Network Functions Virtualisation (NFV) Release 3; Security ; Security Management and Monitoring specification

  • Home
  • Network Functions Virtualisation (NFV) Release 3; Security ; Security Management and Monitoring specification

Error message

User warning: The following module is missing from the file system: cascading_grants_services. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1184 of /var/www/html/web/includes/bootstrap.inc).

ETSI GS NFV-SEC 013 V3.1.1

Network Functions Virtualisation (NFV) Release 3; Security ; Security Management and Monitoring specification

SCOPE

In NFV network, network services and network functions can be deployed dynamically. The present document specifies functional and security requirements for automated, dynamic security policy management and security function lifecycle management, and Security Monitoring of NFV systems.
 
The main objectives of the present document are to:

  • Identify use cases for NFV Security Lifecycle Management across Security Planning, Security Enforcement, and Security Monitoring.
  • Establish NFV Security Lifecycle Management and Security Monitoring requirements and architecture.

Ultimate goal of this work: Scope of this activity is to study and investigate NFV security monitoring and management use cases and establish security requirements. The present document investigates passive and active monitoring of subscriber and management information flows, where subscriber information includes signalling and content.
 
Security Management and Monitoring are key components towards successful deployment of NFV. The requirements and results from the present document will act as catalyst towards rapid deployment of NFV.
 
Goals of the present document: The present document will recommend potential methodologies and placement of security visibility and control elements for fulfilling the requirements identified in the present document. The present document will be useful to VNF and VNFI providers, network operators and research community.
 
Non-goal: The present document does not address Lawful Intercept (LI). It may be applicable to performance and reliability monitoring for NFV systems.
 
Intended audience: VNF and NFVI providers, Network Operators, Service Providers, NFV Software Communities, SDOs (e.g. 3GPP, ETSI SC TC Cyber), Security experts and Researchers.

WORKING GROUP
LATEST PUBLICATION DATE
March 2017
LINK TO THE LATEST PUBLISHED VERSION
WIKI WATCH

Insert here: activities, gaps, opportunities, and other user driven comments

Back to the search results