Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

GS NFV-SEC 014 : 3.1.1

Current

Current

The latest, up-to-date edition.

NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS

Published date

13-05-2018

Sorry this product is not available in your region.

Intellectual Property Rights
Foreword
Modal verbs terminology
1 Scope
2 References
3 Definitions and abbreviations
4 NFV-MANO Functional Blocks and Reference points
5 Security Threats and Requirements
6 Summary of Security Requirements
Annex A (informative) - Authors & contributors
Annex B (informative) - Bibliography
Annex C (informative) - Change History
History

Gives the results of a simplified threat analysis for NFV-MANO functional blocks (NFVO, VNFM, VIM) and reference points Or-Vnfm, Vi-Vnfm, Or-Vi based on the guidance given in ETSI GS NFV-SEC 006.

Committee
NFV SEC
DocumentType
Standard
PublisherName
European Telecommunications Standards Institute
Status
Current

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
GS NFV 003 : 1.2.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); TERMINOLOGY FOR MAIN CONCEPTS IN NFV
GS NFV 002 : 1.2.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); ARCHITECTURAL FRAMEWORK
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more