Requirements references related to OPNFV Audit
Source information¶
http://www.etsi.org/deliver/etsi_gs/NFV-INF/001_099/003/01.01.01_60/gs_NFV-INF003v010101p.pdf http://www.etsi.org/deliver/etsi_gs/NFV-INF/001_099/004/01.01.01_60/gs_NFV-INF004v010101p.pdf
- ETSI GS NFV-SEC 003 V1.1.1 (2014-12)
- Network Functions Virtualisation NFV);
- NFV Security; Security and Trust Guidance
- NFV-SEC-003.
- ETSI GS NFV 004 V1.1.1 (2013-10)
- Network Functions Virtualisation (NFV);
- Virtualisation Requirements
- NFV-SEC-004.
Requirements on Auditing framework¶
Audit records shall be maintained within protected binary logs so that the record of malicious actions cannot be deleted from the logs.
Necessary auditable events¶
access control management
- Adding a user account
- Modifying user account
- Deleting a user account
- login event
- logout event
- IP whitelisting update
- IP blacklisting update
VNFC Creation
- The instantiation of a newly-defined VNFC
- The instantiation of a VNFC with pre-configured state
- The cloning of an existing VNFC
VNFC Deletion
- The deletion of VNFC and of all of its instances (e.g. snapshots, backups, archives, cloned images)
Software management
- patching e.g. opreating system, drivers, VM components
- dynamic updates to the configuration e.g. DNS, DHCP
- application software updates
- software component updates
Data management
- Root level access to NFVI file system
- User level access to NFVI file system
- Secured wipe, disk and memory
- Verified destruction
- Certificate revocation
VNFC Migration
- VNFC original host identity
- VNFC target host identity
- high availability
- recovery
- data-in-motion changes
Other VNFC Operational State Changes
- Hibernation, sleep, resumption, abort, restore, suspension
- Power-on and power-off (either physical or virtual)
- Integrity verification failure, crash and OS compromise
VNFC Topology Changes
- Network IP address and VLAN updates
- Service chaining
- Failover and disaster recovery
traffic inspection
- enabling virtual port mirroring
- enabling hypervisor introspection
- enabling in-line traffic inspection
- application insertion
initial provisioning of a public/private key pair
Self-generation of key pairs for later validation by an external party:
- Certificate Authority
- VNFM
Provision by trusted party
- network
- storage
Injection by hypervisor