ISO/IEC FDIS 27033-7
(Main)Information technology – Network security — Part 7: Guidelines for network virtualization security
Information technology – Network security — Part 7: Guidelines for network virtualization security
Technologies de l'information — Sécurité des réseaux — Partie 7: Lignes directrices pour la sécurité de la virtualisation des réseaux
General Information
Buy Standard
Standards Content (Sample)
ISO/IEC JTC1/SC 27 WG4 Style Definition: Heading 1: Indent: Left: 0 pt, First line: 0
pt, Tab stops: Not at 21.6 pt
Date : 2023-05-12
Style Definition: Heading 2: Font: Bold, Tab stops: Not at
18 pt
ISO/IEC DIS FDIS 27033--7 :2023(E)
Style Definition: Heading 3: Font: Bold
ISO/IEC JTC 1/SC 27/WG 4
Style Definition: Heading 4: Font: Bold
Secretariat: DIN
Style Definition: Heading 5: Font: Bold
Date: 2023-07-14 Style Definition: Heading 6: Font: Bold
Style Definition: zzCopyright
Information technology — Network security — Part 7: Guidelines for
Style Definition: ANNEX
network virtualization security
Style Definition: AMEND Terms Heading: Font: Bold
Style Definition: AMEND Heading 1 Unnumbered: Font: Bold
Style Definition: List Bullet: Indent: Left: 0 pt, Hanging: 18
pt, No bullets or numbering, Tab stops: 18 pt, List tab
Style Definition: List Bullet 2: Indent: Left: 14.15 pt,
Hanging: 18 pt, No bullets or numbering, Tab stops: 32.15
pt, List tab
Style Definition: List Bullet 3: Indent: Left: 28.3 pt,
Hanging: 18 pt, No bullets or numbering, Tab stops: 46.3 pt,
List tab
Style Definition: List Bullet 4: Indent: Left: 42.45 pt,
Hanging: 18 pt, No bullets or numbering, Tab stops: 60.45
pt, List tab
Style Definition: List Bullet 5: Indent: Left: 56.6 pt,
Hanging: 18 pt, No bullets or numbering, Tab stops: 74.6 pt,
List tab
Style Definition: List Number: Indent: Left: 0 pt, Hanging:
18 pt, No bullets or numbering, Tab stops: 18 pt, List tab
Style Definition: List Number 5: Indent: Left: 56.6 pt,
Hanging: 18 pt, No bullets or numbering, Tab stops: 74.6 pt,
List tab
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
---------------------- Page: 1 ----------------------
Formatted: Section start: New page
© ISO/IEC 2023
Formatted: Default Paragraph Font
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no
Formatted: Default Paragraph Font
part of this publication may be reproduced or utilized otherwise in any form or by any means,
Formatted: No page break before, Adjust space between
electronic or mechanical, including photocopying, or posting on the internet or an intranet, without
Latin and Asian text, Adjust space between Asian text and
prior written permission. Permission can be requested from either ISO at the address below or numbers
ISO's member body in the country of the requester.
