summaryrefslogtreecommitdiffstats
path: root/docs/Chapter4/Security.rst
diff options
context:
space:
mode:
authorLovett, Trevor <trevor.lovett@att.com>2020-07-02 11:19:00 -0500
committerLovett, Trevor <trevor.lovett@att.com>2020-07-12 18:17:41 -0500
commitd1f93f4febdd5b34e96b954dd11e635bc0ee8041 (patch)
tree899f326fa7ed5ecd05e8dcaf535e7c3ddd99d3e9 /docs/Chapter4/Security.rst
parentcbbd1db5dfe2035d56901575218380c32216da92 (diff)
Requirement ID Generation and RST Validation
The new check.py script will now perform a variety of actions to simplify updates and ensure specific practices are followed for each update. The script has been integrated with tox and will run whenever the documentation is created. It can also be ran separately by just invoking python check.py. The script will perform a variety of automatic updates where possible, and provide a warning where auto-updates are not possible. The expecation is that all warnings are addressed before submitting for review, but given it is a new feature warnings do not block validation at this time. Here is a summary of the warnings and updates: Warnings: - Requirement missing required attributes - Invalid values for attributes - Invalid section header usage in any file - :keyword: and requirement mismatch Auto Updates: - Assigning :id: on new requirements where an ID missing - Adding :introduced: attribute on new requirements - Adding/correcting :updated: attribute on changed requirements Issue-ID: VNFRQTS-896 Signed-off-by: Lovett, Trevor <trevor.lovett@att.com> Change-Id: I283441330a139aa1c6e2e79f0c54c5979bf44642
Diffstat (limited to 'docs/Chapter4/Security.rst')
-rw-r--r--docs/Chapter4/Security.rst14
1 files changed, 7 insertions, 7 deletions
diff --git a/docs/Chapter4/Security.rst b/docs/Chapter4/Security.rst
index ba033f7..3782e58 100644
--- a/docs/Chapter4/Security.rst
+++ b/docs/Chapter4/Security.rst
@@ -14,7 +14,7 @@
VNF Security
-----------------------
+------------
The objective of this section is to provide the key security
requirements that need to be met by VNFs. The security requirements are
@@ -48,7 +48,7 @@ following sections:
requirements associated with data protection.
VNF General Security Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This section provides details on the VNF general security requirements
on various security areas such as user access control, network security,
@@ -316,7 +316,7 @@ the product's lifecycle.
are secure. All non-compliances with the benchmarks MUST be documented.
VNF Identity and Access Management Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The following security requirements for logging, identity, and access
management need to be met by the solution in a virtual environment:
@@ -542,7 +542,7 @@ Identity and Access Management Requirements
VNF API Security Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This section covers API security requirements when these are used by the
VNFs. Key security areas covered in API security are Access Control,
@@ -601,7 +601,7 @@ API Requirements
should be tested for spoofed MIME types.
VNF Security Analytics Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This section covers VNF security analytics requirements that are mostly
applicable to security monitoring. The VNF Security Analytics cover the
@@ -1015,7 +1015,7 @@ Security Analytics Requirements
elevated privileges.
VNF Data Protection Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This section covers VNF data protection requirements that are mostly
applicable to security monitoring.
@@ -1143,7 +1143,7 @@ Data Protection Requirements
VNF Cryptography Requirements
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This section covers VNF cryptography requirements that are mostly
applicable to encryption or protocol meethods.