summaryrefslogtreecommitdiffstats
path: root/docs/Chapter4/Security.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/Chapter4/Security.rst')
-rw-r--r--docs/Chapter4/Security.rst18
1 files changed, 0 insertions, 18 deletions
diff --git a/docs/Chapter4/Security.rst b/docs/Chapter4/Security.rst
index a2f0dd2..d16a7c3 100644
--- a/docs/Chapter4/Security.rst
+++ b/docs/Chapter4/Security.rst
@@ -181,16 +181,6 @@ the product’s lifecycle.
authentication and access control of customer or VNF application users.
.. req::
- :id: R-42681
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST** use the NCSP's IDAM API or comply with
- the requirements if not using the NCSP's IDAM API, for identification,
- authentication and access control of OA&M and other system level
- functions.
-
-.. req::
:id: R-62498
:target: VNF
:keyword: MUST
@@ -840,14 +830,6 @@ Security Analytics Requirements
for agreed period of time for forensic analysis.
.. req::
- :id: R-57271
- :target: VNF
- :keyword: MUST
-
- The VNF **MUST** provide the capability of generating security
- audit logs by interacting with the operating system (OS) as appropriate.
-
-.. req::
:id: R-84160
:target: VNF
:keyword: MUST