Formatted: Adjust space between Latin and Asian text,
Adjust space between Asian text and numbers
ISO copyright officeCopyright Office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva Formatted: Adjust space between Latin and Asian text,
Adjust space between Asian text and numbers
Phone: + 41 22 749 01 11
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland. Formatted: Adjust space between Latin and Asian text,
Adjust space between Asian text and numbers
---------------------- Page: 2 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Space After: 30 pt, Line spacing: Exactly 12 pt
Formatted: Font: 11.5 pt
Formatted: Font: Bold
Contents Formatted: None, Tab stops: Not at 20 pt + 28 pt
Foreword . i
Introduction. ii
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 2
5 Overview . 3
5.1 General . 3
5.2 Description of network virtualization . 3
5.3 Security model . 4
5.3.1 Model of network virtualization security . 4
5.3.2 Network virtualization components . 5
6 Security threats . 6
7 Security recommendations . 7
7.1 General . 7
7.2 Confidentiality . 7
7.3 Integrity . 8
7.4 Availability . 8
7.5 Authentication . 8
7.6 Access control . 8
7.7 Non-repudiation . 8
8 Security controls . 10
8.1 General . 10
8.2 Virtual network infrastructure security . 10
8.3 Virtual network function security . 11
© ISO/IEC 2023 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Font: 11.5 pt
Formatted: Justified
8.4 Virtual network management security . 12
8.4.1 SDN controller security . 12
8.4.2 NFV orchestrator security . 12
9 Design techniques and considerations . 12
9.1 Overview . 12
9.2 Integrity protection of platform . 13
9.3 Hardening for network virtualization . 14
9.4 API authentication and authorization . 14
9.5 Software defined security for virtual network . 14
Annex A (Informative) Use cases of network virtualization . 16
A.1 Software-defined wide-area network . 16
A.2 Network slicing . 16
A.3 Virtual WAF . 17
A.4 Cloud CDN with centralized control . 18
Annex B (Informative) Detailed security threat description of network virtualization . 19
B.1 Security threats to virtual network infrastructure . 19
B.2 Security threats to virtual network functions . 19
B.2.1 Security threats to virtual network function . 19
B.2.2 Security threats to software-defined networks . 20
B.3 Security threats to virtual network management . 21
B.3.1 General . 21
B.3.2 Software-defined networks controller security . 21
B.3.3 Management and orchestration security . 21
B.3.4 Interface security . 22
B.4 Virtualization-specific threats . 22
B.4.1 Threats to security segmentation . 22
B.4.2 Threats to resource exhaustion . 22
iv © ISO/IEC 2023 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Space After: 30 pt, Line spacing: Exactly 12 pt
Formatted: Font: 11.5 pt
Formatted: Font: Bold
B.4.3 Threats to central mangement . 22
Bibliography . 23
Foreword . vi
Introduction. vii
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview . 4
5.1 General . 4
5.2 Description of network virtualization . 5
5.3 Security model . 5
5.3.1 Model of network virtualization security . 5
5.3.2 Network virtualization components . 8
6 Security threats . 9
7 Security recommendations . 10
7.1 General . 10
7.2 Confidentiality . 10
7.3 Integrity . 10
7.4 Availability . 11
7.5 Authentication . 11
7.6 Access control . 11
7.7 Non-repudiation . 11
8 Security controls . 12
8.1 General . 12
8.2 Virtual network infrastructure security . 13
8.3 Virtual network function security . 13
© ISO/IEC 2023 – All rights reserved v
---------------------- Page: 5 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Font: 11.5 pt
Formatted: Justified
8.4 Virtual network management security . 14
8.4.1 SDN controller security . 14
8.4.2 NFV orchestrator security . 15
9 Design techniques and considerations . 15
9.1 Overview . 15
9.2 Integrity protection of platform . 16
9.3 Hardening for network virtualization . 16
9.4 API authentication and authorization . 16
9.5 Software defined security for virtual network . 17
Annex A (informative) Use cases of network virtualization . 19
A.1 Software-defined wide-area network . 19
A.2 Network slicing . 20
A.2 — Network slicing based on SDN and NFV . 21
A.3 Virtual WAF . 21
A.4 Cloud CDN with centralized control . 22
Annex B (informative) Detailed security threat description of network virtualization . 23
B.1 Security threats to virtual network infrastructure . 23
B.2 Security threats to virtual network functions . 23
B.2.1 Security threats to virtual network function . 23
B.2.2 Security threats to software-defined networks . 24
B.3 Security threats to virtual network management . 25
B.3.1 General . 25
B.3.2 Software-defined networks controller security . 25
B.3.3 Management and orchestration security . 25
B.3.4 Interface security . 25
B.4 Virtualization-specific threats . 26
B.4.1 Threats to network segmentation . 26
vi © ISO/IEC 2023 – All rights reserved
---------------------- Page: 6 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Space After: 30 pt, Line spacing: Exactly 12 pt
Formatted: Font: 11.5 pt
Formatted: Font: Bold
B.4.2 Threats to resource exhaustion . 26
B.4.3 Threats to centralized management . 26
Bibliography . 27
© ISO/IEC 2023 – All rights reserved vii
---------------------- Page: 7 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Font: 11.5 pt
Formatted: Justified
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Formatted: English (United Kingdom)
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of documentsdocument should be noted. This document was drafted in accordance with Formatted: English (United Kingdom)
the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directiveswww.iso.org/directives
Formatted: English (United Kingdom)
or www.iec.ch/members_experts/refdocswww.iec.ch/members_experts/refdocs).
Formatted: English (United Kingdom)
Attention is drawnISO and IEC draw attention to the possibility that some of the elementsimplementation Formatted: English (United Kingdom)
of this document may beinvolve the subjectuse of (a) patent(s). ISO and IEC take no position concerning
Formatted: English (United Kingdom)
the evidence, validity or applicability of any claimed patent rights. in respect thereof. As of the date of
Formatted: English (United Kingdom)
publication of this document, ISO and IEC had not received notice of (a) patent(s) which may be required
Formatted: English (United Kingdom)
to implement this document. However, implementers are cautioned that this may not represent the latest
Formatted: English (United Kingdom)
information, which may be obtained from the patent database available at www.iso.org/patents and
Formatted: English (United Kingdom)
https://patents.iec.ch. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the Formatted: English (United Kingdom)
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see https://patents.iec.ch). Formatted: English (United Kingdom)
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
Formatted: English (United Kingdom)
www.iso.org/iso/foreword.htmlwww.iso.org/iso/foreword.html. In the IEC, see
www.iec.ch/understanding-standardswww.iec.ch/understanding-standards.
Formatted: English (United Kingdom)
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Formatted: Pattern: Clear
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
Formatted: Pattern: Clear
Formatted: Pattern: Clear
A list of all parts in the ISO/IEC 27033 series can be found on the ISO and IEC websites.
Formatted: Pattern: Clear
Formatted: Pattern: Clear
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national- Formatted: Pattern: Clear
committeeswww.iso.org/members.html and www.iec.ch/national-committees.
Formatted: English (United Kingdom)
Formatted: English (United Kingdom)
viii © ISO/IEC 2023 – All rights reserved
---------------------- Page: 8 ----------------------
ISO/IEC FDIS 27033-7:2023(E) Formatted: Space After: 30 pt, Line spacing: Exactly 12 pt
Formatted: Font: 11.5 pt
Formatted: Font: Bold
Introduction
The purpose of this document is to address the key challenges and risks of network virtualization
security. Network virtualization includes virtual network infrastructure, virtual network function, virtual
control and resource management. This document aims to:
1) identify security risks of network virtualization. ; Formatted: List Continue 1, No bullets or numbering, Tab
stops: 19.85 pt, Left + 39.7 pt, Left + 59.55 pt, Left + 79.4
pt, Left + 99.25 pt, Left + 119.05 pt, Left + 138.9 pt, Left +
2) propose a network virtualization security model.;
158.75 pt, Left + 178.6 pt, Left + 198.45 pt, Left
3) propose security guidelines for virtual network infrastructure, virtual network function, virtual
control and resource management.
This document intends to help stakeholders in understanding the main characteristics of network
virtualization security. For example, this document can help software and hardware suppliers to securely
design and develop products that implement network virtualization, and help operators to evaluate the
security of these products and deploy them securely for network services. By proposing security
guidelines, this document aims to help the industry to improve system security that is built on network
virtualization technology.
The target audience can include the network equipment vendors, network operators, internet service
providers and software service providers.
With the rapid development of IT technologies such as cloud computing, IT systems and communication
systems are increasingly evolving with the adoption of virtualization technology. Virtualization enables
systems to have high agility, flexibility and scalability with low cost, but at the same time, introduces lots
ofmany security challenges.
© ISO/IEC 2023 – All rights reserved ix
---------------------- Page: 9 ----------------------
Formatted: Font: 11.5 pt
FINAL DRAFT INTERNATIONAL STANDARD ISO/IEC FDIS 27033-7:2023(E)
Formatted: Font: 11.5 pt
Formatted: Left
Information technology —Network security—Part 7: Guidelines
for network virtualization security
1 Scope
This document aims to identify security risks of network virtualization and proposes guidelines for the
implementation of network virtualization security.
