6.4 Security Requirements
Table10: Security Requirements
Requirement ID | Description | Release |
---|---|---|
SER-001 | The oneM2M System shall incorporate protection against threats to its availability such as Denial of Service attacks. | Partially Implemented in Rel-1 |
SER-002 | The oneM2M System shall be able to ensure the Confidentiality of data. | Implemented in Rel-1 |
SER-003 | The oneM2M System shall be able to ensure the Integrity of data. | Implemented in Rel-1 |
SER-004 | In case where the M2M Devices support USIM/UICC and the Underlying Networks support network layer security, the oneM2M System shall be able to leverage device's USIM/UICC credentials and network's security capability e.g. 3GPP GBA for establishing the M2M Services and M2M Applications level security through interfaces to Underlying Network. | Implemented in Rel-1 |
SER-005 | In case where the M2M Devices support USIM/UICC and the Underlying Networks support network layer security, and when the oneM2M System is aware of Underlying Network's bootstrapping capability e.g. 3GPP GBA, the oneM2M System shall be able to expose this capability to M2M Services and M2M Applications through API. | Implemented in Rel-1 |
SER-006 | In case where the M2M Devices support USIM/UICC and the Underlying Networks support network layer security, the oneM2M System shall be able to leverage device's USIM/UICC Credentials when available to bootstrap M2M Security Association. | Implemented in Rel-1 |
SER-007 | When some of the components of an M2M Solution are not available (e.g. WAN connection lost), the oneM2M System shall be able to support the Confidentiality and the Integrity of data between authorized components of the M2M Solution that are available. | Implemented in Rel-1 |
SER-008 | The oneM2M System shall support countermeasures against unauthorized access to M2M Services and M2M Application Services. | Implemented in Rel-1 |
SER-009 | The oneM2M System shall be able to support Mutual Authentication for interaction with Underlying Networks, M2M Services and M2M Application Services. | Implemented in Rel-1 |
SER-010 | The oneM2M System shall be able to support mechanisms for protection against misuse, cloning, substitution or theft of security credentials. | Implemented in Rel-1 |
SER-011 | The oneM2M System shall protect the use of the identity of an M2M Stakeholder within the oneM2M System against discovery and misuse by other stakeholders. | Implemented in Rel-1 |
SER-012 | The oneM2M System shall be able to support countermeasures against Impersonation attacks and replay attacks. | Partially implemented in Rel-1 (see note 3) |
SER-013 | The oneM2M System shall be able to provide the mechanism for integrity-checking on boot, periodically on run-time, and on software upgrades for software/hardware/firmware component(s) on M2M Device(s). | Not implemented |
SER-014 | The oneM2M System shall be able to provide configuration data to an authenticated and authorized M2M Application in the M2M Gateway/Device. | Implemented in Rel-1 |
SER-015 | The oneM2M System shall be able to support mechanisms to provide M2M Service Subscriber identity to authorized and authenticated M2M Applications when the oneM2M System has the M2M Service Subscriber's consent. | Partially implemented (see note 4) |
SER-016 | The oneM2M System shall be able to support non repudiation within the M2M service layer and in its authorized interactions with the network and application layers. | Implemented in Rel-1 |
SER-017 | The oneM2M System shall be able to mitigate threats identified in oneM2M TR0008 [i.3]. | Implemented in Rel-1 |
SER-018 | The oneM2M System shall enable an M2M Stakeholder to use a resource or service and be accountable for that use without exposing its identity to other stakeholders. | Partially implemented |
SER-019 | The oneM2M System shall be able to use service-level Credentials present inside the M2M Device for establishing the M2M Services and M2M Applications level security. | Implemented in Rel-1 |
SER-020 | The oneM2M System shall enable legitimate M2M Service Providers to provision their own Credentials into the M2M Devices/Gateways. | Implemented in Rel-1 (see note 5) |
SER-021 | The oneM2M System shall be able to remotely and securely provision M2M security Credentials in M2M Devices and/or M2M Gateways. | Implemented in Rel-1 (see note 5) |
SER-022 | The oneM2M System shall enable M2M Application Service Providers to authorize interactions involving their M2M Applications on supporting entities (e.g. Devices/ Gateways/ Service infrastructure). | Implemented in Rel-1 |
SER-023 | Where a Hardware Security Module (HSM) is supported, the oneM2M System shall be able to rely on the HSM to provide local security. | Partially implemented |
SER-024 | The oneM2M System shall enable M2M Applications to use different and segregated security environments. | Partially implemented |
SER-025 | The oneM2M System shall be able to prevent unauthorized M2M Stakeholders from identifying and/or observing the actions of other M2M Stakeholders in the oneM2M System, e.g. access to resources and services (see note 1). | Implemented in Rel-1 |
SER-026 | The oneM2M System shall be able to provide mechanism for the protection of Confidentiality of the geographical location information (see note 2). | Implemented in Rel-1 |
SER-027 See REQ-2015-0558R01 |
The M2M System shall support grouping of M2M Applications that have the same access control rights towards one specific resources, together so that access control validation can be performed by validating if the M2M Application is a member of certain group. | Implemented in Rel-2 |
SER-028 See REQ-2015-0568R04 |
The oneM2M System shall enable security protocol end-points to protect portions of individual application-generated data so that intermediate entities (whether trusted or untrusted) forwarding the data are unable to access the protected portions of the data in clear text. | Implemented in Rel-2 |
SER-029 See REQ-2015-0568R04 |
The oneM2M System shall enable security protocol end-points to protect portions of individual application-generated data so that security protocol end-points can detect modification, including modification by intermediate service layer entities (whether trusted or untrusted) forwarding the data. | Implemented in Rel-2 |
SER-030 | The oneM2M System shall enable security protocol end-points to protect portions of individual oneM2M messages so that intermediate entities (whether trusted or untrusted) forwarding the messages are unable to access the protected portions of the messages in clear text. | Implemented in Rel-2 |
SER-031 See REQ-2015-0569R03 |
The oneM2M System shall enable security protocol end-points to protect portions of individual oneM2M messages so that security protocol end-points can detect modification, including modification by intermediate service layer entities (whether trusted or untrusted) forwarding the messages. | Implemented in Rel-2 |
SER-032 See REQ-2015-0569R03 |
The oneM2M System shall enable security protocol end-points to establish security sessions which are used for protecting portions of one or more oneM2M messages so that intermediate entities (whether trusted or untrusted) forwarding the messages are unable to access the protected portions of the messages in clear text. | Implemented in Rel-2 |
SER-033 See REQ-2015-0569R03 |
The oneM2M System shall enable security protocol end-points to establish security sessions which are used for protecting portions of one or more oneM2M messages so that security protocol end-points can detect modification, including modification by intermediate service layer entities (whether trusted or untrusted) forwarding the messages. | Implemented in Rel-2 |
SER-034 See REQ-2015-0575R01 |
The oneM2M System shall enable security protocol end-points to protect portions of messages or data so that intermediate entities (whether trusted or untrusted) forwarding the messages or data are unable to access the protected portions of messages or data in clear text. | Partially Implemented |
SER-035 See REQ-2015-0575R01 |
The oneM2M System shall enable security protocol end-points to protect portions of messages or data so that security protocol end-points can detect modification, including modification by intermediate service layer entities (whether trusted or untrusted) forwarding the messages or data. | Partially Implemented |
SER-036 See REQ-2015-0575R01 |
The oneM2M System shall enable security protocol end-points to authenticate each other without relying on intermediate service layer entities (whether trusted or untrusted). | Implemented in Rel-2 |
SER-037 See SEC-2015-0515R02 |
The oneM2M System shall be able to support distributed authorization functions for making access control decisions, providing Access Control Policies and providing authorization attributes (e.g. roles). | Partially Implemented |
SER-038 See SEC-2015-0515R02 |
The oneM2M System shall be able to expose an interoperable interface to provide Access Control Policies by means of specified access control policy language. | Not implemented |
SER-039 See SEC-2015-0515R02 |
The oneM2M System shall enable individuals to establish policies for controlling access to their personal identifiable information even when it may have been collected without their knowledge. | Implemented in Rel-2 |
SER-040 See SEC-2015-0517R05 |
When the M2M Devices are grouped and the M2M Gateway is authorized as the delegate of the group to access the M2M Server, the M2M Gateway shall be able to, perform Mutual Authentication with the M2M Server, on behalf of the M2M Devices in thegroup | Not Implemented |
SER-041 See SEC-2015-0517R05 |
When the M2M Devices are grouped and the M2M Gateway belongs to a third party, oneM2M System shall be able to protect Security and Privacy of communication between individual M2M Device and M2M Server from other M2M devices and the third party M2M Gateway. | Implemented in Rel-2 |
SER-042 See SEC-2015-0522R02 |
A secured API shall enable application and service layer entities to make use of sensitive functions and data residing within the Secure Environment, independently of the technical implementation of the Secure Environment. | Not Implemented |
SER-043 See REQ-2015-0590R01 |
