ETSI GS NFV-SEC 006-2016 Network Functions Virtualisation (NFV) Security Guide Report on Security Aspects and Regulatory Concerns (V1 1 1)《网络功能虚拟化(NFV) 安全指南 关于安全方面和监管问题的报告(V1 1 1)》.pdf
《ETSI GS NFV-SEC 006-2016 Network Functions Virtualisation (NFV) Security Guide Report on Security Aspects and Regulatory Concerns (V1 1 1)《网络功能虚拟化(NFV) 安全指南 关于安全方面和监管问题的报告(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI GS NFV-SEC 006-2016 Network Functions Virtualisation (NFV) Security Guide Report on Security Aspects and Regulatory Concerns (V1 1 1)《网络功能虚拟化(NFV) 安全指南 关于安全方面和监管问题的报告(V1 1 1)》.pdf(29页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GS NFV-SEC 006 V1.1.1 (2016-04) Network Functions Virtualisation (NFV); Security Guide; Report on Security Aspects and Regulatory Concerns Disclaimer The present document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and re
2、presents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS NFV-SEC 006 V1.1.1 (2016-04)2 Reference DGS/NFV-SEC006 Keywords NFV, regulation, security ETSI 650 Route des Lucioles F-06921
3、Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search Th
4、e present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such
5、 versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on
6、the current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notificati
7、on No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and t
8、he foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered f
9、or the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS NFV-SEC 006 V1.1.1 (2016-04)3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g31 Scope 6g32 Reference
10、s 6g32.1 Normative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 7g34 Security design guide . 8g34.1 Overview and introduction . 8g34.2 Risk, risk analysis, and risk management . 9g34.3 Design for assurance 10g34.4 Secure by
11、 default 12g34.5 Domain of Attack model 12g34.6 Regulatory and conformance issues . 13g34.7 Interoperability considerations . 13g34.7.1 Syntactic interoperability 13g34.7.2 Semantic interoperability 13g34.7.3 Electrical and mechanical interoperability 14g34.7.4 Radio communication interoperability 1
12、4g3Annex A (informative): Pro forma of Security and Regulatory Concerns for use in ETSI ISG NFV GSs . 15g3A.1 Risk analysis and assessment . 15g3A.2 Countermeasure deployment 16g3A.2.1 Identity management 16g3A.2.2 Integrity protection and verification . 16g3A.2.3 Confidentiality 16g3A.2.4 Availabil
13、ity and resilience 16g3A.2.5 Trust framework . 16g3A.3 Regulatory conformance 17g3A.3.0 Introduction 17g3A.3.1 Data protection and Privacy . 17g3A.3.2 Retention of Data 22g3A.3.3 Lawful Interception 22g3A.3.4 Export control of cryptographic material . 22g3A.3.5 Others . 23g3Annex B (informative): Su
14、mmary of attack vectors as applied in NFV 24g3B.1 Interception attacks. 24g3B.2 Manipulation attacks 24g3B.3 Identity based attacks . 24g3Annex C (informative): Cryptographic measures for NFV protection . 25g3C.1 Cardinality of relationships 25g3C.2 Algorithm selection and key size . 25g3Annex D (in
15、formative): Bibliography . 27g3ETSI ETSI GS NFV-SEC 006 V1.1.1 (2016-04)4 Annex E (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:
16、/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essenti
17、al to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“,
18、 “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GS NFV-SEC 006 V1.1.1 (2016-04)6 1 Scope The pres
19、ent document is a guide to developers of NFV related documents and applications in means to address the security aspects and regulatory concerns as they impact the security of deployed networks that conform with these documents and applications. The present document contains detailed descriptions of
20、 security concerns, attacks, as well as an overview of regulatory concerns and how they can be treated in system design to give the highest level of assurance that the resultant system is secure and complies with current regulation and best practice. The present document is intended for use by devel
21、opers of NFV documents and the guidance is given in a manner that assists non-experts in security and regulation to prepare such documents. In addition to the guidance and explanatory text the present document contains, in annex A, a pro forma template for use in ETSI ISG NFV documents to capture th
22、e security concerns and mitigations that apply. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the
23、latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of pub
24、lication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSNFVSEC0062016NETWORKFUNCTIONSVIRTUALISATIONNFVSECURITYGUIDEREPORTONSECURITYASPECTSANDREGULATORYCONCERNSV111

链接地址:http://www.mydoc123.com/p-733380.html