Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components

  • Home
  • Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components

Error message

User warning: The following module is missing from the file system: cascading_grants_services. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1184 of /var/www/html/web/includes/bootstrap.inc).

ETSI GS NFV-SEC 012 V3.1.1

Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components

SCOPE

Trust, as defined in ETSI GR NFV-SEC 003, is an important component of security. One weakness of software as opposed to hardware, is that software can be copied in whole or in part. Trust that is rooted in software may be less reliable than trust rooted in hardware, quickly, easily, and any number of times. For the particular case of sensitive workloads that have to be trusted, only the highest assurance in the root of trust is considered acceptable, thus for the purposes of the present document the root of trust shall be provided in hardware.
 
There is, however, a concomitant concern that when a device is subject to black box testing, it is impossible to determine if the responses to interrogation come from hardware or software. To counter this, a NFVI vendor shall be able to provide evidence on demand that the root of trust is a hardware element. The means by which the vendor provides such evidence is not considered in the present document but should be mutually agreed between the vendor and operator.
 
A vendor shall be able to provide evidence on demand to authorized parties of the security claims for the root of trust. The means by which the vendor provides such evidence is not considered in the present document, but should be mutually agreed between the vendor and operator. An examples of 3rd a party assurance programme is Common Criteria (defined in ISO/IEC 15408).
 
The host system, acting as a black box (closed) environment, shall provide access to authorized external entities only to those capabilities identified in the authorization agreement.

WORKING GROUP
LATEST PUBLICATION DATE
January 2017
LINK TO THE LATEST PUBLISHED VERSION
WIKI WATCH

Insert here: activities, gaps, opportunities, and other user driven comments

Back to the search results