Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.sec.gen.01GeneralThe Architecture must provide tenant isolation.


FunctionalFunctest
2req.sec.gen.02GeneralThe Architecture must support policy based RBAC.

6.3.1.4 RBAC

Armada Chart
FunctionalFunctest
3req.sec.gen.03GeneralThe Architecture must support a centralised authentication and authorisation mechanism.

6.3.1.2 Authentication and

6.3.1.3 Authorization


KeystoneFunctionalFunctest  
4req.sec.zon.01ZoningThe Architecture must support identity management (specific roles and permissions assigned to a domain or tenant).

6.3.1.1 Identity



FunctionalFunctest
5req.sec.zon.02ZoningThe Architecture must support password encryption.
BarbicanSALT in NC2.0
FunctionalFunctest
6req.sec.zon.03ZoningThe Architecture must support data, at-rest and in-flight, encryption.6.3.3 Confidentiality and IntegrityTLS 1.2+(in-flight)at-rest use ceph default encryptionFunctionalmissing
7req.sec.zon.04ZoningThe Architecture must support integration with Corporate Identity Management systems.
Armada chart
integrationmissing
8req.sec.cmp.02ComplianceThe Architecture must comply with all applicable standards and regulations.


security standardsmissing in Functest. Captured in Telco TCs Security
9req.sec.cmp.03ComplianceThe Architecture must comply with all applicable regional standards and regulations.


security standardsmissing
10req.sec.ntw.03NetworkingThe Architecture must have the underlay network incorporate encrypted and/or private communications channels to ensure its security.6.3.3.3 Confidentiality and Integrity of tenants DataNA
Functionalmissing
11req.sec.ntw.04NetworkingThe Architecture must configure all of the underlay network components to ensure the complete separation from the overlay customer deployments.

4.2.3.2 High Level Logical Network Layout

NA
network isolationmissing
12req.sec.ntw.05NetworkingThe Architecture must have the underlay network include strong access controls that adhere to the V1.1 NIST Cybersecurity Framework.6.3.1 Platform AccessNA
network access controlmissing

...