{"id":415893,"date":"2024-10-20T06:07:46","date_gmt":"2024-10-20T06:07:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30427740-dc-2022\/"},"modified":"2024-10-26T11:23:21","modified_gmt":"2024-10-26T11:23:21","slug":"bsi-22-30427740-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30427740-dc-2022\/","title":{"rendered":"BSI 22\/30427740 DC 2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30427740-NC.pdf <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | ISO_IEC DIS 27033-7 ed.1 – id.80972 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Document structure 6 Overview 6.1 General 6.2 Description of network virtualization <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.3 Security model 6.3.1 Model of network virtualization security <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3.2 Network virtualization components <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7 Security threats 8 Security requirements 8.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 8.2 Confidentiality 8.3 Integrity 8.4 Availability 8.5 Authentication <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8.6 Access control 8.7 Non-repudiation <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 9 Security controls 9.1 General 9.2 Virtual network infrastructure security 9.3 Virtual network function security <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 9.4 Virtual network management security 9.4.1 SDN controller security <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 9.4.2 NFV orchestrator security 10 Design techniques and considerations 10.1 Overview <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10.2 Integrity protection of platform 10.3 Hardening for network virtualization 10.4 API authentication and authorization <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10.5 Software defined security for virtual network <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex\u20acA (Informative) Use cases of network virtualization <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex\u20acB (Informative) Detailed security threat description of network virtualization <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 27033-7. Information technology. Network security – Part 7. Guidelines for network virtualization security<\/b><\/p>\n |