• GS NFV-SEC 006 : 1.1.1

    Current The latest, up-to-date edition.

    NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS

    Available format(s): 

    Language(s): 

    Published date:  04-07-2016

    Publisher:  European Telecommunications Standards Institute

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Modal verbs terminology
    1 Scope
    2 References
    3 Definitions and abbreviations
    4 Security design guide
    Annex A (informative) - Pro forma of Security
            and Regulatory Concerns for use in
            ETSI ISG NFV GHs
    Annex B (informative) - Summary of attack vectors
            as applied in NFV
    Annex C (informative) - Cryptographic measures for
            NFV protection
    Annex D (informative) - Bibliography
    Annex E (informative) - Authors & contributors
    History

    Abstract - (Show below) - (Hide below)

    Includes detailed descriptions of security concerns, attacks, as well as an overview of regulatory concerns and how they can be treated in system design to give the highest level of assurance that the resultant system is secure and complies with current regulation and best practice.

    General Product Information - (Show below) - (Hide below)

    Committee NFV SEC
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    GR NFV-IFA 021 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; MANAGEMENT AND ORCHESTRATION; REPORT ON MANAGEMENT OF NFV-MANO AND AUTOMATED DEPLOYMENT OF EM AND OTHER OSS FUNCTIONS
    GS NFV-IFA 027 : 2.4.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 2; MANAGEMENT AND ORCHESTRATION; PERFORMANCE MEASUREMENTS SPECIFICATION
    GS NFV-SEC 014 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS
    GR NFV-IFA 022 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; MANAGEMENT AND ORCHESTRATION; REPORT ON MANAGEMENT AND CONNECTIVITY FOR MULTI-SITE SERVICES

    Standards Referencing This Book - (Show below) - (Hide below)

    GS NFV-SEC 010 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON RETAINED DATA PROBLEM STATEMENT AND REQUIREMENTS
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
    GS NFV-SEC 004 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; PRIVACY AND REGULATION; REPORT ON LAWFUL INTERCEPTION IMPLICATIONS
    TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    GS NFV-SEC 003 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; SECURITY AND TRUST GUIDANCE
    IEC 60906-2:2011 IEC system of plugs and socket-outlets for household and similar purposes - Part 2: Plugs and socket-outlets 15 A 125 V a.c. and 20 A 125 V a.c.
    2014/53/EU : 2014 COR 1 2015 DIRECTIVE 2014/53/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 16 APRIL 2014 ON THE HARMONISATION OF THE LAWS OF THE MEMBER STATES RELATING TO THE MAKING AVAILABLE ON THE MARKET OF RADIO EQUIPMENT AND REPEALING DIRECTIVE 1999/5/EC TEXT WITH EEA RELEVANCE
    765/2008 : 2008 COR 1 2015 REGULATION (EC) NO 765/2008 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 JULY 2008 SETTING OUT THE REQUIREMENTS FOR ACCREDITATION AND MARKET SURVEILLANCE RELATING TO THE MARKETING OF PRODUCTS AND REPEALING REGULATION (EEC) NO 339/1993 (TEXT WITH EEA RELEVANCE)
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
    TR 103 309 : 1.1.1 CYBER; SECURE BY DEFAULT - PLATFORM SECURITY TECHNOLOGY
    ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective