Network Functions Virtualisation (NFV); Security Guide; Report on Security Aspects and Regulatory Concerns

DGS/NFV-SEC006

General Information

Status
Published
Publication Date
17-Apr-2016
Technical Committee
Current Stage
12 - Completion
Due Date
06-May-2016
Completion Date
18-Apr-2016
Ref Project

Buy Standard

Standard
ETSI GS NFV-SEC 006 V1.1.1 (2016-04) - Network Functions Virtualisation (NFV); Security Guide; Report on Security Aspects and Regulatory Concerns
English language
29 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

ETSI GS NFV-SEC 006 V1.1.1 (2016-04)






GROUP SPECIFICATION
Network Functions Virtualisation (NFV);
Security Guide;
Report on Security Aspects and Regulatory Concerns
Disclaimer
The present document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry
Specification Group (ISG) and represents the views of those members who participated in this ISG.
It does not necessarily represent the views of the entire ETSI membership.

---------------------- Page: 1 ----------------------
2 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)



Reference
DGS/NFV-SEC006
Keywords
NFV, regulation, security

ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2016.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI

---------------------- Page: 2 ----------------------
3 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
Contents
Intellectual Property Rights . 5
Foreword . 5
Modal verbs terminology . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 6
3 Definitions and abbreviations . 7
3.1 Definitions . 7
3.2 Abbreviations . 7
4 Security design guide . 8
4.1 Overview and introduction . 8
4.2 Risk, risk analysis, and risk management . 9
4.3 Design for assurance . 10
4.4 Secure by default . 12
4.5 Domain of Attack model . 12
4.6 Regulatory and conformance issues . 13
4.7 Interoperability considerations . 13
4.7.1 Syntactic interoperability . 13
4.7.2 Semantic interoperability . 13
4.7.3 Electrical and mechanical interoperability . 14
4.7.4 Radio communication interoperability. 14
Annex A (informative): Pro forma of Security and Regulatory Concerns for use in ETSI ISG
NFV GSs . 15
A.1 Risk analysis and assessment . 15
A.2 Countermeasure deployment . 16
A.2.1 Identity management . 16
A.2.2 Integrity protection and verification . 16
A.2.3 Confidentiality . 16
A.2.4 Availability and resilience . 16
A.2.5 Trust framework . 16
A.3 Regulatory conformance . 17
A.3.0 Introduction . 17
A.3.1 Data protection and Privacy . 17
A.3.2 Retention of Data. 22
A.3.3 Lawful Interception . 22
A.3.4 Export control of cryptographic material . 22
A.3.5 Others . 23
Annex B (informative): Summary of attack vectors as applied in NFV . 24
B.1 Interception attacks. 24
B.2 Manipulation attacks . 24
B.3 Identity based attacks . 24
Annex C (informative): Cryptographic measures for NFV protection . 25
C.1 Cardinality of relationships . 25
C.2 Algorithm selection and key size . 25
Annex D (informative): Bibliography . 27
ETSI

---------------------- Page: 3 ----------------------
4 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
Annex E (informative): Authors & contributors . 28
History . 29


ETSI

---------------------- Page: 4 ----------------------
5 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions
Virtualisation (NFV).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

ETSI

---------------------- Page: 5 ----------------------
6 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
1 Scope
The present document is a guide to developers of NFV related documents and applications in means to address the
security aspects and regulatory concerns as they impact the security of deployed networks that conform with these
documents and applications. The present document contains detailed descriptions of security concerns, attacks, as well
as an overview of regulatory concerns and how they can be treated in system design to give the highest level of
assurance that the resultant system is secure and complies with current regulation and best practice. The present
document is intended for use by developers of NFV documents and the guidance is given in a manner that assists
non-experts in security and regulation to prepare such documents.
In addition to the guidance and explanatory text the present document contains, in annex A, a pro forma template for
use in ETSI ISG NFV documents to capture the security concerns and mitigations that apply.
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
Not applicable.
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 102 165-1: "Telecommunications and Internet converged Services and Protocols for
Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for
Threat, Risk, Vulnerability Analysis".
[i.2] ISO/IEC 15408-2: "Information technology - Security techniques - Evaluation criteria for IT
security - Part 2: Security functional requirements".
[i.3] ISO/IEC 15408-1: "Information technology - Security techniques - Evaluation criteria for IT
security - Part 1: Introduction and general model".
[i.4] Privacy Impact Assessment Handbook (2009).
NOTE: Available at http://www.piawatch.eu/node/48.
[i.5] ETSI TR 103 309: "CYBER; Secure by Default - platform security technology".
[i.6] Directive 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the
harmonisation of the laws of the Member States relating to the making available on the market of
radio equipment and repealing Directive 1999/5/EC.
ETSI

