ETSI GS NFV-SEC 003-2014 Network Functions Virtualisation (NFV) NFV Security Security and Trust Guidance (V1 1 1)《网络虚拟化技术 (NFV) NFV安全性 安全和信任指南 (V1 1 1)》.pdf
《ETSI GS NFV-SEC 003-2014 Network Functions Virtualisation (NFV) NFV Security Security and Trust Guidance (V1 1 1)《网络虚拟化技术 (NFV) NFV安全性 安全和信任指南 (V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI GS NFV-SEC 003-2014 Network Functions Virtualisation (NFV) NFV Security Security and Trust Guidance (V1 1 1)《网络虚拟化技术 (NFV) NFV安全性 安全和信任指南 (V1 1 1)》.pdf(57页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GS NFV-SEC 003 V1.1.1 (2014-12) Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance Disclaimer This document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and represents the views of those memb
2、ers who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS NFV-SEC 003 V1.1.1 (2014-12)2Reference DGS/NFV-SEC003 Keywords NFV, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 9
3、2 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document may be made available in electronic version
4、s and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
5、 print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is availab
6、le at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic
7、 or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommu
8、nications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and t
9、he GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS NFV-SEC 003 V1.1.1 (2014-12)3Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g31 Scope 7g32 References 7g32.1 Normative references . 7g32.2 Informative references 7g33 Abbreviations
10、. 7g34 Network Function Virtualisation Security 9g34.1 NFV High-Level Security Goals 9g34.2 NFV Security Use Case Summaries . 9g34.2.1 Intra-VNFSec: Security within Virtual Network Functions . 9g34.2.1.1 VNFC-Specific Security Use Cases 10g34.2.1.1.1 VNFC Creation 10g34.2.1.1.2 VNFC Deletion 10g34.2
11、.1.1.3 VNFC Configuration and Package Management 10g34.2.1.1.4 VNFCI Migration 11g34.2.1.1.5 VNFC Operational State Changes . 11g34.2.1.1.6 VNFC Topology Changes . 11g34.2.1.1.7 VNFC Scale-Up and Scale-Down . 11g34.2.1.1.8 VNFC Scale-In and Scale-Out 11g34.2.2 Infra-VNFSec: Security between Virtual
12、Network Functions 12g34.2.3 Extra-VNFSec: Security external to Virtual Network Functions 12g34.3 NFV External Operational Environment 13g34.3.1 External Physical Security Guidance 13g34.3.2 External Hardware Guidance 13g34.3.3 External Service Guidance 13g34.3.3.1 DNS. 13g34.3.3.2 IP Addressing, DHC
13、P and Routing . 13g34.3.3.3 Time Services and NTP 13g34.3.3.4 Geolocation . 13g34.3.3.5 Security Visibility and Testing 13g34.3.3.6 Certificate Authority . 14g34.3.3.7 Identity and Access Management . 14g34.3.4 External Policies, Processes and Practices Guidance . 14g34.3.4.1 Regulatory Compliance C
14、onsiderations for NFV . 14g34.3.4.2 Forensic Considerations for NFV . 14g34.3.4.3 Legal/Lawful Intercept Considerations for NFV 14g34.3.4.4 Considerations for NFV Analytics and Service Level Agreements (SLAs) . 14g34.4 NFV Security Management Lifecycle 15g34.4.1 NFV Threat Landscape . 15g34.4.1.1 Th
15、reat Vectors, Monitoring and Detection 16g34.4.2 NFV Platform Guidance . 16g34.4.2.1 Platform visibility and validation 16g34.4.2.1.1 Workload Visibility into Physical and Virtualised Resources . 16g34.4.2.1.2 Introspection 18g34.4.2.2 Access Visibility for Data and Control Packets in Virtualised En
16、vironment 18g34.4.2.3 Validation of Root of Trust and Chain of Trust 19g34.4.2.4 Services validation 19g34.4.3 Certificate, Credential and Key Management within NFV . 19g34.4.3.1 Certificate management 19g34.4.3.2 Credential Management 19g34.4.3.2.1 Dynamic Credential Management . 19g3ETSI ETSI GS N
17、FV-SEC 003 V1.1.1 (2014-12)44.4.3.2.2 Role of Identity, keys and certificates . 19g34.4.3.2.3 Credential Injection by hypervisor 20g34.4.3.3 Key Management 20g34.4.3.3.1 Key Management and security within cloned images . 20g34.4.3.3.2 Key Management and security within migrated images 21g34.4.3.3.3
18、Self-generation of key pairs . 21g34.4.4 Multiparty Administrative domains 21g34.4.4.1 Rational . 21g34.4.4.2 Administrative domains 21g34.4.4.3 Infrastructure Domain . 22g34.4.4.4 Tenant Domain 22g34.4.4.5 Implications. 22g34.4.4.6 Inter-Domain functional blocks and reference points . 23g34.4.4.6.1
19、 Network Service Orchestration . 23g34.4.4.6.2 Infrastructure Orchestration . 23g34.4.4.6.3 VNF-Specific Lifecycle Management . 23g34.4.4.6.4 Generic VNF Lifecycle Management 23g34.4.4.6.5 Inter-Orchestration (Os-Ma) 23g34.4.4.6.6 Inter-VNFM (Ve-Vnfm) 23g34.4.4.7 VNF Package and Image Management . 2
20、3g34.4.4.7.1 Integrity checks . 24g34.4.4.7.2 Trust checks. 24g34.4.4.8 VNFC Security Overview . 24g34.4.4.8.1 VNFC security scope. 24g34.4.4.9 VNFC Lifecycle Security - Statement of the problem 25g34.4.4.10 Security Approach . 26g34.4.5 VNF Instantiation . 27g34.4.5.1 Secured Boot . 27g34.4.5.2 VTP
21、M (Virtual Trusted Platform Module) . 28g34.4.5.3 Attestation . 28g34.4.5.4 Attribution . 28g34.4.5.5 Authenticity . 28g34.4.5.6 Authentication . 28g34.4.5.6.1 User/Tenant Authentication, Authorization and Accounting 28g34.4.5.7 Authorization 30g34.4.5.8 Interface Instantiation 30g34.4.5.9 Levels of
22、 assurance . 30g34.4.5.10 Logging, Reporting, Analytics and Metrics 30g34.4.6 VNF Operation . 31g34.4.6.1 Planned operational lifecycle events . 31g34.4.6.2 VNFC Lifecycle control and authorization . 31g34.4.6.3 Dynamic State Management . 32g34.4.6.3.1 Provision by trusted party - network . 32g34.4.
23、6.3.2 Provision by trusted party - storage . 32g34.4.6.4 Dynamic Integrity Management 32g34.4.6.4.1 Secured crash and recovery . 32g34.4.6.5 Application Programming Interfaces (APIs) . 32g34.4.7 VNF Retirement 32g34.4.7.1 License retirement . 33g34.4.7.2 Secured wipe . 33g34.5 NVF Security Technolog
24、ies . 33g34.5.1 Technologies and Processes 34g35 Trusted Network Function Virtualisation . 34g35.1 NFV High-Level Trust Goals . 34g35.1.1 Assigning trust 35g35.1.1.1 Why assign trust? 35g35.1.1.2 How to assign trust 35g35.1.2 Evaluating and validating trust . 36g35.1.2.1 Parameters for trust evaluat
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSNFVSEC0032014NETWORKFUNCTIONSVIRTUALISATIONNFVNFVSECURITYSECURITYANDTRUSTGUIDANCEV111 网络 虚拟 技术

链接地址:http://www.mydoc123.com/p-733377.html