IG1124 ZOOM NFV Security Fabric Overview R14.5.1
- Maturity level: Level 4 - Forum Approved
Virtualization is a trend that is sweeping across the IT and Communications industries and in its wake it is bringing radical change to technical solutions, development and operation of infrastructure and services. The Service Provider business drivers for NFV are clear Ã¢â‚¬â€œ reduce CapEx, reduce OpEx, accelerate Ã¢â‚¬ËœTime to MarketÃ¢â‚¬â„¢ and deliver agility and flexibility in introducing new services without worrying about physical infrastructure, while retaining or enhancing the service experience already benchmarked through physical infrastructure solutions.
For NFV service consumers it promises to deliver business and customer benefits such as product innovation and customer experience without being concerned with low level issues, e.g., infrastructure layout, low level operation and maintenance activities. However, to realize such business benefits NFV consumer needs to have stringent business orientated process to pick right NFV provider that is well equipped with Security (focus of this document), Operations, Integration, Quality and Business agility tools.
However these services, once introduced, need to be managed and particularly in regard to security Ã¢â‚¬â€œ NFV opens up an array of new threat surfaces/attack vectors that if exploited could have a significantly greater impact than was possible before.
Recent publications from ETSI on Network Functions Virtualization (NFV) included a draft NFV Security Ã¢â‚¬ËœProblem StatementÃ¢â‚¬â„¢ that covers in some detail what the specific issues are, but not how they can be managed effectively without detracting from the benefits expected from NFV.
Having policy compliant security in place for any instantiation of the virtualized infrastructure and service is critical Ã¢â‚¬â€œ the virtualized services layer has some unique e2e security management challenges for which there appears to be no firm industry activity.
This document outlines the TM Forum view on where the security fabric needs to be to support virtualized services and the requirements and dependencies that it may place on the underlying platform virtualization and infrastructure layers. The rationale for not focusing on the platform virtualization layer and the logicalÃ‚Â and physical infrastructure layers is that both of these are being addressed by other groups working on cloud platforms Ã¢â‚¬â€œ such as IaaS, PaaS.
Automation policy and security (Copy)
This section provides guides to current practice in automation, and the use and modelling of policies to control automation.
Automation policy and security
As part of the Agile OSS/BSS Toolkit, this section provides guides to current practice in automation, and the use and…
Whilst the core Frameworks have been and continue to be updated to reflect the changes required to support Network Function…
Trust, Security & Privacy Toolkit
TM Forum members have collaboratively developed security, privacy and revenue management best practices and guidance for the communications industry. To be…