---------------------- Page: 6 ----------------------
7 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
[i.7] Directive 2014/30/EU of the European Parliament and of the Council of 26 February 2014 on the
harmonisation of the laws of the Member States relating to electromagnetic compatibility (recast)
(Text with EEA relevance).
[i.8] Regulation (EC) No 765/2008 of the European Parliament and of the Council of 9 July 2008
setting out the requirements for accreditation and market surveillance relating to the marketing of
products and repealing Regulation (EEC) No 339/93 (Text with EEA relevance).
NOTE: Available at http://eur-lex.europa.eu/
[i.9] ETSI GS NFV-SEC 004: "Network Functions Virtualisation (NFV); NFV Security; Privacy and
Regulation; Report on Lawful Interception Implication".
[i.10] ETSI GS NFV-SEC 010: "Network Functions Virtualisation (NFV); NFV Security; Report on
Retained Data problem statement and requirements".
[i.11] ETSI GS NFV-SEC 003: "Network Functions Virtualisation (NFV); NFV Security; Security and
Trust Guidance".
[i.12] UK Information Commissioners Office: Conducting Privacy Impact Assessments Code of
Practice.
NOTE: Available at https://ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf.
[i.13] ETSI ETR 332:"Security Techniques Advisory Group (STAG); Security requirements capture".
[i.14] ETSI ES 202 383: "Telecommunications and Internet converged Services and Protocols for
Advanced Networking (TISPAN); Security Design Guide; Method and proforma for defining
Security Targets".
[i.15] ETSI ES 202 382: "Telecommunications and Internet converged Services and Protocols for
Advanced Networking (TISPAN); Security Design Guide; Method and proforma for defining
Protection Profiles".
[i.16] Domains of Attack list and descriptions.
NOTE: Available at http://www.mitre.org. Please consult this website for detailed descriptions of each attack:
http://capec.mitre.org/data/graphs/3000.html.
[i.17] IEC 60906-2: "IEC system of plugs and socket-outlets for household and similar purposes -
Part 2: Plugs and socket-outlets 15 A 125 V a.c. and 20 A 125 V a.c.".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 102 165-1 [i.1] apply.
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI TS 102 165-1 [i.1] and the following apply:
PP Protection Profile
TVRA Threat Vulnerability Risk Analysis
ETSI

---------------------- Page: 7 ----------------------
8 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
4 Security design guide
4.1 Overview and introduction
Security cannot be an afterthought, and has to be considered throughout the planning/development/deployment/runtime
lifecycle. Unfortunately, effective security design is not trivial and there is a constant tension between functionality and
security that inherently couples the two. A significant danger is that in progressing functionality it will become harder
and harder to provide deeply rooted security in system designs. As with design of any type there are a number of ways
to approach security in system design. The primary starting point in much of security is to identify an attack and pair it
with a means to thwart the attack, such that a tuple of {issue, mitigation} will exist across the system.

Figure 1: Illustration of a threat tree to identify forms of threat in systems
Whilst an understanding of threat trees (see figure 1) is useful it is not sufficient and has to be mapped to a wider
understanding of countermeasures. For example the tuple {masquerade, authentication} suggest that if the
authentication element is implemented properly it will counter masquerade, but the pre-requisites of authentication
include identity management and credential management. If authentication is a cryptographic process further issues
arise that include the viability of the authentication algorithms over time (and associated cryptographic strength), the
means to distribute credentials (the pairing of identity and the cryptographically significant data used to assert it), and so
forth.
In the regulatory domain the mind-map shown in figure 2 identifies some of the relationships between protection
technology and attack types, and the relationship between privacy and regulation is highlighted. The latter is important
as regulation exists to protect the obligation or right to privacy as identified in a number of acts and laws, however there
are a number of exceptions to the right to privacy identified by the same broad set of acts and laws that generally give
rights for law enforcement to have reasonable rights to protect the wider population sometimes with a short term risk to
the individual. Such exceptions include the need to provide for Lawful Interception, and to retain data in the network in
support of law enforcement.
ETSI

---------------------- Page: 8 ----------------------
9 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)

Figure 2: Mind-map illustrating complexity of privacy and privacy protection
In designing a secure system an understanding of the impact of attack has to be developed. For example, when two
functions share a host, a Denial of Service attack on one may affect the other. The mitigation may be to not co-host
high-priority functions with low-priority functions.
4.2 Risk, risk analysis, and risk management
Designing for the effective security of a system cannot be done without a reasonable understanding of risk, there are a
large number ways of modelling security in systems that look variously at the process (Identify, Mitigate, Monitor as a
continuous loop), and at the interactions of assets. The model given in ETSI TS 102 165-1 [i.1] and copied below makes
a number of assumptions including:
• systems are compositions of a set of assets;
• assets may have inherent vulnerabilities;
• a vulnerability when discovered with a viable threat becomes a weakness;
• exploitation of a weakness leads to something unwanted in the system (unwanted incident); and,
• threat agents are used to enact threats and many threat agents may work together to exploit a weakness.
ETSI

---------------------- Page: 9 ----------------------
10 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)

Figure 3: Generic security TVRA model from ETSI TS 102 165-1 [i.1]
There are a number of questions that arise from the generic model shown in figure 3 and these include:
• What are the assets of my system?
• How do I determine the vulnerabilities and when they become exploitable weaknesses?
• How do I protect my system?
The present document is part of the process in the identification of assets and their vulnerabilities by recommending a
set of topics to be considered in every deliverable of ISG NFV.
Threats are potential events that can cause a system to respond in an unexpected or damaging way. It is useful to
categorize threats to determine effective and deployable mitigation strategies. The identification and analysis of NFV
relevant security threats (general and application specific) should include the following categories:
• Spoofing of identity (masquerade).
• Tampering with data (manipulation).
• Inappropriate information disclosure.
• Denial of service.
• Improper elevation of privileges.
Clauses 4.3 and 4.4 describe a number of strategies for identifying the threats in general terms in the NFV context.
4.3 Design for assurance
The Design for Assurance paradigm is closely aligned to the design for test paradigm. The aim of these paradigms is to
ensure that when designing a system an independent tester can validate that the system actually performs to the design
specification. The primary difference between design for test and design for assurance is that in the latter there are
specific security claims that are being made and verified.
ETSI

---------------------- Page: 10 ----------------------
11 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)

Figure 4: ETSI's Design for Assurance document suite
The core aspects of Design for Assurance are as follows: to identify the assets of the system and through a risk analysis
(identified by method in ETSI TS 102 165-1 [i.1]); Identify the security architecture and functionality to eliminate
critical risks and to substantially reduce the number of major risks; Reassess the risk with the assets required for risk
reduction and management; repeat. In this approach Design for Assurance is thus not very far removed from any other
good design practice - the core difference is that in defining a security measure there is a clear path to its justification
and thus a rationale for its presence which is interpreted as a claim for the security assurance it delivers. Thus if the
concern is interception across a broadcast medium (e.g. a radio link) the attack model will be expected to show the
likelihood of an attacker making the interception and the impact of that attack, then in applying (say) encryption to the
link it will show how the likelihood of interception or the impact of an interception modifies the risk to the user and the
system. The model will also show how the countermeasure (i.e. encryption in this case) modifies the system and what,
if any, new risks are introduced. This then gives a measure of the cost benefit of the provision of encryption technology
and the level of increased protection in such a way that it can be, if necessary, independently validated.
There are a number of major players in the design for assurance domain and ETSI, as shown in figure 4, has developed
its guidance from the Common Criteria (ISO/IEC 15408-2 [i.2] and ISO/IEC 15408-1 [i.3]) and incorporated many of
the key points into the "Making Better Standards" guidance published by ETSI CTI with support from ETSI TC MTS.
Since the original publication of this guidance the Common Criteria experts groups have recommended a change in
approach that is more closely aligned to the approach taken by ETSI with the adoption of a principle of Community
Protection Profiles (cPPs) to be developed by industry experts in a similar way to standards.
ETSI

