diff options
author | steven stark <ss820f@att.com> | 2018-02-06 14:17:54 -0800 |
---|---|---|
committer | steven stark <ss820f@att.com> | 2018-02-06 14:17:54 -0800 |
commit | be360f8488c15fd6678239736bec812b0132befc (patch) | |
tree | 30dbd7f53a9940025c5465e6e27d60e1dfda5e09 /docs/Chapter4.rst | |
parent | c391a5cfd4af29ded7311bcea9f1a9f6ab950b3e (diff) |
VNFRQTS - R-81147 fix trailing "must"
R-81147 fix trailing "must"
modified Chapter4 and Chapter8
Change-Id: Ide8a6e2c73771ce4eed3193856d4a35697784c2e
Issue-ID: VNFRQTS-171
Signed-off-by: steven stark <ss820f@att.com>
Diffstat (limited to 'docs/Chapter4.rst')
-rw-r--r-- | docs/Chapter4.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/Chapter4.rst b/docs/Chapter4.rst index 479ec16..1ee17ee 100644 --- a/docs/Chapter4.rst +++ b/docs/Chapter4.rst @@ -331,7 +331,7 @@ Identity and Access Management Requirements * R-64503 The VNF **MUST** provide minimum privileges for initial and default settings for new user accounts. * R-86835 The VNF **MUST** set the default settings for user access to sensitive commands and data to deny authorization. * R-77157 The VNF **MUST** conform to approved request, workflow authorization, and authorization provisioning requirements when creating privileged users. -* R-81147 The VNF **MUST** have greater restrictions for access and execution, such as up to 3 factors of authentication and restricted authorization, for commands affecting network services, such as commands relating to VNFs, must. +* R-81147 The VNF **MUST** have greater restrictions for access and execution, such as up to 3 factors of authentication and restricted authorization, for commands affecting network services, such as commands relating to VNFs. * R-49109 The VNF **MUST** encrypt TCP/IP--HTTPS (e.g., TLS v1.2) transmission of data on internal and external networks. * R-39562 The VNF **MUST** disable unnecessary or vulnerable cgi-bin programs. * R-15671 The VNF **MUST NOT** provide public or unrestricted access to any data without the permission of the data owner. All data classification and access controls must be followed. |