/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 14

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    3.4 MAP E

    interface

    BSC should contain

    the Trunk Groupsconfiguration foronly authorizedBSCs/GBSCs and LIsystems in thenetwork.

    In absence of this enforcement,

    an unused TG configuration onthe BSC can lead to misuse ofnetwork such as DoS attacks,flooding, etc. on the BSC.

    Ensure that BSC contain the

    configuration for only approvedand authorized TG for authorizedBSCs and GBSC or LI system.

    Maintain an approval copy ofchange management form withadministrator.

    Implemented

    3.5 O&Minterface

    BSC should restrictonly authorizedO&M devices. Nodemust be configuredto identify

    authorized devicesusing which O&Mactivities can beperformed.

    Enforcing this security controlwill ensure that only legitimateand authorized O&M terminalscan be used to access the BSC.

    Ensure that BSC is accessiblefrom only authorized O&Mdevices, Nodes

    Maintain an approval copy of

    change management form withadministrator.

    Implemented

    3.6 SystemServices

    Disableunauthorizedservices/daemonfrom the nodesbased on UninorInformationsecurity policy.Identify authorizedservices running onthe device viavulnerabilityassessment anddisableunauthorized

    Unauthorized services/daemonallows unauthenticated accessto a system and lets users totransfer files, manipulate withthe system functioning, etc. Asystem with services such as ftpenabled can be used as a depotfor the unauthorized transfer ofinformation. A system withTelnet service enabled can beused to run a spurious process(e.g.) in the system leading todead weight on processor load.

    Disable and replace FTP andtelnet by SFTP and SSHrespectively.

    System restriction:and FTP telnet isused for CDR,license, softwareloading.Exceptions to beapproved byUninor IS team.

  • 7/22/2019 Nsn Bss Mbss

    15/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 15

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    services. Only

    those services thatserve a documentedoperational orbusiness needshould be listeningon the node.

    4. System Updates

    4.1 Patchupgrade

    Upgrade thesystems firmware toa supported stableversionrecommended byOEM after propertesting has beenperformed.Follow OEMsfirmware upgradeprocedures for theBSC model beingupgraded. BSCmust be updatedwith the lateststable patches (bugfixes) specificallyrelated to security.

    Operating system securityvulnerabilities are found on aregular basis. These securityholes may pose a significant riskto the internal network.Enforcing this security controlwill help ensure the systemalways has the most recentcritical operating systemupdates and service packsinstalled.

    No such patchesrequired for NSNsystem, time totime networkrelated update arebeing implemented

  • 7/22/2019 Nsn Bss Mbss

    16/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 16

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    4.2 Antivirus Windows based

    servers/clients andO&M terminalswhich are used tomanage BSC nodesshall be installedwith latest Antivirussoftware and mustregularly beupdated.

    Enabling this feature will let the

    systems being prevented by theexecution of unauthorized codessuch as viruses and Trojanhorses.

    Deploy updated antivirus on the

    node used to access BSC

    Implemented(activ

    ity is done byUninor IT team)

    5. File Access Control

    5.1 Restrictfile access

    Accesses(Read/Write/Modify) to sensitive BSCsystem andconfiguration filesshould be restrictedfrom unauthorizedpersonnel.

    An unrestricted access may letthe unauthorized users tomodify/delete the sensitivesystem and configuration fileswhich may further lead to anunstable performance of theBSC.

    Limit access to such configurationfiles to admin level users only.

    Implemented.No such files areavailable in NSNsystemconfiguration. It isstored in Systemspecific data fileand cannot bedecoded.

    5.2 Restrictfile access

    Configurationbackup serverscontaining BSCconfiguration files

    such as M2000should be properlyrestricted fromunauthorizedpersonnel. Reviewthe security and

    An unrestricted access to thebackup servers may let theunauthorized users to gain thecritical information from

    configuration files which maybe further used to gain anunauthorized access to the BSC,impersonify the BSC, etc.

    Limit access to such backup filesto admin level users only.

    Implemented.OSS is accessiblevia restricted usersonly

  • 7/22/2019 Nsn Bss Mbss

    17/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 17

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    access requirements

    in accordance withthe Uninorinformationsecurity policy.

    5.3 Legalnoticebanner

    A legal notice andwarning should beimplemented inorder to provideadequate protectionand awareness oflegal issues.Configure Uninor

    authorized loginbanner on the BSCas specified in theUninor InformationSecurity Policy.

    Displaying a legal warningensures that users are aware ofthe consequences ofunauthorized access and assistsin conveying the protection ofcorporate assets.