Overall, this document intends to considerably aid the comprehensive definition and implementation of
security for any organization’s virtualization environments. It is aimed at users and implementers who
are responsible for the implementation and maintenance of the technical controls required to provide
secure virtualization environments.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https://www.iso.org/obphttps://www.iso.org/obp
— IEC Electropedia: available at https://www.electropedia.orghttps://www.electropedia.org
3.1
network virtualization
technology that enables the creation of logically isolated network partitions over shared physical
network infrastructures so that multiple heterogeneous virtual networks can simultaneously coexist
over the shared infrastructures
Formatted: Pattern: Clear
Note 1 to entry: Network virtualization allows the aggregation of multiple resources and makes the aggregated
resources appear as a single resource. Formatted: Pattern: Clear
Formatted: Pattern: Clear
[SOURCE: ISO/IEC TR 29181-1:2012,3.3]
Formatted: Pattern: Clear
Formatted: std_year
3.2
Formatted: std_section
network functions virtualization
NFV
Formatted: Line spacing: At least 11.5 pt
technology that enables the creation of logically isolated network partitions over shared physical
Formatted: Line
...
FINAL
INTERNATIONAL ISO/IEC
DRAFT
STANDARD FDIS
27033-7
ISO/IEC JTC 1/SC 27
Information technology – Network
Secretariat: DIN
security —
Voting begins on:
2023-07-31
Part 7:
Voting terminates on:
Guidelines for network virtualization
2023-09-25
security
RECIPIENTS OF THIS DRAFT ARE INVITED TO
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPOR TING
DOCUMENTATION.
IN ADDITION TO THEIR EVALUATION AS
Reference number
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO-
ISO/IEC FDIS 27033-7:2023(E)
LOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN-
DARDS TO WHICH REFERENCE MAY BE MADE IN
NATIONAL REGULATIONS. © ISO/IEC 2023
---------------------- Page: 1 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
FINAL
INTERNATIONAL ISO/IEC
DRAFT
STANDARD FDIS
27033-7
ISO/IEC JTC 1/SC 27
Information technology – Network
Secretariat: DIN
security —
Voting begins on:
Part 7:
Voting terminates on:
Guidelines for network virtualization
security
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
RECIPIENTS OF THIS DRAFT ARE INVITED TO
ISO copyright office
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
CP 401 • Ch. de Blandonnet 8
THEY ARE AWARE AND TO PROVIDE SUPPOR TING
CH-1214 Vernier, Geneva
DOCUMENTATION.
Phone: +41 22 749 01 11
IN ADDITION TO THEIR EVALUATION AS
Reference number
Email: copyright@iso.org
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO
ISO/IEC FDIS 270337:2023(E)
Website: www.iso.org
LOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
Published in Switzerland
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN
DARDS TO WHICH REFERENCE MAY BE MADE IN
ii
© ISO/IEC 2023 – All rights reserved
NATIONAL REGULATIONS. © ISO/IEC 2023
---------------------- Page: 2 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview . 4
5.1 General . 4
5.2 Description of network virtualization . 4
5.3 Security model . 4
5.3.1 Model of network virtualization security . 4
5.3.2 Network virtualization components . 6
6 Security threats . 6
7 Security recommendations . 7
7.1 General . 7
7.2 Confidentiality . 7
7.3 Integrity . 8
7.4 Availability . 8
7.5 Authentication . 8
7.6 Access control . 8
7.7 Nonrepudiation . 9
8 Security controls . 9
8.1 General . 9
8.2 Virtual network infrastructure security . 10
8.3 Virtual network function security . 10
8.4 Virtual network management security . 11
8.4.1 SDN controller security . 11
8.4.2 NFV orchestrator security . 11
9 Design techniques and considerations .12
9.1 Overview .12
9.2 Integrity protection of platform . 13
9.3 Hardening for network virtualization . 13
9.4 API authentication and authorization. 13
9.5 Software defined security for virtual network . 13
Annex A (informative) Use cases of network virtualization .15
Annex B (informative) Detailed security threat description of network virtualization .18
Bibliography .22
iii
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and nongovernmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of
any claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC
had not received notice of (a) patent(s) which may be required to implement this document. However,
implementers are cautioned that this may not represent the latest information, which may be obtained
from the patent database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall
not be held responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understandingstandards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 27033 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/nationalcommittees.
iv
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
Introduction
The purpose of this document is to address the key challenges and risks of network virtualization
security. Network virtualization includes virtual network infrastructure, virtual network function,
virtual control and resource management. This document aims to:
1) identify security risks of network virtualization;
2) propose a network virtualization security model;
3) propose security guidelines for virtual network infrastructure, virtual network function, virtual
control and resource management.
