summaryrefslogtreecommitdiffstats
path: root/docs/Chapter4.rst
diff options
context:
space:
mode:
authorsteven stark <ss820f@att.com>2018-02-06 14:17:54 -0800
committersteven stark <ss820f@att.com>2018-02-06 14:17:54 -0800
commitbe360f8488c15fd6678239736bec812b0132befc (patch)
tree30dbd7f53a9940025c5465e6e27d60e1dfda5e09 /docs/Chapter4.rst
parentc391a5cfd4af29ded7311bcea9f1a9f6ab950b3e (diff)
VNFRQTS - R-81147 fix trailing "must"
R-81147 fix trailing "must" modified Chapter4 and Chapter8 Change-Id: Ide8a6e2c73771ce4eed3193856d4a35697784c2e Issue-ID: VNFRQTS-171 Signed-off-by: steven stark <ss820f@att.com>
Diffstat (limited to 'docs/Chapter4.rst')
-rw-r--r--docs/Chapter4.rst2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/Chapter4.rst b/docs/Chapter4.rst
index 479ec16..1ee17ee 100644
--- a/docs/Chapter4.rst
+++ b/docs/Chapter4.rst
@@ -331,7 +331,7 @@ Identity and Access Management Requirements
* R-64503 The VNF **MUST** provide minimum privileges for initial and default settings for new user accounts.
* R-86835 The VNF **MUST** set the default settings for user access to sensitive commands and data to deny authorization.
* R-77157 The VNF **MUST** conform to approved request, workflow authorization, and authorization provisioning requirements when creating privileged users.
-* R-81147 The VNF **MUST** have greater restrictions for access and execution, such as up to 3 factors of authentication and restricted authorization, for commands affecting network services, such as commands relating to VNFs, must.
+* R-81147 The VNF **MUST** have greater restrictions for access and execution, such as up to 3 factors of authentication and restricted authorization, for commands affecting network services, such as commands relating to VNFs.
* R-49109 The VNF **MUST** encrypt TCP/IP--HTTPS (e.g., TLS v1.2) transmission of data on internal and external networks.
* R-39562 The VNF **MUST** disable unnecessary or vulnerable cgi-bin programs.
* R-15671 The VNF **MUST NOT** provide public or unrestricted access to any data without the permission of the data owner. All data classification and access controls must be followed.