    No such banner isavailable in NSNsystem.Uninor IS team totake up with NSN.

    6. Audit Logging and Monitoring

    6.1 Auditlogging

    Enable systemlogging inaccordance withUninor InformationSecurity Policy tocapture O&Mactivities, systemfailures, policyviolation,unauthorized accessattempts, system

    Enforcing audit logging allowssecurity incidents to be detectedand enough evidence to beavailable for analysis of thoseincidents.Insufficient logging will resultin a lack of an audit trail in theevent of an unauthorized access.With good logging andmonitoring, administrators areoften given early warnings for

    Enable recording audit logs forO&M activities, system failures,unauthorized access attempts,etc.

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    18/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 18

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    events, faults, etc. hardware and software errors or

    problems.6.2 Command

    loggingSecurityconfiguration filechanges should bemonitored andlogged inaccordance withUninor informationsecurity policy.Sensitive files suchas configurationparameters and

    audit logs shouldnot be allowed formodification ordeletion.

    Any authorized/unauthorizedor known/unknown access tocritical commands used tochange either the database orthe configuration parametersshould be logged so that none ofthe access to these sensitive filesgoes unnoticed. It also ensuresthat all the evidences areavailable for reverse trackingthe source of change. Rolling

    back from unstable network dueto improper command fire ispossible.

    Command logs arestored at specificlocation

    6.3 LogsArchive

    Archive all securityrelevant logs for aperiod stipulated asper applicable lawsand regulations.The activity logsneeds to be retainedonline for 12

    months and offlinefor 24 months.

    Having all audit logs archivedensures that if they are neededthey will be available. At thesame time it ensurescompliance with therequirements of the regulator.

    System restriction :all activity logs arestored at specificUninor IT server

  • 7/22/2019 Nsn Bss Mbss

    19/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 19

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    6.4 Monitorin

    g

    BSC shutdown and

    restarts should bemonitored. Anyunauthorizedshutdown and/orunexpected restartsshould beinvestigated.

    The BSC should be rebooted

    only by authorized personnel atscheduled times and when userscan be properly notified.Unplanned or unscheduledsystem rebooting will denyusers access to the system andcould allow unauthorized usersaccess to the system.

    Keep records of reasons for BSC

    shutdown, reboot or restart withthe administrator

    Implemented :

    RCA for anyunplanned restartis available

    6.5 Softwareupdateslogs

    Maintain all thesoftware and patchupdates logs sinceinception.

    Any changes to the systemsfirmware needs to be logged toensure availability of completelist of changes made to the

    firmware. Also this audit loghelps identify any unknown andunauthorized change made tothe system.

    Implemented :anexcel sheet ismaintained forrecords

    7. BSC Properties and Features Configuration

    7.1 Encryption

    Cipher must beenabled to ensurethat the signalingand user datacannot beoverheard on theradio interfaces

    Cipher is used to ensure theconfidentiality of data, thussensitive signaling informationand data are protected againsteavesdropping attacks

    Implemented

    7.2 Cipheringwhilehandover

    Changing ofciphering algorithmshould not beallowed athandover.

    No change in cipheringalgorithm during handoverensures same level ofencryption during a call. If thetarget BTS is configured with

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    20/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 20

    SN ControlArea

    ControlDescription

    ControlObjective/Rationale

    Implementation Guidance MitigatingControl, Ifany

    ImplementationStatus

    lower level of ciphering

    algorithm (for e.g. A5/0) ascompared to the current servingBTS (for e.g. A5/1) then thiswould result in lowering theencryption level. To maintain asame level of encryption level,change of ciphering algorithmshould be prohibited athandover.

    7.3 Clock sync Clocksynchronization tobe configured using

    the Network TimeProtocol (NTP).

    Configuring NTP for clocksynchronization will ensure thatinternal clocks of all the telecom

    nodes in the network are insynchronization and provideCoordinated Universal Time(UTC) including scheduled leapsecond adjustments.

    Implemented

  • 7/22/2019 Nsn Bss Mbss

    21/21

    Node Name: BSS Minimum Baseline Security Standard

    _______________________________________________________________________________________________________

    Uninor Internal 21

    Author & Reviewer

    Created byInformation Security Team Reviewed byRohit VermaDate 13thJan 2013 Date 15thJan 2013

    Approvals

    Head - Operations HeadNOCDate Date

    Head - Managed Services Head - Information Security: Saurabh Agarwal

    Date Date 29th

    Jan 2013