This document intends to help stakeholders in understanding the main characteristics of network
virtualization security. For example, this document can help software and hardware suppliers to
securely design and develop products that implement network virtualization, and help operators to
evaluate the security of these products and deploy them securely for network services. By proposing
security guidelines, this document aims to help the industry to improve system security that is built on
network virtualization technology.
The target audience can include the network equipment vendors, network operators, internet service
providers and software service providers.
With the rapid development of IT technologies such as cloud computing, IT systems and communication
systems are increasingly evolving with the adoption of virtualization technology. Virtualization enables
systems to have high agility, flexibility and scalability with low cost, but at the same time, introduces
many security challenges.
v
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 5 ----------------------
FINAL DRAFT INTERNATIONAL STANDARD ISO/IEC FDIS 27033-7:2023(E)
Information technology – Network security —
Part 7:
Guidelines for network virtualization security
1 Scope
This document aims to identify security risks of network virtualization and proposes guidelines for the
implementation of network virtualization security.
Overall, this document intends to considerably aid the comprehensive definition and implementation of
security for any organization’s virtualization environments. It is aimed at users and implementers who
are responsible for the implementation and maintenance of the technical controls required to provide
secure virtualization environments.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org
3.1
network virtualization
technology that enables the creation of logically isolated network partitions over shared physical
network infrastructures so that multiple heterogeneous virtual networks can simultaneously coexist
over the shared infrastructures
Note 1 to entry: Network virtualization allows the aggregation of multiple resources and makes the aggregated
resources appear as a single resource.
[SOURCE: ISO/IEC TR 291811:2012,3.3]
3.2
network functions virtualization
NFV
technology that enables the creation of logically isolated network partitions over shared physical
networks so that heterogeneous collections of multiple virtual networks can simultaneously coexist
over the shared networks
Note 1 to entry: This includes the aggregation of multiple resources in a provider and appearing as a single
resource.
[SOURCE: ISO/IEC TR 22417:2017, 3.8]
1
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 6 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
3.3
software-defined networking
set of techniques that enables to directly program, orchestrate, control and manage network resources,
which facilitates the design, delivery and operation of network services in a dynamic and scalable
manner
[SOURCE: ITUT Y.3300:2014, 3.2.1]
3.4
virtual machine
virtual data processing system that appears to be at the disposal of a particular user, but whose
functions are accomplished by sharing the resources of a real data processing system
[SOURCE: ISO/IEC/IEEE 24765:2017, 3.4564]
3.5
container
isolated execution environment for running software that uses a virtualized operating system kernel
[SOURCE: ISO/IEC 221231:2023, 3.12.4]
3.6
orchestrator
tool that enables DevOps personas or automation working on their behalf to pull images from registries,
deploy those images into containers (3.5), and manage the running containers
[SOURCE: NIST SP 800190]
3.7
service function chain
ordered set of abstract functions and ordering constraints that are applied to packets and/or frames
and/or flows selected as a result of classification
[SOURCE: IETF RFC 7665, modified — removed “a service function chain defines an” at the beginning of
the definition and replaced “must” with “are” in the definition.]
4 Abbreviated terms
The following abbreviated terms apply to this document.
