Ensuring compliance with the specification
The technical basis for GSMA M2M Remote Provisioning for embedded UICC (eUICC) is described by GSMA SGP.01 and SGP.02. These technical specifications provide the necessary details to enable remote provisioning solution providers to develop GSMA compliant Remote Provisioning product, and Subscription Management services.
Aside from the specifications describing technical implementation, it is beneficial for a technology to have a commonly agreed means to recognise the compliance of developed products.
GSMA has developed such a compliance programme for M2M Remote Provisioning for eUICC. Its purpose is to describe the key test and accreditation expectations for eUICC and Subscription Management solutions that have been designed to SGP.01 and SGP.02.
Products that successfully fulfil the compliance requirements are eligible to purchase GSMA Digital Certificates, used to authenticate with other M2M remote provisioning system elements.
Compliance Process Overview
The GSMA M2M compliance process is SGP.16, and lists the following areas for compliance with the GSMA M2M specifications:
- Functional interoperability of all entities
- Security of provisioning entities
- By design (for eUICC)
- In production (for eUICC)
- At the operational location (for SM-DP and SM-SR)
The outcome of a successful compliance submission is eligibility for the Digital Certificate (PKI), needed for system authentication between the eUICC and M2M remote provisioning subscription management entities, SM-DP and SM-SR.
Demonstrating compliance
In order to benefit from industry best practice for certification, GSMA has worked with specific global certification bodies that are:
- Recognised in the eUICC industry for test and certification expertise in either functional interoperability or security,
- Accessible to all organisations planning to operate in the GSMA defined M2M remote provisioning environment.
The test and certification from these organisations, together with defined areas of vendor owned testing, form the basis for an M2M remote provisioning product to declare compliance with the M2M specifications.
Functional interoperability
GSMA has developed an M2M test specification, SGP.11. This provides test cases for each of the entities defined in the eUICC remote provisioning ecosystem, and for all test scenarios judged as key for a compliant product. Each test case references one or more requirements from the SGP.02 technical specification, with testing scopes covering:
- Interface interoperability
- System behaviour testing
For eUICC: The SGP.11 requirements applicable to eUICC have been integrated into the test & certification programme of GlobalPlatform.
- GlobalPlatform has developed an SGP.11 based M2M test plan and certification programme for functional interoperability testing.
- Embedded UICC wishing to declare SGP.16 compliance must first be GP qualified to the GlobalPlatform M2M test suite.
For SM-DP and SM-SR: In order to declare SGP.16 compliance, vendors are required to develop and execute their own SGP.11 based test plans.
- These vendor owned test plans will typically use either simulated testing via commercially available test equipment, or MNO based interoperability testing.
- Whichever methodology is selected the vendor owned test plan must reference the SM-DP and SM-SR test requirements from SGP.11.
Security of provisioning entities
Product Security by design
The security of the embedded UICC design is required to be assured on two levels:
At the hardware level: certification to BS-CC-PP-0084, or its predecessor, BS-CC-PP-0035. This is the industry recognised security IC Protection Profile.
At the embedded UICC functional level: BSI-CC-PP-0089. This is a protection profile developed specifically for the embedded UICC.
Methodologies and certification are available through Common Criteria laboratories and Certification Bodies with competence in the SOG-IS Smartcard technical domain.
Security in operation
GSMA’s long established, industry respected, Security Accreditation Scheme (SAS) has been adopted as the required security accreditation for M2M entities handling sensitive assets, and provisioning assets; including MNO profile information and Digital Certificates. SAS is an audit based scheme and the preparation time for audit should be taken into account when planning a compliance campaign for eUICC, SM-SR and SM-DP.
For eUICC production: a SAS-UP audit comprehensively reviews the handling of sensitive data during eUICC production. A valid GSMA SAS-UP accreditation is required in order to declare SGP.16 compliance.
For SM-DP and SM-SR operational location: a SAS-SM audit assesses the robustness of processes affecting secure data management at the Subscription Management datacentre. A valid GSMA SAS-SM accreditation is required in order to declare SGP.16 compliance.
Connecting to M2M remote provisioning
Assurance and authentication for operational M2M remote provisioning is based on a GSMA root public key interface (PKI), as defined in the M2M specifications. eUICC, SM-DP and SM-SR all need a PKI Digital Certificate to operate within GSMA M2M remote provisioning.
The end result of a successful SGP.16 compliance declaration is a GSMA confirmation for PKI issuance. This is accepted by the GSMA M2M CI as proof of eligibility for a Root PKI certificate. Details of the M2M Root CI can be found at this link.
Note:
- The PKI certificate will not be issued by the Root CI without proof of eligibility.
- Organisations intending to apply for a PKI certificate are advised to initiate contract discussions with the M2M Root CI in advance, in order to avoid delays once their compliance process is successfully completed.
- The CI is generally able to issue test certificates for test purposes, contact the CI for details.
Find out more
Download SGP.16, the eSIM Compliance Process. This GSMA PRD, and its associated annexes provides full details of compliance requirements and current valid specification versions for compliance. It also includes the declaration templates necessary to make a compliance declaration.
For further information or in case of any questions on the GSMA M2M compliance process, please contact [email protected]