{"id":415893,"date":"2024-10-20T06:07:46","date_gmt":"2024-10-20T06:07:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30427740-dc-2022\/"},"modified":"2024-10-26T11:23:21","modified_gmt":"2024-10-26T11:23:21","slug":"bsi-22-30427740-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30427740-dc-2022\/","title":{"rendered":"BSI 22\/30427740 DC 2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30427740-NC.pdf <\/td>\n<\/tr>\n
3<\/td>\nISO_IEC DIS 27033-7 ed.1 – id.80972 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Symbols and abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 Document structure
6 Overview
6.1 General
6.2 Description of network virtualization <\/td>\n<\/tr>\n
12<\/td>\n6.3 Security model
6.3.1 Model of network virtualization security <\/td>\n<\/tr>\n
13<\/td>\n6.3.2 Network virtualization components <\/td>\n<\/tr>\n
14<\/td>\n7 Security threats
8 Security requirements
8.1 General <\/td>\n<\/tr>\n
15<\/td>\n8.2 Confidentiality
8.3 Integrity
8.4 Availability
8.5 Authentication <\/td>\n<\/tr>\n
16<\/td>\n8.6 Access control
8.7 Non-repudiation <\/td>\n<\/tr>\n
17<\/td>\n9 Security controls
9.1 General
9.2 Virtual network infrastructure security
9.3 Virtual network function security <\/td>\n<\/tr>\n
18<\/td>\n9.4 Virtual network management security
9.4.1 SDN controller security <\/td>\n<\/tr>\n
19<\/td>\n9.4.2 NFV orchestrator security
10 Design techniques and considerations
10.1 Overview <\/td>\n<\/tr>\n
20<\/td>\n10.2 Integrity protection of platform
10.3 Hardening for network virtualization
10.4 API authentication and authorization <\/td>\n<\/tr>\n
21<\/td>\n10.5 Software defined security for virtual network <\/td>\n<\/tr>\n
22<\/td>\nAnnex\u20acA (Informative) Use cases of network virtualization <\/td>\n<\/tr>\n
25<\/td>\nAnnex\u20acB (Informative) Detailed security threat description of network virtualization <\/td>\n<\/tr>\n
29<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 27033-7. Information technology. Network security – Part 7. Guidelines for network virtualization security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n30<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":415901,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-415893","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/415893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/415901"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=415893"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=415893"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=415893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}