1.
|
Clear description of the referenced document:
|
|
Name:
|
ETSI GS NFV-SEC 013
|
Title:
|
Network Functions Virtualisation (NFV) Release 3; Security; Security Management and Monitoring specification
|
|
2.
|
Status of approval:
|
|
Approved
|
3.
|
Justification for the specific reference:
|
|
The referenced document is the text on which draft Recommendation X.nsom-sec is based.
|
4.
|
Current information, if any, about IPR issues:
|
|
None.
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
|
6.
|
The degree of stability or maturity of the document:
|
|
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
|
7.
|
Relationship with other existing or emerging documents:
|
|
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
Normative references:/
[1] ETSI GS NFV-SEC 001: "Network Functions Virtualisation (NFV); NFV Security; Problem Statement"./
[2] ETSI GS NFV-SEC 003: "Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance"./
[3] ETSI GS NFV-SEC 012: "Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components". /
Informative references:/
[i.1] ETSI GS NFV-IFA 013: "Network Functions Virtualisation (NFV); Management and Orchestration; Os-Ma-Nfvo reference point - Interface and Information Model Specification"./
[i.2] Richard Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, AddisonWesley Professional, 2004./
[i.3] Chris Sanders and Jason Smith, Applied Network Security Monitoring, Syngress publications, 2014./
[i.4] PFQ. Available at https://github.com/pfq/PFQ./
[i.5] ETSI GS NFV 003: "Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV"./
[i.6] ETSI GS NFV 002: "Network Functions Virtualisation (NFV); Architectural Framework"./
[i.7] GSMA PRD N2020.01: "VoLTE Service Description and Implementation Guideline", V1.0, December 2014./
[i.8] Tomi Raty, Jouko Sankala, and Markus Shivonen: "Network traffic analysing and monitoring locations in the IMS," IEEETM 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA), Porto, Portugal, 30th August - 3rd September, 2005, pp. 362-369./
[i.9] Paolo De Lutiis and Dario Lombardo: "An innovative way to analyse large ISP data for IMS security and monitoring" IEEETM 13th International Conference on Intelligence in Next Generation Networks (INGN), Bordeaux, France, 26-29 October, 2009, pp. 1-6. /
[i.10] Ari Takanen: "Recommendations for VoIP and IMS security" 3GPP Release 8 IMS Implementation Workshop, Sophia Antipolis, 24-25 November, 2010./
[i.11] D. Wang and Chen Liu: "Model based vulnerability analysis of IMS network," Academy Publisher, Journal of Networks, Vol. 4, No. 4, June 2009, pp. 254-262./
[i.12] ETSI GS NFV-REL 004: "Network Functions Virtualisation (NFV); Assurance; Report on Active Monitoring and Failure Detection"./
[i.13] ETSI GR NFV-SEC 009: "Network Functions Virtualisation (NFV); NFV Security; Report on use cases and technical approaches for multi-layer host administration".
|
9.
|
Qualification of
ETSI:
|
|
ETSI is recognized under the provisions of ITU-T Recommendations A.5 and A.6. Qualifying information is on file at TSB.
|
10.
|
Other (for any supplementary information):
|
|
None
|