---------------------- Page: 11 ----------------------
12 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
4.4 Secure by default
The secure by default initiative documented in ETSI TR 103 309 [i.5] is a philosophy in which real business problems
are identified and security solutions to the problems are solved at root cause, rather than by applying patches or
'stop-gap' measures to address particular issues. The emphasis is therefore on security mechanisms embedded in core
device functions; supplied literally 'by default' in products instead of being added afterwards via updates or complex
configuration. It is considered that an understanding of the Domain of Attack model described in clause 4.5, the
appreciation of risk described in clause 4.2, and the concept of security assurance described in clause 4.3, when taken
together and applied before a system is deployed are major components and strategies that support Secure by default.
New features of this nature require fundamental changes to devices, hence development can take time. Promoting
adoption may require that technical solutions be identified when they are still maturing; prototypes exist to verify the
concept, however market support is required in order to justify investment in refining a product.
Finally, it is clear that simply developing technical components is almost never sufficient to solve problems in the real
world. Practical guidance is needed to ensure these components can be integrated appropriately into deployed systems.
As well as identifying technologies, it is necessary to point out relevant good practice guidance where it exists. This has
to include the Human element as very often a technically sound and secure system is made irrelevant if a door is left
open by a disgruntled or forgetful employee.
4.5 Domain of Attack model
The domain of attack model [i.16] is simple in theory and divides attack vectors into sets:
• Social Engineering:
- The manipulation and exploitation of people to attack the system or to gather information about the
system and its operation in order to perform future attacks. In most cases the adversary never comes
face-to-face with the victim.
• Supply Chain:
- Everything and anything brought into the system is part of the supply chain. The supply chain has to be
trusted sufficiently that when an asset is introduced to the system it can be trusted to work. This requires
understanding of not just software and hardware products, but wider issues of distribution, support, tools
and so forth. Failures in the supply chain, or attacks introduced through the supply chain, have to be
considered in the general security model and means to give supply chain assurance and validation
defined.
• Communications:
- The model of establishment of communication between 2 parties has to meet certain goals of
confidentiality, availability and authenticity. Attacks against communication may attack the
confidentiality by intercepting the communication, or attack the availability by disturbing the protocol in
some way.
• Software:
- Software is the backbone of the ISG NFV and software is one of the assets of the system that tends to
exhibit a number of core vulnerabilities that when exploited lead to a number of forms of unwanted
incident. The set of checks against software design to mitigate potential vulnerabilities are extensive and
form the core of the checklist of the present document. Attack vectors will also often be software based
and may attack on multiple paths including through operating systems, programming languages and their
associated compile and link facilities.
• Physical Security:
- Often refers to the premises and to access control for the installed NFV hardware.
• Hardware:
- Breaking the hardware will break the NFV and anything built on it.
ETSI

---------------------- Page: 12 ----------------------
13 ETSI GS NFV-SEC 006 V1.1.1 (2016-04)
As the ISG NFV initiative involves hardware, software and communications this checklist of attack vectors is a useful
tool to verify that all reasonable steps have been taken in managing the security and privacy risks.
4.6 Regulatory and conformance issues
Security measures often have to be implemented to give assurance of conformance to regulation. In security there are a
number of regulations and restrictions that have to be borne in mind and these include (the list is indicative as national
legislation may extend th
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.