summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBozawglanian, Hagop (hb755d) <hb755d@att.com>2018-09-07 20:50:31 +0000
committerBozawglanian, Hagop (hb755d) <hb755d@att.com>2018-09-07 20:50:31 +0000
commit5052284bcd1480ed3486acf1ef3750347a573a3d (patch)
treea234bfc3830db391fa8496c1a830e8d3d0fdcc37
parent05dab0b4aed15917c7e7429465642e90cc10cb74 (diff)
VNFRQTS - Reword and Move Security Req Batch 1
Including changes for VNFRQTS - 333, 334, 374, 378, 407, 409 Issue-ID: VNFRQTS-333 Change-Id: I336ae80a7c92887b06050a6bbe5d1a8d42f68008 Signed-off-by: Bozawglanian, Hagop (hb755d) <hb755d@att.com>
-rw-r--r--docs/Chapter4/Security.rst110
-rw-r--r--docs/data/needs.json54
2 files changed, 84 insertions, 80 deletions
diff --git a/docs/Chapter4/Security.rst b/docs/Chapter4/Security.rst
index 6503d0c..384f07e 100644
--- a/docs/Chapter4/Security.rst
+++ b/docs/Chapter4/Security.rst
@@ -226,15 +226,6 @@ the product’s lifecycle.
Application levels as appropriate.
.. req::
- :id: R-98391
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST**, if not using the NCSP's IDAM API, support
- Role-Based Access Control to permit/limit the user/application to
- performing specific activities.
-
-.. req::
:id: R-62498
:target: VNF
:keyword: MUST
@@ -265,14 +256,6 @@ the product’s lifecycle.
with the NCSP's credential management policy.
.. req::
- :id: R-75041
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST**, if not using the NCSP's IDAM API, expire
- passwords at regular configurable intervals.
-
-.. req::
:id: R-46908
:target: VNF
:keyword: MUST
@@ -330,6 +313,27 @@ the product’s lifecycle.
accesses the resources of another system, and must never conceal
individual accountability.
+.. req::
+ :id: R-80335
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ For all GUI and command-line interfaces, the VNF **MUST** provide the
+ ability to present a warning notice that is set by the Operator. A warning
+ notice is a formal statement of resource intent presented to everyone
+ who accesses the system.
+
+.. req::
+ :id: R-19082
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ The VNF **MUST** allow the Operator to disable or remove any security
+ testing tools or programs included in the VNF, e.g., password cracker,
+ port scanner.
+
VNF Identity and Access Management Requirements
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@@ -397,14 +401,6 @@ Identity and Access Management Requirements
The VNF **MUST NOT** allow vendor access to VNFs remotely.
.. req::
- :id: R-34552
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST** provide or support the Identity and Access
- Management (IDAM) based threat detection data for OWASP Top 10.
-
-.. req::
:id: R-59391
:target: VNF
:keyword: MUST
@@ -417,17 +413,6 @@ Identity and Access Management Requirements
uniquely identifies the individual performing the function.
.. req::
- :id: R-80335
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST** make visible a Warning Notice: A formal
- statement of resource intent, i.e., a warning notice, upon initial
- access to a VNF provider user who accesses private internal networks
- or Company computer resources, e.g., upon initial logon to an internal
- web site, system or application which requires authentication.
-
-.. req::
:id: R-64503
:target: VNF
:keyword: MUST
@@ -478,15 +463,6 @@ Identity and Access Management Requirements
to restrict access to VNF functions and data to authorized entities.
.. req::
- :id: R-19082
- :target: VNF
- :keyword: MUST NOT
-
- The VNF **MUST NOT** run security testing tools and
- programs, e.g., password cracker, port scanners, hacking tools
- in production, without authorization of the VNF system owner.
-
-.. req::
:id: R-85419
:target: VNF
:keyword: SHOULD
@@ -502,6 +478,25 @@ Identity and Access Management Requirements
The VNF **SHOULD** support SCEP (Simple Certificate Enrollment Protocol).
+.. req::
+ :id: R-75041
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ The VNF **MUST**, if not integrated the Operator's Identity and Access
+ Management system, support configurable password expiration.
+
+.. req::
+ :id: R-98391
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ The VNF **MUST**, if not integrated with the Operator's Identity and
+ Access Management system, support Role-Based Access Control to enforce
+ least privilege.
+
VNF API Security Requirements
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@@ -538,14 +533,6 @@ API Requirements
represented by the certificate where PKI-based authentication is used.
.. req::
- :id: R-47204
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST** protect the confidentiality and integrity of
- data at rest and in transit from unauthorized access and modification.
-
-.. req::
:id: R-33488
:target: VNF
:keyword: MUST
@@ -971,6 +958,15 @@ Security Analytics Requirements
routines to maintain activity records and cleanup programs to ensure
the integrity of the audit/logging systems.
+.. req::
+ :id: R-34552
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ The VNF **MUST** be implemented so that it is not vulnerable to OWASP
+ Top 10 web application security risks.
+
VNF Data Protection Requirements
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@@ -1160,3 +1156,11 @@ Data Protection Requirements
validity of a digital certificate by recognizing the identity represented
by the certificate - the "distinguished name".
