Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

GS NFV-SEC 006 : 1.1.1

Current
Current

The latest, up-to-date edition.

NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
Published date

05-07-2016

Intellectual Property Rights
Foreword
Modal verbs terminology
1 Scope
2 References
3 Definitions and abbreviations
4 Security design guide
Annex A (informative) - Pro forma of Security
        and Regulatory Concerns for use in
        ETSI ISG NFV GHs
Annex B (informative) - Summary of attack vectors
        as applied in NFV
Annex C (informative) - Cryptographic measures for
        NFV protection
Annex D (informative) - Bibliography
Annex E (informative) - Authors & contributors
History

Includes detailed descriptions of security concerns, attacks, as well as an overview of regulatory concerns and how they can be treated in system design to give the highest level of assurance that the resultant system is secure and complies with current regulation and best practice.

Committee
NFV SEC
DocumentType
Standard
PublisherName
European Telecommunications Standards Institute
Status
Current

GR NFV-IFA 021 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; MANAGEMENT AND ORCHESTRATION; REPORT ON MANAGEMENT OF NFV-MANO AND AUTOMATED DEPLOYMENT OF EM AND OTHER OSS FUNCTIONS
GS NFV-IFA 027 : 2.4.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 2; MANAGEMENT AND ORCHESTRATION; PERFORMANCE MEASUREMENTS SPECIFICATION
GS NFV-SEC 014 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS
GR NFV-IFA 022 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; MANAGEMENT AND ORCHESTRATION; REPORT ON MANAGEMENT AND CONNECTIVITY FOR MULTI-SITE SERVICES

GS NFV-SEC 010 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON RETAINED DATA PROBLEM STATEMENT AND REQUIREMENTS
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
GS NFV-SEC 004 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; PRIVACY AND REGULATION; REPORT ON LAWFUL INTERCEPTION IMPLICATIONS
TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
GS NFV-SEC 003 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; SECURITY AND TRUST GUIDANCE
IEC 60906-2:2011 IEC system of plugs and socket-outlets for household and similar purposes - Part 2: Plugs and socket-outlets 15 A 125 V a.c. and 20 A 125 V a.c.
2014/53/EU : 2014 COR 1 2015 DIRECTIVE 2014/53/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 16 APRIL 2014 ON THE HARMONISATION OF THE LAWS OF THE MEMBER STATES RELATING TO THE MAKING AVAILABLE ON THE MARKET OF RADIO EQUIPMENT AND REPEALING DIRECTIVE 1999/5/EC TEXT WITH EEA RELEVANCE
765/2008 : 2008 COR 1 2015 REGULATION (EC) NO 765/2008 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 JULY 2008 SETTING OUT THE REQUIREMENTS FOR ACCREDITATION AND MARKET SURVEILLANCE RELATING TO THE MARKETING OF PRODUCTS AND REPEALING REGULATION (EEC) NO 339/1993 (TEXT WITH EEA RELEVANCE)
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
TR 103 309 : 1.1.1 CYBER; SECURE BY DEFAULT - PLATFORM SECURITY TECHNOLOGY
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more