The oneM2M System shall enable authorizing a oneM2M entity to temporarily delegate its access rights (or a subset thereof) to another authorized oneM2M entity, wherein the dynamically delegated access rights shall not enable the "delegated-to" oneM2M entity to delegate the same rights in turn to a third oneM2M entity. | Not Implemented |
SER-044 See REQ-2015-0591R04 |
For M2M Application Service data, that are processed by an M2M Application B in a M2M entity (e.g. M2M Gateway) on its path from an originator A to the recipient M2M Application C, the oneM2M System shall provide means that enable the recipient to verify both: integrity of the data received by the M2M Application B from the originator A; and, at the same time: that the M2M Application B that has processed the data has not been compromised. |
Not Implemented |
SER-045 See REQ-2015-0604R02 |
The oneM2M System shall support classification of application data by M2M Applications into various security levels that are specified by oneM2M and support the mapping of these levels to applicable security capabilities. | Not Implemented |
SER-046 See REQ-2015-0605R04 |
The oneM2M System shall enable to protect portions of individual application generated data that is at-rest (e.g. hosted data) for integrity protection and data creator Authentication. | Implemented in Rel-2 |
SER-047 See REQ-2015-0605R04 |
The oneM2M System shall enable to protect portions of individual application data at-rest (e.g. hosted data) for confidentiality protection. | Implemented in Rel-2 |
SER-048 See REQ-2015-0605R04 |
The oneM2M System shall ensure that the end-to-end data Credentials are protected for Confidentiality, integrity and against tampering. | Implemented in Rel-2 |
SER-049 See REQ-2015-0605R04 |
The oneM2M System shall ensure that the end-to-end data Credentials are protected from exposure to intermediate entities. | Implemented in Rel-2 |
SER-050 See REQ-2015-0620 |
The oneM2M System shall enable pre-defined conditions to be protected from unauthorized modification. | Implemented in Rel-2 |
SER-051 See REQ-2015-0620 |
The oneM2M System shall enable the deletion of M2M data produced/stored by the M2M Devices/Gateways based on request from an authorized entity. | Implemented in Rel-2 |
SER-052 See REQ-2015-0621R01 |
The oneM2M System shall store and process privacy preferences in an interoperable manner. | Implemented in Rel-2 |
SER-053 See REQ-2015-0621R01 |
The oneM2M System shall support privacy profiles at various levels to care for conditions of legal requirements, manufacturers, and data subjects. | Implemented in Rel-2 |
SER-054 See REQ-2015-0621R01 |
The oneM2M System shall be able to prioritize privacy profiles where there is a conflict between profiles (legal profile takes priority over data subject profile, for example). | Implemented in Rel-2 |
SER-055 See REQ-2015-0623R01 |
The oneM2M System shall be able to support configuration of security related settings of its infrastructure side components by a privileged user through standardized API. | Not implemented |
SER-056 See REQ-2015-0623R01 |
The oneM2M System shall allow overriding of security settings by a privileged User through standardized API. | Not implemented |
SER-057 See REQ-2015-0623R01 |
The oneM2M System shall support a mechanism enabling addition/deletion of information enabling authentication of oneM2M entities through standardized API. | Not implemented |
SER-058 See REQ-2015-0627R02 |
The oneM2M System shall enable delegation of security functions (e.g. message authentication/integrity protection) of an entity to a trust-worthy entity. | Implemented in Rel-2 |
SER-059 See REQ-2015-0628R01 |
The oneM2M System shall protect the authenticity, Integrity, and Confidentiality of the representation of the delegated access rights. | Implemented in Rel-2 |
SER-060 See REQ-2015-0628R01 |
The oneM2M System shall be able to revoke the representation of the delegated access rights. | Implemented in Rel-2 |
SER-061 See 0585R01- App-ID Requirements |
The oneM2M System shall be able to verify the App-ID to support the detection of impersonation or to support revocation. | Not implemented |
SER-062 See REQ-2016-0056R01 |
The oneM2M System shall be able to reuse the privacy policy of the Underlying Network. | Not implemented |
SER-063 See REQ-2016-0056R01 |
The oneM2M System shall be able to share its privacy policy with the Underlying Network. | Not implemented |
SER-064 See REQ-2017-0005R03 |
The M2M Devices shall provide a mechanism to prevent installation or modification of the software/middleware/firmware which run on the M2M Devices, unless it is authorized by an allowed stakeholder. | Implemented in Release 3? |
SER-065 See REQ-2017-0005R03 |
The oneM2M System shall be able to detect installation or modification of the software/middleware/firmware of M2M Devices that has not been authorized by an allowed stakeholder. | Implemented in Release 3? |
SER-066 See REQ-2017-0005R03 |
The oneM2M System shall enable allowed stakeholders to restrict or prevent operation of M2M devices using software/middleware/firmware that the stakeholders did not authorize. | Implemented in Release 3? |
SER-067 See REQ-2017-0005R03 |
The oneM2M System shall be able to prevent malfunction of M2M Devices caused by receiving unsolicited messages or information. | Implemented in Release 3? |
SER-068 See REQ-2017-0030R05 |
The information exchanged within the oneM2M System shall use cryptographic technology to ensure information authentication and information integrity. | Implemented in Rel-2 |
SER-069 See REQ-2017-0030R05 |
The oneM2M System shall be able to securely transfer information by using an appropriate method such as digital signature. | Implemented in Rel-2 |
SER-070 See REQ-2017-0030R05 |
The oneM2M System shall be able to support security mechanisms to protect cryptographic keys and cryptographic operations by using tamper resistant elements such as TPM (Trusted Platform Module), HSM (Hardware Security Module) and SIM (Subscriber Identity Module). | Partially Implemented Note 7 |
SER-071 See REQ-2017-0030R05 |
The oneM2M System shall be able to support processing and granting of requests based on access rights of a resource if the required conditions are met | Implemented in Rel-1 |
SER-072 See REQ-2017-0030R05 |
The oneM2M System shall provide privacy protection mechanisms at the central server. | Implemented in Rel-2 |
SER-073 See REQ-2017-0031R05 |
The oneM2M system shall be able to support authentication using device key and the integrity check ofM2M Device(s). | Rel-3? |
SER-074 See REQ-2017-0031R05 |
The oneM2M system shall be able to support anonymization of the t information being provided, when requested by M2M Applications.. | Rel-3/ future releases? |
SER-075 See REQ-2017-0031R05 |
The oneM2M System shall apply appropriate security levels for Applications that can have safety impacts (e.g. protection from malicious attacks) | Rel-3/ future releases? |
SER-076 See REQ-2018-0001 |
The oneM2M System shall be able to provide a framework for end-to-end authentication of user applications to the M2M vendor's specific nodes (non oneM2M). | |
SER-077 See REQ-2018-0021R03 |
The oneM2M System shall be able to authenticate metadata (e.g. Firmware version, Manufacturer ID, HW version) from field devices (e.g. located behind a gateway). | |
SER-078 See REQ-2018-0021R03 |
The oneM2M System shall be able to trigger the secure (e.g. authenticity, integrity, and confidentiality protected) Firmware/Software update of field devices. | |
SER-079 See ARC-2018-0062 |
The oneM2M System shall support access control and authorization mechanisms based on M2M Service Subscriber and M2M Service User identification. | Rel-4 |
SER-080 See ARC-2018-0062 |
The oneM2M System shall support M2M Service Subscriber and M2M Service User profiles specifying their restrictions (e.g. privacy restrictions, max number and/or types of applications and devices the M2M Service Subscriber and its authorized M2M Service Users are allowed to register to the M2M System, the maximum number of resources or bytes of data that the M2M Service Subscriber can store in the M2M System, etc.) and their default configurations (e.g. access control policies, expiration times, max number of content instances, etc.). | Rel-4 |
SER-081 See ARC--2018-0062 |
The oneM2M System shall support access control and authorization mechanisms based on M2M Service Subscriber and M2M Service User identification. | |
SER-082 See ARC--2018-0062 |
The oneM2M System shall support M2M Service Subscriber and M2M Service User profiles specifying their restrictions (e.g. privacy restrictions, max number and/or types of applications and devices the M2M Service Subscriber and its authorized M2M Service Users are allowed to register to the M2M System, the maximum number of resources or bytes of data that the M2M Service Subscriber can store in the M2M System, etc.) and their default configurations (e.g. access control policies, expiration times, max number of content instances, etc.). | |
SER-083 See RDM-2019-0054R01 |
The oneM2M System shall support access control and authorization mechanisms for the M2M Service Subscriber or M2M Service User information, based on dynamic parameters (e.g. on/off duty time schedule, location, role or job position etc.). | Rel-4 |
SER-084 See RDM-2019-0054R01 |
The oneM2M System shall be able to access M2M Service Subscriber information or M2M Service User information based on dynamic parameters (e.g. on/off duty time schedule, location, role or job position, etc.) from M2M Applications. | Rel-4 |
NOTE 1: The above requirement does not cover items outside of the oneM2M System, e.g. Underlying Networks.
NOTE 2: Geographical location information can be more than simply longitude and latitude.
NOTE 3: Partly supported for Impersonation attacks not supported for Replay attacks.
NOTE 4: The oneM2M System has no means to verify a subscriber's consent. This requirement is only fulfillable at application level.
NOTE 5: Regarding remote provisioning, Release 1 supports remote provisioning of symmetric key credentials only.
NOTE6: An M2M device may include e.g. firmware managed by an OEM vendor, middleware managed by a service provider and software managed by an application provider. The entity managing a software piece is designed as "allowed stakeholder" in the requirements above.
NOTE 7: Support for SIM is supported in Release 1 and Release 2.