5G the fifth generation mobile network
AMF access and mobility management function
API application programming interface
AUSF authentication server function
CDN content delivery network
CIS centre for internet security
DoS denial of service
DDoS distributed denial of service
HMAC hashbased message authentication code
IDS intrusion detection system
2
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 7 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
IPS intrusion prevention system
MANO management and orchestration
MFA multifactor authentication
NF network function
NFV network functions virtualization
NFVO network function virtualization orchestrator
NRF network repository function
NSSF network slice selection function
OAM operation and management
OMC operation maintenance centre
OS operating system
SDWAN software-defined wide-area network
SDN software-defined networking
SFC service function chain
SMF session management function
UDM unified data management
UPF user plane function
vCPU virtual CPU
VIM virtualised infrastructure manager
vI/O virtual I/O
VNF virtualised network function
VNFM virtualised network function manager
VM virtual machine
vMemory virtual memory
VMM virtual machine manager
vRouter virtual router
vSwitch virtual switch
vWAF virtual web application firewall
VxLAN virtual extensible local area network
WAF web application firewall
3
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 8 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
5 Overview
5.1 General
Network virtualization provides a novel solution for the development and deployment of IT systems and
communication networks. It greatly reduces the cost of system maintenance, improves the utilization
of resources (such as computing, storage and networking) and the flexibility of IT systems or networks.
Cloud computing, the dominant platform for new IT systems and networks makes extensive use of
network virtualization technology. ISO/IEC 17788 provides an overview of cloud computing and its
concepts. ISO/IEC 17789 provides reference architecture for cloud computing. The typical use cases of
network virtualization include but are not limited to software-defined wide-area network (SD-WAN),
network slice, Virtual WAF and cloud CDN with centralized control, which are referred to in Annex A.
With the adoption of network virtualization, new security challenges to IT and communication systems
are introduced. Hence, traditional security protection solutions, which are often static, passive and
isolated, would not be effective for virtualized systems. New security solutions, which are dynamic,
proactive, coordinated and have intelligent management capability, are needed.
5.2 Description of network virtualization
Network virtualization abstracts physical resources, such as computing, networking, memory and
storage into standard and general-purpose entities. Each entity can be deployed with service functions
under the control of an orchestrator. Through virtualization, the limitation of physical resources are
broken, thus, the utilization of these resources are improved. The new virtual entities of these resources
are no longer limited by the way their physical counterparts are deployed.
In this document, network virtualization includes virtual network function and virtual network
connection. Virtual network function runs on virtual infrastructure (such as virtual computing,
virtual storage and virtual networking) using virtualization technologies (such as virtual machines
and containers). NFV is a common method to implement virtual network function. Virtual network
connection is applied to connect functional units on demand. The resulting network called SDN is
composed of virtual data links. An important characteristic of SDN is that all underlying resources
can be centrally managed and provide a standard interface that support software programming
based on the customer’s requirements. The introduction of SDN and NFV solutions changes the
network significantly: general-purpose hardware, virtual software function, programmable network
connections and services. With SDN and NFV, the cost of network operation and maintenance is cut
down, the utilization of resources (such as computing, storage and networking) is improved, the
flexibility of the network and service logic is increased, and the time-to-market of new services is
considerably decreased.
5.3 Security model
5.3.1 Model of network virtualization security
ISO/IEC 27033-1 provides a conceptual model of network security for network security risk and
management review. In general, network security includes three areas: security of the element, security
of network connection and security of management. In network virtualization, the element is a virtual
network function and the network connection is a virtual connection. This document further enhances
this model according to the technical characteristic of network virtualization, as shown in Figure 1.
4
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 9 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
Figure 1 — A conceptual model of network virtualization security risk areas
These changes brought about by network virtualization include:
a) Centralized controllers are included. The NFV orchestrator is responsible for the allocation,
scheduling and life cycle management of infrastructure and resources. The SDN controller is in
charge of the management of network topology and virtual data links. The NFV orchestrator and
SDN controller provide standard northbound API to support the scheduling of computing, network
and storage resources in the system in a software programmable manner, and also provide
collaborative, dynamic and optimized scheduling of network resources and services.
b) Network elements are now virtual elements (as opposed to physical elements) whose behaviour
is directed by the controller (NFV orchestrator). Network elements can be deployed or destroyed
on demand as software, with service logic and functionality programmed to run on virtualized
infrastructure (such as virtual machines and containers). ISO/IEC 21878 provides guidelines for
design and implementation of virtualized servers.
c) Data link has changed. Besides the physical data links, the adoption of new technologies such
as SDN and SFC provides efficient virtualized data links according to applications’ needs. New
technologies can also improve the efficiency of data transmission inside the system and meet the
transmission resiliency needs of cloud computing (such as load balancing and high reliability).
