diff options
author | Bozawglanian, Hagop (hb755d) <hb755d@att.com> | 2018-09-05 16:16:20 +0000 |
---|---|---|
committer | Bozawglanian, Hagop (hb755d) <hb755d@att.com> | 2018-09-05 16:16:20 +0000 |
commit | 9d49e6e9236985cfc1dcdee50a9570dfab92ff44 (patch) | |
tree | f03bb81adbd4616c82a7eb621af611531fb3625d /docs/Chapter4/Security.rst | |
parent | c4e85b64d93f7bb4cdcf13cbc65f2256e5bb7a33 (diff) |
VNFRQTS - Rewording Security Req Batch 3
Including changes for VNFRQTS - 298, 305, 311, 341, 362
Issue-ID: VNFRQTS-298
Change-Id: Ic5601ba7eacb6296c0dcd975f007260fb15ce2d6
Signed-off-by: Bozawglanian, Hagop (hb755d) <hb755d@att.com>
Diffstat (limited to 'docs/Chapter4/Security.rst')
-rw-r--r-- | docs/Chapter4/Security.rst | 40 |
1 files changed, 21 insertions, 19 deletions
diff --git a/docs/Chapter4/Security.rst b/docs/Chapter4/Security.rst index fb318dd..522b195 100644 --- a/docs/Chapter4/Security.rst +++ b/docs/Chapter4/Security.rst @@ -106,11 +106,10 @@ the product’s lifecycle. :id: R-23882 :target: VNF :keyword: SHOULD + :updated: casablanca - The VNF **SHOULD** be scanned using both network scanning - and application scanning security tools on all code, including underlying - OS and related configuration. Scan reports shall be provided. Remediation - roadmaps shall be made available for any findings. + The VNF **SHOULD** provide the capability for the Operator to run security + vulnerability scans of the operating system and all application layers. .. req:: :id: R-46986 @@ -124,13 +123,14 @@ the product’s lifecycle. :id: R-99771 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** provide all code/configuration files in a - "Locked down" or hardened state or with documented recommendations for - such hardening. All unnecessary services will be disabled. VNF provider - default credentials, community strings and other such artifacts will be - removed or disclosed so that they can be modified or removed during - provisioning. + The VNF **MUST** have all code (e.g., QCOW2) and configuration files + (e.g., HEAT template, Ansible playbook, script) hardened, or with + documented recommended configurations for hardening and interfaces that + allow the Operator to harden the VNF. Actions taken to harden a system + include disabling all unnecessary services, and changing default values + such as default credentials and community strings. .. req:: :id: R-19768 @@ -383,10 +383,11 @@ Identity and Access Management Requirements :id: R-71787 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** comply with Segregation of Duties (access to a - single layer and no developer may access production without special - oversight) when persons or non-person entities access VNFs. + Each layer of the VNF **MUST** support access restriction + independently of all other layers so that Segregation of Duties + can be implemented. .. req:: :id: R-86261 @@ -591,11 +592,11 @@ Identity and Access Management Requirements .. req:: :id: R-15671 :target: VNF - :keyword: MUST NOT + :keyword: MUST + :updated: casablanca - The VNF **MUST NOT** provide public or unrestricted access - to any data without the permission of the data owner. All data - classification and access controls must be followed. + The VNF **MUST** provide access controls that allow the Operator + to restrict access to VNF functions and data to authorized entities. .. req:: :id: R-89753 @@ -1321,9 +1322,10 @@ Data Protection Requirements :id: R-95864 :target: VNF :keyword: MUST + :updated: casablanca - The VNF **MUST** use commercial tools that comply with X.509 - standards and produce x.509 compliant keys for public/private key generation. + The VNF **MUST** support digital certificates that comply with X.509 + standards. .. req:: :id: R-12110 |