+.. req::
+ :id: R-47204
+ :target: VNF
+ :keyword: MUST
+ :updated: casablanca
+
+ The VNF **MUST** be capable of protecting the confidentiality and integrity
+ of data at rest and in transit from unauthorized access and modification. \ No newline at end of file
diff --git a/docs/data/needs.json b/docs/data/needs.json
index 8388790..2d38372 100644
--- a/docs/data/needs.json
+++ b/docs/data/needs.json
@@ -1,5 +1,5 @@
{
- "created": "2018-09-06T17:45:18.112660",
+ "created": "2018-09-07T19:37:09.602325",
"current_version": "casablanca",
"project": "",
"versions": {
@@ -21858,7 +21858,7 @@
"needs_amount": 750
},
"casablanca": {
- "created": "2018-09-06T17:45:18.112581",
+ "created": "2018-09-07T19:37:09.602183",
"needs": {
"R-00011": {
"description": "A VNF's Heat Orchestration Template's Nested YAML files\nparameter's **MUST NOT** have a parameter constraint defined.",
@@ -25429,18 +25429,18 @@
"validation_mode": ""
},
"R-19082": {
- "description": "The VNF **MUST NOT** run security testing tools and\nprograms, e.g., password cracker, port scanners, hacking tools\nin production, without authorization of the VNF system owner.",
+ "description": "The VNF **MUST** allow the Operator to disable or remove any security\ntesting tools or programs included in the VNF, e.g., password cracker,\nport scanner.",
"full_title": "",
"hide_links": "",
"id": "R-19082",
"impacts": "",
"introduced": "",
- "keyword": "MUST NOT",
+ "keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF Identity and Access Management Requirements",
+ "section_name": "VNF General Security Requirements",
"sections": [
- "VNF Identity and Access Management Requirements",
+ "VNF General Security Requirements",
"VNF Security"
],
"status": null,
@@ -25452,7 +25452,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},
@@ -29044,7 +29044,7 @@
"validation_mode": ""
},
"R-34552": {
- "description": "The VNF **MUST** provide or support the Identity and Access\nManagement (IDAM) based threat detection data for OWASP Top 10.",
+ "description": "The VNF **MUST** be implemented so that it is not vulnerable to OWASP\nTop 10 web application security risks.",
"full_title": "",
"hide_links": "",
"id": "R-34552",
@@ -29053,9 +29053,9 @@
"keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF Identity and Access Management Requirements",
+ "section_name": "VNF Security Analytics Requirements",
"sections": [
- "VNF Identity and Access Management Requirements",
+ "VNF Security Analytics Requirements",
"VNF Security"
],
"status": null,
@@ -29067,7 +29067,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},
@@ -31943,7 +31943,7 @@
"validation_mode": ""
},
"R-47204": {
- "description": "The VNF **MUST** protect the confidentiality and integrity of\ndata at rest and in transit from unauthorized access and modification.",
+ "description": "The VNF **MUST** be capable of protecting the confidentiality and integrity\nof data at rest and in transit from unauthorized access and modification.",
"full_title": "",
"hide_links": "",
"id": "R-47204",
@@ -31952,9 +31952,9 @@
"keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF API Security Requirements",
+ "section_name": "VNF Data Protection Requirements",
"sections": [
- "VNF API Security Requirements",
+ "VNF Data Protection Requirements",
"VNF Security"
],
"status": null,
@@ -31966,7 +31966,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},
@@ -37118,7 +37118,7 @@
"validation_mode": ""
},
"R-75041": {
- "description": "The VNF **MUST**, if not using the NCSP's IDAM API, expire\npasswords at regular configurable intervals.",
+ "description": "The VNF **MUST**, if not integrated the Operator's Identity and Access\nManagement system, support configurable password expiration.",
"full_title": "",
"hide_links": "",
"id": "R-75041",
@@ -37127,9 +37127,9 @@
"keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF General Security Requirements",
+ "section_name": "VNF Identity and Access Management Requirements",
"sections": [
- "VNF General Security Requirements",
+ "VNF Identity and Access Management Requirements",
"VNF Security"
],
"status": null,
@@ -37141,7 +37141,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},
@@ -37947,7 +37947,7 @@
"validation_mode": ""
},
"R-80335": {
- "description": "The VNF **MUST** make visible a Warning Notice: A formal\nstatement of resource intent, i.e., a warning notice, upon initial\naccess to a VNF provider user who accesses private internal networks\nor Company computer resources, e.g., upon initial logon to an internal\nweb site, system or application which requires authentication.",
+ "description": "For all GUI and command-line interfaces, the VNF **MUST** provide the\nability to present a warning notice that is set by the Operator. A warning\nnotice is a formal statement of resource intent presented to everyone\nwho accesses the system.",
"full_title": "",
"hide_links": "",
"id": "R-80335",
@@ -37956,9 +37956,9 @@
"keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF Identity and Access Management Requirements",
+ "section_name": "VNF General Security Requirements",
"sections": [
- "VNF Identity and Access Management Requirements",
+ "VNF General Security Requirements",
"VNF Security"
],
"status": null,
@@ -37970,7 +37970,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},
@@ -41811,7 +41811,7 @@
"validation_mode": ""
},
"R-98391": {
- "description": "The VNF **MUST**, if not using the NCSP's IDAM API, support\nRole-Based Access Control to permit/limit the user/application to\nperforming specific activities.",
+ "description": "The VNF **MUST**, if not integrated with the Operator\u2019s Identity and\nAccess Management system, support Role-Based Access Control to enforce\nleast privilege.",
"full_title": "",
"hide_links": "",
"id": "R-98391",
@@ -41820,9 +41820,9 @@
"keyword": "MUST",
"links": [],
"notes": "",
- "section_name": "VNF General Security Requirements",
+ "section_name": "VNF Identity and Access Management Requirements",
"sections": [
- "VNF General Security Requirements",
+ "VNF Identity and Access Management Requirements",
"VNF Security"
],
"status": null,
@@ -41834,7 +41834,7 @@
"title": "",
"title_from_content": "",
"type_name": "Requirement",
- "updated": "",
+ "updated": "casablanca",
"validated_by": "",
"validation_mode": ""
},