5
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 10 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
5.3.2 Network virtualization components
There are two forms of virtualization, which are bare metal architecture and hosted architecture. For
the reason of efficiency, in network virtualization, bare metal architecture is often used. The common
components and system architecture of network virtualization are as shown in Figure 2, which consists
of three parts: virtual network infrastructure, network functions and management system.
a) Virtual network infrastructure
This layer includes the virtual machine manager and host OS. Hardware resources include hardware
for bare metal, hardware for switch and router and hardware for storage. The virtualization machine
manager abstracts the hardware resources to form virtual computing, storage and network resources
for the upper layer to be invoked. The typical virtualization machine manager includes hypervisor for
virtual machines, and container engine for containers.
b) Virtual network functions
To deploy network functions as software based on virtual resources provided by virtualization, VNFs
can be applied, and can create ondemand data connections between VNFs under the scheduling of the
SDN controller. These VNFs, vRouter and vSwitch provide a standards-based approach to dynamically
provision network function from the SDN controller. SDNs enable dramatic improvements in network
function agility and automation, while substantially reducing the cost of network operations.
c) Management system
On the basis of the legacy management system such as OMC, the SDN controller and NFV orchestrator
are also added. The NFV orchestrator is responsible for the allocation, scheduling and life cycle
management of infrastructure and resources. The SDN controller is in charge of the management of
network topology and virtual data links.
Figure 2 — Components and architecture of network virtualization
There are three types of VNF deployments in bare metal architecture. Figure 2 shows the VM
deployment, container deployment that runs on host OS and container deployment that runs on VM.
6 Security threats
Network virtualization uses new technologies such as NFV and SDN, which bring the advantages of
resource flexibility and business agility. Meanwhile, the characteristics of these new technologies, as
well as the interoperation of these technologies also introduce new security threats.
The following security issues describe the security threats of network virtualization with reference to
the dimensions of the security threat description in ISO/IEC 27033-3. Annex B describes the security
threats from the dimension of network virtualization architecture that are shown in Figure 2, as well
6
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 11 ----------------------
ISO/IEC FDIS 27033-7:2023(E)
as the virtualization-specific security threats. The descriptions in Annex B help to better identify the
security threats of network virtualization.
Security issues for network virtualization include:
— Virus attacks and introduction of malware: host OS, guest OS of virtual network function, SDN
controller software, OS of MANO, etc. in the network virtualization are subject to virus and malware
attacks.
— Information leakage: if data under the control of a VM are not processed by special “purification”
after deleting a VM, other business systems or malicious operation and maintenance personnel can
obtain the key business information, triggering sensitive data disclosure.
— Unauthorized usage and access: an unauthorized attacker uses and accesses data of a VM or API of
MANO.
— DoS and DDoS attacks: an attacker utilizes a lot of switches to forward a large number of packages
to the SDN controller, resulting in (D)DoS attack of SDN controller.
— Insider attacks: an administrator tampers image or changes security configurations. An administrator
also can intentionally jeopardize a security misconfiguration (e.g. opening unnecessary ports of a
VNF), an attacker can use this security misconfiguration to launch an attack.
— Insideroutsider collusion: an insider can also collaborate with an outside threat agent to launch
attacks.
— Privilege escalation: a user exploits a vulnerability to obtain administrator privilege.
— Forgery of transaction contents: the transaction contents of VM are tampered with by an attacker.
— Reducing network availability: the loss of backup data makes the business unavailable.
— Compromising the network segregation: an attacker can use compromised VM to attack other VMs
to which it has access.
— Reducing real-time performance: an attacker uses a virtual machine to maliciously deplete resources
on the host, which will affect the realtime performance of other virtual machines on the host.
For detailed security threats of the network virtualization, refer to Annex B.
7 Security recommendations
7.1 General
The primary security objective of network virtualization is to provide a secure runtime environment
and data protection in the life cycle. To achieve this objective, the network virtualization should support
the security recommendations of confidentiality, integrity, availability, authentication, authorization to
defending against a (D)DoS attack.
7.2 Confidentiality
The network virtualization should provide the data confidentiality protection. It should include, at the
minimum, the following security recommendations:
a) The virtual network infrastructure should provide the storage resource t
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.