This page will soon be deactivated—explore our new, faster, mobile-friendly site, now centralized in MyWorkspace!

Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.1047     
  ITU-T A.5 justification information for referenced document ETSI GS NFV-SEC 013 in draft X.1047
1. Clear description of the referenced document:
Name: ETSI GS NFV-SEC 013
Title: Network Functions Virtualisation (NFV) Release 3; Security; Security Management and Monitoring specification
2. Status of approval:
Approved
3. Justification for the specific reference:
The referenced document is the text on which draft Recommendation X.nsom-sec is based.
4. Current information, if any, about IPR issues:
None.
5. Other useful information describing the "Quality" of the document:
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
6. The degree of stability or maturity of the document:
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
7. Relationship with other existing or emerging documents:
ETSI GS NFV-SEC 013 was published by ETSI in 2017.
8. Any explicit references within that referenced document should also be listed:
Normative references:/
[1] ETSI GS NFV-SEC 001: "Network Functions Virtualisation (NFV); NFV Security; Problem Statement"./
[2] ETSI GS NFV-SEC 003: "Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance"./
[3] ETSI GS NFV-SEC 012: "Network Functions Virtualisation (NFV) Release 3; Security; System architecture specification for execution of sensitive NFV components". /
Informative references:/
[i.1] ETSI GS NFV-IFA 013: "Network Functions Virtualisation (NFV); Management and Orchestration; Os-Ma-Nfvo reference point - Interface and Information Model Specification"./
[i.2] Richard Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, AddisonWesley Professional, 2004./
[i.3] Chris Sanders and Jason Smith, Applied Network Security Monitoring, Syngress publications, 2014./
[i.4] PFQ. Available at https://github.com/pfq/PFQ./
[i.5] ETSI GS NFV 003: "Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV"./
[i.6] ETSI GS NFV 002: "Network Functions Virtualisation (NFV); Architectural Framework"./
[i.7] GSMA PRD N2020.01: "VoLTE Service Description and Implementation Guideline", V1.0, December 2014./
[i.8] Tomi Raty, Jouko Sankala, and Markus Shivonen: "Network traffic analysing and monitoring locations in the IMS," IEEETM 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA), Porto, Portugal, 30th August - 3rd September, 2005, pp. 362-369./
[i.9] Paolo De Lutiis and Dario Lombardo: "An innovative way to analyse large ISP data for IMS security and monitoring" IEEETM 13th International Conference on Intelligence in Next Generation Networks (INGN), Bordeaux, France, 26-29 October, 2009, pp. 1-6. /
[i.10] Ari Takanen: "Recommendations for VoIP and IMS security" 3GPP Release 8 IMS Implementation Workshop, Sophia Antipolis, 24-25 November, 2010./
[i.11] D. Wang and Chen Liu: "Model based vulnerability analysis of IMS network," Academy Publisher, Journal of Networks, Vol. 4, No. 4, June 2009, pp. 254-262./
[i.12] ETSI GS NFV-REL 004: "Network Functions Virtualisation (NFV); Assurance; Report on Active Monitoring and Failure Detection"./
[i.13] ETSI GR NFV-SEC 009: "Network Functions Virtualisation (NFV); NFV Security; Report on use cases and technical approaches for multi-layer host administration".
9. Qualification of ETSI:
ETSI is recognized under the provisions of ITU-T Recommendations A.5 and A.6. Qualifying information is on file at TSB.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5