diff options
author | Bozawglanian, Hagop (hb755d) <hb755d@att.com> | 2018-09-10 21:43:04 +0000 |
---|---|---|
committer | Bozawglanian, Hagop (hb755d) <hb755d@att.com> | 2018-09-10 21:44:22 +0000 |
commit | 116d208c43795f3737e356bf305f881344835fe2 (patch) | |
tree | 919ce138a4f8549f5b3f72d7e4fa48d111352b8c | |
parent | 29b40f43e5102f5289495a93044e5b71a3003ec3 (diff) |
VNFRQTS - Rewording Security Req Batch 5
Including changes for: VNFRQTS - 354, 398, 400, 413, 414
Issue-ID: VNFRQTS-398
Change-Id: Ia0260ccad6fe19c32636a8581d555784787baa9e
Signed-off-by: Bozawglanian, Hagop (hb755d) <hb755d@att.com>
-rw-r--r-- | docs/Chapter4/Security.rst | 36 | ||||
-rw-r--r-- | docs/data/needs.json | 24 |
2 files changed, 30 insertions, 30 deletions
diff --git a/docs/Chapter4/Security.rst b/docs/Chapter4/Security.rst index 6f3f0b8..aafc1da 100644 --- a/docs/Chapter4/Security.rst +++ b/docs/Chapter4/Security.rst @@ -404,13 +404,10 @@ Identity and Access Management Requirements :id: R-59391 :target: VNF :keyword: MUST + :updated: casablanca - The VNF provider **MUST**, where a VNF provider requires - the assumption of permissions, such as root or administrator, first - log in under their individual user login ID then switch to the other - higher level account; or where the individual user login is infeasible, - must login with an account with admin privileges in a way that - uniquely identifies the individual performing the function. + The VNF MUST NOT not allow the assumption of the permissions of + another account to mask individual accountability. .. req:: :id: R-64503 @@ -548,21 +545,23 @@ API Requirements :id: R-54930 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** implement the following input validation - control: Do not permit input that contains content or characters - inappropriate to the input expected by the design. Inappropriate input, - such as SQL insertions, may cause the system to execute undesirable - and unauthorized transactions against the database or allow other - inappropriate access to the internal network. + The VNF **MUST** implement the following input validation controls: + Do not permit input that contains content or characters inappropriate + to the input expected by the design. Inappropriate input, such as + SQL expressions, may cause the system to execute undesirable and + unauthorized transactions against the database or allow other + inappropriate access to the internal network (injection attacks). .. req:: :id: R-21210 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** implement the following input validation - control: Validate that any input file has a correct and valid + The VNF **MUST** implement the following input validation control + on APIs: Validate that any input file has a correct and valid Multipurpose Internet Mail Extensions (MIME) type. Input files should be tested for spoofed MIME types. @@ -912,18 +911,19 @@ Security Analytics Requirements :id: R-04492 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** generate security audit logs that must be sent + The VNF **MUST** generate security audit logs that can be sent to Security Analytics Tools for analysis. .. req:: :id: R-30932 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** provide security audit logs including records - of successful and rejected system access data and other resource access - attempts. + The VNF **MUST** log successful and unsuccessful access to VNF + resources, including data. .. req:: :id: R-54816 diff --git a/docs/data/needs.json b/docs/data/needs.json index 439d6ae..6c5575e 100644 --- a/docs/data/needs.json +++ b/docs/data/needs.json @@ -1,5 +1,5 @@ { - "created": "2018-09-10T17:51:37.025716", + "created": "2018-09-10T21:34:50.919181", "current_version": "casablanca", "project": "", "versions": { @@ -21858,7 +21858,7 @@ "needs_amount": 750 }, "casablanca": { - "created": "2018-09-10T17:51:37.025645", + "created": "2018-09-10T21:34:50.919089", "needs": { "R-00011": { "description": "A VNF's Heat Orchestration Template's Nested YAML files\nparameter's **MUST NOT** have a parameter constraint defined.", @@ -22858,7 +22858,7 @@ "validation_mode": "" }, "R-04492": { - "description": "The VNF **MUST** generate security audit logs that must be sent\nto Security Analytics Tools for analysis.", + "description": "The VNF **MUST** generate security audit logs that can be sent\nto Security Analytics Tools for analysis.", "full_title": "", "hide_links": "", "id": "R-04492", @@ -22881,7 +22881,7 @@ "title": "", "title_from_content": "", "type_name": "Requirement", - "updated": "", + "updated": "casablanca", "validated_by": "", "validation_mode": "" }, @@ -25971,7 +25971,7 @@ "validation_mode": "" }, "R-21210": { - "description": "The VNF **MUST** implement the following input validation\ncontrol: Validate that any input file has a correct and valid\nMultipurpose Internet Mail Extensions (MIME) type. Input files\nshould be tested for spoofed MIME types.", + "description": "The VNF **MUST** implement the following input validation control\non APIs: Validate that any input file has a correct and valid\nMultipurpose Internet Mail Extensions (MIME) type. Input files\nshould be tested for spoofed MIME types.", "full_title": "", "hide_links": "", "id": "R-21210", @@ -25994,7 +25994,7 @@ "title": "", "title_from_content": "", "type_name": "Requirement", - "updated": "", + "updated": "casablanca", "validated_by": "", "validation_mode": "" }, @@ -28277,7 +28277,7 @@ "validation_mode": "" }, "R-30932": { - "description": "The VNF **MUST** provide security audit logs including records\nof successful and rejected system access data and other resource access\nattempts.", + "description": "The VNF **MUST** log successful and unsuccessful access to VNF\nresources, including data.", "full_title": "", "hide_links": "", "id": "R-30932", @@ -28300,7 +28300,7 @@ "title": "", "title_from_content": "", "type_name": "Requirement", - "updated": "", + "updated": "casablanca", "validated_by": "", "validation_mode": "" }, @@ -33431,7 +33431,7 @@ "validation_mode": "" }, "R-54930": { - "description": "The VNF **MUST** implement the following input validation\ncontrol: Do not permit input that contains content or characters\ninappropriate to the input expected by the design. Inappropriate input,\nsuch as SQL insertions, may cause the system to execute undesirable\nand unauthorized transactions against the database or allow other\ninappropriate access to the internal network.", + "description": "The VNF **MUST** implement the following input validation controls:\nDo not permit input that contains content or characters inappropriate\nto the input expected by the design. Inappropriate input, such as\nSQL expressions, may cause the system to execute undesirable and\nunauthorized transactions against the database or allow other\ninappropriate access to the internal network (injection attacks).", "full_title": "", "hide_links": "", "id": "R-54930", @@ -33454,7 +33454,7 @@ "title": "", "title_from_content": "", "type_name": "Requirement", - "updated": "", + "updated": "casablanca", "validated_by": "", "validation_mode": "" }, @@ -34248,7 +34248,7 @@ "validation_mode": "" }, "R-59391": { - "description": "The VNF provider **MUST**, where a VNF provider requires\nthe assumption of permissions, such as root or administrator, first\nlog in under their individual user login ID then switch to the other\nhigher level account; or where the individual user login is infeasible,\nmust login with an account with admin privileges in a way that\nuniquely identifies the individual performing the function.", + "description": "The VNF MUST NOT not allow the assumption of the permissions of\nanother account to mask individual accountability.", "full_title": "", "hide_links": "", "id": "R-59391", @@ -34271,7 +34271,7 @@ "title": "", "title_from_content": "", "type_name": "Requirement", - "updated": "", + "updated": "casablanca", "validated_by": "", "validation_mode": "" }, |