____________________
building your eSIM RSP Service
in 3 steps
__________
Step #1
Infrastructure
By closely collaborating with you we develop a deep comprehension of your underlying business drivers, which we see as an essential condition for long-term success.
Whether on premises or cloud, based on your preferences and requirements we jointly scope the solution to minimise Total-Cost-of-Ownership while meeting your business needs.
A central component of the solution is the Hardware Security Module (HSM) for key storage and crypto operations. With our industry network we can support you to select the right solution that perfectly fits your business objectives.
From the very beginning our experts will take the specific requirements of the mandated SAS-SM security audit into account to make your certification process as efficient as possible and shorten time to go-live.
Step #2
Implementation
With the infrastructure in place, we deploy and configure the eSIM Management solution to work seamlessly with your selected systems.
The staging system is a vital element during this phase as well as later during service operation because it remains accessible from outside your High Security Area (HSA) in contrast to the final production system.
If the solution encompasses M2M SGP.02 components, additional integrations may be required, for example with SMS-C and external SM-SR or SM-DP.
Another important element of the solution is the MNO profile containing network and subscriber specific information for the eSIM download.
We can support you with the development of the profile template as well as data generation processes as part of the agreed project scope.
Step #3
Security Audit
Certification of the eSIM Management service in compliance with SAS-SM (Security Accreditation Scheme for Subscription Management) is a mandatory step when you are hosting the service. It is a substantial task and can be complex if your organisation is not familiar with the specifics of Security Audit procedures and documentation requirements.
As digital security experts we have extensive experience in security audits and can help you along the way to be appropriately prepared when it comes to the audit. The audit covers all processes of GSMA specified components (SM-SR, SM-DP/DP+, SM-DS) with each component involving specific assets that must be protected.
You have to meet certain requirements to consider processes as being secure, covering the following areas:
- Policy, strategy, and documentation
- Organisation and responsibility
- Information
- Personnel security
- Physical security
- Certificate and key management
- Sensitive process data management
- SM-DP, SM-SR, SM-DP+, and SM-DS service management
- Computer and network management
Once you have passed the audit the different system certificates can be ordered from the GSMA CI partner and subsequently be installed - your eSIM Management system is ready for live operation.