The present document aims to: Out of scope: To list vulnerabilities that NFV suffers from that are no different from pre-existing vulnerabilities of networking and virtualisation technologies and are not altered by the virtualisation of network functions.
Intended audience: Security experts wanting to deploy NFV but needing to identify and solve potential security issues and then to attain security accreditation for systems.
Ultimate goal of the NFV Security Expert Group: Identify and propose solutions to any new vulnerabilities that result from the introduction of NFV. To enable checks for these vulnerabilities to be incorporated into processes for security accreditation of products based on NFV. – To identify potential security vulnerabilities of NFV and to determine whether they are new problems, or just existing problems in different guises. – To provide a reference framework within which these vulnerabilities can be defined.
Status: Published
Publication Date: 2014-10-01
Category: Cloud computing
Working Group: Industry Specification Group (ISG) Network Functions Virtualisation (NFV)
Primary Source: https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf