You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

This page will serve as a placeholder to get the matrix complete in collaboration between CNTT and OPNFV (until interested parties are satisfied).  To "publish", set of pull requests will be issued in GitHub (RA-1).  This page when then be deleted.


RM Requirements (TBD)

Infrastructure Profiles Catalog ()


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1

RM 4.2.1.1

RM 4.2.4

Predefined FlavorsCatalog of Predefined Flavor GeometriesRA-1 "4.2.2.5. Compute Nodes"3.2 VNF CategoryArmada ChartsPlease see the manifests Functional

2RM 4.2.2Flavor NetworkingNetwork Interface SpecificationsRA-1 "4.2.2.9 Compute node configurations for Profiles and Flavors"3.2 VNF CategoryArmada Charts
Functional

3RM 4.2.3Flavor Storage ExtensionsFlavor Storage ExtensionsRA-1 "4.4.1. Support for Profiles and T-shirt instance types"3.2 VNF CategoryArmada Charts
Functional

4

RM 4.2.5

Also  RM 5.2.1

Profile Capabilities

Profile Capabilities includes specifications for capabilities such as CPU Pinning, NUMA support, SR-IOV, FPGA, etc.

RA-1 "4.4.1. Support for Profiles and T-shirt instance types"3.3 NFVI SW ProfileArmada Charts
Functional

5RM 5.2.3Virtual (Overlay) NetworkingVirtual (Overlay) Networking including vNIC interfaces, Protocols (VXLAN, Geneve, ...), NAT, Security Groups, HW Offload, crypto accelerationRA-1 "4.2.3. Network Fabric"3.3 NFVI SW ProfileArmada Charts
Functional

6RM 5.4HW ProfilesHardware Profiles including configurations for compute, storage, networking, PCIeRA-1 "4.2.2. Compute"3.4 NFVI HW ProfileArmada Charts
Functional

RA-1 Requirements (required)

Note: RI-1 incorporates all RA-1 Requirements by reference in RI-1 2.2 Reference Architecture Requirement. Hence, there is no RI-1 Traceability column in the following tables.

General Requirements (RA-1 Section 2.3.1)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.gen.ost.01Open sourceThe Architecture must use OpenStack APIs.RA-1 5.3. Consolidated Set of APIsArmada Chart

Manifests

with Airship 2.0 will replace with helm operator

Functional

2req.gen.ost.02Open sourceThe Architecture must support dynamic request and configuration of virtual resources (compute, network, storage) through OpenStack APIs.RA-1 5.3. Consolidated Set of APIsNAOnce OpenStack installed this is intrinsic capability

Functional



3req.gen.rsl.01ResiliencyThe Architecture must support resilient OpenStack components that are required for the continued availability of running workloads.RA-1 3.3.1. VIM Core servicesNAOnce k8s installed this is intrinsic capabilityOSTK components resiliencymissingsupported through redundancy; redundancy and recoverability can be managed through k8s
4req.gen.avl.01AvailabilityThe Architecture must provide High Availability for OpenStack components.RA-1 4.2 Underlying ResourcesNAOnce k8s installed this is intrinsic capabilityOSTK Components High Availabilitymissingsupported through redundancy; redundancy and recoverability can be managed through k8s

Infrastructure Requirements (RA-1 Section 2.3.2)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.inf.com.01ComputeThe Architecture must provide compute resources for VM instances.RA-1 3.3.1.4 "Cloud Workload Services"Armada Chart

Functional

Functest
2req.inf.com.04ComputeThe Architecture must be able to support multiple CPU SKU options to support various infrastructure profiles (Base, and Network Intensive).RA-1 4.4.1. "Support for Profiles and T-shirt instance types"Armada ChartPost processingFunctionalmissingneeds to be confirmed (same as RM requirements)
3req.inf.com.05ComputeThe Architecture must support Hardware Platforms with NUMA capabilities.RA-1 4.4.1. "Support for Profiles and T-shirt instance types"Armada Chart
FunctionalFunctestFunctest supports tuning a few inputs such flavor extra specs (e.g. hugepages). All tests can be executed multiple times (base then network intensive) 
4req.inf.com.06ComputeThe Architecture must support CPU Pinning of the vCPUs of VM instance.RA-1 4.4.1. "Support for Profiles and T-shirt instance types"Armada Chart
FunctionalFunctestFunctest supports tuning a few inputs such flavor extra specs (e.g. hugepages). All tests can be executed multiple times (base then network intensive) 
5req.inf.com.07ComputeThe Architecture must support different hardware configurations to support various infrastructure profiles (Base, and Network Intensive).RA-1 3.3.3. "Host aggregates providing resource pooling"Armada chart
FunctionalFunctestFunctest supports tuning a few inputs such flavor extra specs (e.g. hugepages). All tests can be executed multiple times (base then network intensive) 
6req.inf.com.08ComputeThe Architecture must support allocating certain number of host cores/threads to non-tenant workloads such as for OpenStack services.Dedicating host core/sibling threads to certain workloads (e.g., OpenStack services. Please see example, "Configuring libvirt compute nodes for CPU pinning"Armada chart
Functional

7req.inf.com.09ComputeThe Architecture must ensure that the host cores/threads assigned to a workload are thread-sibling aware: that is, that a core and its associated SMT threads are either all assigned to non-tenant workloads or all assigned to tenant workloads.Achieved through configuring the "cpu_dedicated_set" and "cpu_shared_set" parameters in nova.conf correctly.Armada chart
Functional

8req.inf.stg.01StorageThe Architecture must provide remote (not directly attached to the host) Block storage for VM Instances.RA-1 3.4.2.3. "Storage"Armada chart
FunctionalFunctest

too generic and should mention the ref to the mandatory capabilities and the status expected.

130 single tests about volumes amongst tempest_cinder, tempest_full, tempest_scenario and tempest_slow ( +indirect testing in case of tempest_heat)

9req.inf.stg.02StorageThe Architecture must provide Object storage for VM Instances. Operators may choose not to implement Object Storage but must be cognizant of the risk of "Compliant VNFs" failing in their environment.OpenStack Swift Service (RA-1 4.3.1.4 "Swift")Armada chart
FunctionalFunctest

too generic and should mention the ref to the mandatory capabilities and the status expected.

140 single tests about object storage amongst tempest_full, tempest_scenario and tempest_slow ( +indirect testing in case of tempest_heat)

10req.inf.stg.03StorageThe Architecture may provide a file system service (file system storage solution) for VM Instances.RA-1 4.2.4. "Storage Backend"Armada chart
Functional

Out of CNTT RC (may)

+ an API proposing this feature should be proposed in CNTT first

The tempest plugin could be added in Functest if it makes sens (IaaS verification). Useless on CNTT side right now

Bug here!

11req.inf.stg.04StorageThe Architecture may support Software Defined Storage (SDS) that seamlessly supports shared block storage, object storage and flat files.RA-1 4.2.4.1. "Ceph Storage Cluster"Armada chart
Functional

Out of CNTT RC (may)

+ an API proposing this feature should be proposed in CNTT RA1 first

As far as I understand It's out of CNTT (implementation design) and the related API is a must requirement.

Bug here!

12req.inf.stg.06StorageThe Architecture should make the immutable images available via location independent means.RA-1 4.3.1.2. "Glance"Armada chart
FunctionalFunctest
13req.inf.stg.07StorageThe Architecture should provide high-performance and horizontally scalable VM storage.RA-1 4.2.4.1. "Ceph Storage Cluster"Armada chart
FunctionalFunctest

As far as I understand It's out of CNTT (implementation design) and the related API is a must requirement.

Does it make sens to cover ceph from a functional pov (why not benchmarking)?

Bug here!

14req.inf.stg.10StorageThe Architecture should provide local Block storage for VM Instances.RA-1 "Virtual Storage"Armada chart
FunctionalFunctest
15req.inf.stg.11StorageThe Architecture should support the Block storage capabilities specified in https://docs.openstack.org/api-ref/block-storage/.RA-1 5.2.3. "Cinder"NACinder is the Block storage ServiceFunctionalFunctest
16req.inf.ntw.01NetworkThe Architecture must provide virtual network interfaces to VM instances.RA-1 5.2.5. "Neutron" NANeutronFunctionalFunctest
17req.inf.ntw.02NetworkThe Architecture must include capabilities for integrating SDN controllers to support provisioning of network services, from the OpenStack Neutron service, such as networking of VTEPs to the Border Edge based VRFs.RA-1 3.2.5. "Virtual Networking – 3rd party SDN solution"

FunctionalFunctest
18req.inf.ntw.03NetworkThe Architecture must support low latency and high throughput traffic needs.RA-1 4.2.3. "Network Fabric"NA
low latecncy, high throughputmissing
19req.inf.ntw.05NetworkThe Architecture must allow for East/West tenant traffic within the cloud (via tunnelled encapsulation overlay such as VXLAN or Geneve).RA-1 4.2.3. "Network Fabric"

FunctionalFunctest
20req.inf.ntw.07NetworkThe Architecture must support network resiliency.RA-1 3.4.2.2. "Network"NAmay be achieved through redundancynetwork resiliencymissingmay be achieved through redundancy
21req.inf.ntw.10NetworkThe Cloud Infrastructure Network Fabric must be capable of enabling highly available (Five 9’s or better) Cloud Infrastructure.RA-1 3.4.2.2. "Network"NAmay be achieved through redundancynetwork availabilitymissingmay be achieved through redundancy
22req.inf.ntw.15NetworkThe Architecture must support multiple networking options for Cloud Infrastructure to support various infrastructure profiles (Base, Network Intensive).RA-1 4.2.3.4. "Neutron ML2-plugin Integration" and "OpenStack Neutron Plugins"Armada chart
FunctionalFunctest

As far as I understand It's out of CNTT (implementation design).

RA1 Chapter5 sets as mandatory the networking capabilities (already verified by neutron agents and OVN) 

23req.inf.ntw.16NetworkThe Architecture must support dual stack IPv4 and IPv6 for tenant networks and workloads.


FunctionalFunctest
24req.inf.ntw.17NetworkThe Architecture should use dual stack IPv4 and IPv6 for Cloud Infrastructure internal networks.


FunctionalFunctest

Must be clarified. Endpoints are registered by IPv4 or IPv6.

Bug ?

25req.inf.ntw.18NetworkThe Architecture should support the network extensions specified in https://docs.openstack.org/api-ref/network/v2/.RA-1 5.2.5. "Neutron"Armada chart
Functional

It's a must requirement

Bug here !

26req.inf.acc.01AccelerationThe Architecture should support Application Specific Acceleration (exposed to VNFs).RA-1 3.2.6. "Acceleration" and RA-1 4.3.1.10. "Cyborg"Armada chart
Functional

Out of CNTT RC (should)

+ an API proposing this feature should be proposed in CNTT RA1 first

27req.inf.acc.02AccelerationThe Architecture should support Cloud Infrastructure Acceleration (such as SmartNICs)."OpenStack Future - Specs defined"Armada chart
Functional

Out of CNTT RC (should)

+ an API proposing this feature should be proposed in CNTT RA1 first

VIM Requirements (RA-1 Section 2.3.3)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.vim.01GeneralThe Architecture must allow infrastructure resource sharing.RA-1 3.2. "Consumable Infrastructure Resources and Services"NAOpenStack intrinsicFunctionalFunctest
2req.vim.02GeneralThe Architecture should support deployment of OpenStack components in containers.RA-1 4.3.2. "Containerised OpenStack Services"Armada Chart
FunctionalFunctest
3req.vim.03GeneralThe Architecture must allow VIM to discover and manage Cloud Infrastructure resources.RA-1 5.2.7. "Placement"NAOpenStack and IPMIFunctionalFunctest
4req.vim.05GeneralThe Architecture must include image repository management.RA-1 4.3.1.2. "Glance"NA

Image Service (Glance)

(installed as part of OpenStack core services)

FunctionalFunctest
5req.vim.07GeneralThe Architecture must support multi-tenancy.RA-1 3.2.1. "Multi-Tenancy"NAOpenStack intrinsicFunctionalFunctest
6req.vim.08GeneralThe Architecture must support resource tagging."OpenStack Resource Tags"NAOpenStack resource metadata, neutron pluginFunctionalFunctest

Interfaces & API Requirements (RA-1 Section 2.3.4)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.int.api.01APIThe Architecture must provide APIs to access all mandatory features of the cloud platform core services for the given CNTT OpenStack release.RA-1 5.3. "Consolidated Set of APIs"NAOpenStack APIsFunctionalFunctest
2req.int.api.02APIThe Architecture must provide GUI access to tenant facing cloud platform core services.RA-1 4.3.1.9 "Horizon"NA

Horizon

(installed as part of OpenStack core services)

FunctionalFunctest
3req.int.api.03APIThe Architecture must provide APIs needed to discover and manage Cloud Infrastructure resources.RA-1 5.2.7. "Placement"NAOpenStack APIFunctionalFunctest
4req.int.api.04APIThe Architecture must expose the latest version and microversion of the APIs for the given CNTT OpenStack release for each of the OpenStack core servicesRA-1 5.2 Core OpenStack Services APIsNA

OpenStack APIs

for deployment manifests should include the details

Functional

5req.int.acc.01AccelerationThe Architecture should provide an open and standard acceleration interface to VNFs.RA-1 2.3.4. (was RA-1 5.3.4) "Cyborg"NA

Acceleration Service (Cyborg)

for deployment manifests should include the details

FunctionalFunctest

Tenant Requirements (RA-1 Section 2.3.5)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.tnt.gen.01GeneralThe Architecture must support multi-tenancy.duplicate of req.vim.07NA



2req.tnt.gen.02GeneralThe Architecture must support self-service dashboard (GUI) and APIs for users to deploy, configure and manage their workloads.RA-1 4.3.1.9 "Horizon" and 3.3.1.4 Cloud Workload ServicesNA

Horizon

(installed as part of OpenStack core services)

FunctionalFunctest

Operations & LCM Requirements (RA-1 Section 2.3.6)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.lcm.gen.01GeneralThe Architecture must support zero downtime expansion/change of physical capacity (compute hosts, storage increase/replacement).
Armada Chart
infra expansionmissing
2req.lcm.adp.02Automated deploymentThe Architecture must support hitless upgrades of software provided by the cloud provider so that the availability of running workloads is not impacted.
Armada Chartinternally will trigger k8ssoftware upgardes

missing

(Airship?)


Assurance Requirements (RA-1 Section 2.3.7)


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.asr.mon.01IntegrationThe Architecture must include integration with various infrastructure components to support collection of telemetry for assurance monitoring and network intelligence.
Armada chartPrometheus & GrafanaFunctionalFunctest
2req.asr.mon.03MonitoringThe Architecture must allow for the collection and dissemination of performance and fault information.
Armada chartCollectDperformance/fault datamissing
3req.asr.mon.04NetworkThe Cloud Infrastructure Network Fabric and Network Operating System must provide network operational visibility through alarming and streaming telemetry services for operational management, engineering planning, troubleshooting, and network performance optimisation.
NAneeds LMA platform installedtelemetrymissing - alarming and reporting on barometer via prometheus already available via barometer work. Requirements not clear to find out whats needed of physical network

Security Requirements (RA-1 Section 2.3.8) | Needs to be updated with latest Security Requirements – DONE


Ref#RA-1 Sub-CategoryDescriptionRA-1 TraceabilityRI ToolsetRI NotesRC CategoryRC ToolsetRC Notes
1req.sec.gen.01GeneralThe Architecture must provide tenant isolation.
NAOpenStack intrinsicFunctionalFunctest
2req.sec.gen.02GeneralThe Architecture must support policy based RBAC.

6.3.1.4 RBAC

Armada Chart
FunctionalFunctest
3req.sec.gen.03GeneralThe Architecture must support a centralised authentication and authorisation mechanism.

6.3.1.2 Authentication and

6.3.1.3 Authorization


Keystone

(installed as part of OpenStack core services)

FunctionalFunctest  
4req.sec.zon.01ZoningThe Architecture must support identity management (specific roles and permissions assigned to a domain or tenant).

6.3.1.1 Identity


KeystoneFunctionalFunctest
5req.sec.zon.02ZoningThe Architecture must support password encryption.
Barbican
FunctionalFunctest
6req.sec.zon.03ZoningThe Architecture must support data, at-rest and in-flight, encryption.6.3.3 Confidentiality and IntegrityTLS 1.2+(in-flight)at-rest use ceph default encryptionFunctionalmissing
7req.sec.zon.04ZoningThe Architecture must support integration with Corporate Identity Management systems.
Armada chart
integrationmissing
8req.sec.cmp.02ComplianceThe Architecture must comply with all applicable standards and regulations.
NA
security standardsmissing in Functest. Captured in Telco TCs Security
9req.sec.cmp.03ComplianceThe Architecture must comply with all applicable regional standards and regulations.
NA
security standardsmissing
10req.sec.ntw.03NetworkingThe Architecture must have the underlay network incorporate encrypted and/or private communications channels to ensure its security.6.3.3.3 Confidentiality and Integrity of tenants DataNA
Functionalmissing
11req.sec.ntw.04NetworkingThe Architecture must configure all of the underlay network components to ensure the complete separation from the overlay customer deployments.

4.2.3.2 High Level Logical Network Layout

NA
network isolationmissing
12req.sec.ntw.05NetworkingThe Architecture must have the underlay network include strong access controls that adhere to the V1.1 NIST Cybersecurity Framework.6.3.1 Platform AccessNA
network access controlmissing

System Hardening (RA-1 Section 2.3.8.1)


 Ref #

 RA-1 Sub-Category

 Description

  RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

RC  Notes

1

 sec.gen.001

 Hardening

 The Platform **must** maintain the state to what it is specified to be and does not change unless through change management process.

7.2.2. Configuration Management

Armada chartArmada chart pushes the config to fix security

security hardening 



2

 sec.gen.002

 Hardening

 All systems part of Cloud Infrastructure **must** support password hardening (strength and rules for updates (process), storage and transmission, etc.)




security hardening



3

 sec.gen.003

 Hardening

 All servers part of Cloud Infrastructure **must** support a root of trust and secure boot

6.3.6 Security LCM  



security hardening  



4

 sec.gen.004

 Hardening

 The Operating Systems of all the servers part of Cloud Infrastructure **must** be hardened

6.3.2 System Hardening



security hardening  



5

 sec.gen.005

 Hardening

 The Platform **must** support Operating System level access control

6.3.1 Platform Access  



security hardening  



6

 sec.gen.006

 Hardening

 The Platform **must** support Secure logging

6.3.7 Security Audit Logging



security hardening  



7

 sec.gen.007

 Hardening

 All servers part of Cloud Infrastructure **must** be Time synchronized with authenticated Time service

  

Armada chart

security hardening  



8

 sec.gen.008

 Hardening

 All servers part of Cloud Infrastructure **must** be regularly updated to address security vulnerabilities

6.3.2 System Hardening  



security hardening  



9

 sec.gen.009

 Hardening

 The Platform **must** support Software integrity protection and verification

6.3.3 Confidentiality and Integrity  



security hardening  



10

 sec.gen.010

 Hardening

 The Cloud Infrastructure **must** support Secure storage (all types)

6.3.6 Security LCM



security hardening  



11

 sec.gen.012

 Hardening

 The Operator **must** ensure that only authorized actors have physical access to the underlying infrastructure.

  



security hardening  



12

 sec.gen.013

 Hardening

 The Platform **must** ensure that only authorized actors have logical access to the underlying infrastructure.

6.3.1 Platform Access  



security hardening  



Platform and Access (RA-1 Section 2.3.8.2)


 Ref #

 RA-1 Sub-Category

 Description

  RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

 RC Notes

1

 sec.sys.001

 Access

 The Platform **must** support authenticated and secure APIs, API endpoints. The Platform **must** implement authenticated and secure access to GUI

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access  



2

 sec.sys.002

 Access

 The Platform **must** support Traffic Filtering for workloads (for example, Fire Wall)

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



3

 sec.sys.003

 Access

 The Platform **must** support Secure and encrypted communications, and confidentiality and integrity of network traffic

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



4

 sec.sys.004

 Access

 The Cloud Infrastructure **must** support Secure network channels

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



5

 sec.sys.005

 Access

 The Cloud Infrastructure **must** segregate the underlay and overlay networks

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



6

 sec.sys.006

 Access

 The Cloud Infrastructure **must** be able to utilize the Cloud Infrastructure Manager identity management capabilities

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



7

 sec.sys.007

 Access

 The Platform **must** implement controls enforcing separation of duties and privileges, least privilege use and least common mechanism (Role-Based Access Control)

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



Functional

Functest

RBAC

8

 sec.sys.008

 Access

 The Platform **must** be able to assign the Entities that comprise the tenant networks to different trust domains. (Communication between different trust domains is not allowed, by default.)

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



9

 sec.sys.009

 Access

 The Platform **must** support creation of Trust Relationships between trust domains. These maybe uni-directional relationships where the trusting domain trusts another domain (the “trusted domain”) to authenticate users for them or to allow access to its resources from the trusted domain.  In a bidirectional relationship both domain are “trusting” and “trusted”.

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



10

 sec.sys.010

 Access

 For two or more domains without existing trust relationships, the Platform **must not** allow the effect of an attack on one domain to impact the other domains either directly or indirectly

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



11

 sec.sys.011

 Access

 The Platform **must not** reuse the same authentication key-pair (for example, on different hosts, for different services)

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



12

 sec.sys.012

 Access

 The Platform **must** only use secrets encrypted using strong encryption techniques, and stored externally from the component (e.g., Barbican (OpenStack))

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



13

 sec.sys.013

 Access

 The Platform **must** provide secrets dynamically as and when needed

 [6.3.1 Platform Access](https://github.com/cntt-n/CNTT/blob/master/doc/ref_arch/openstack/chapters/chapter06.md#631-platform-access)



security access



Confidentiality and Integrity (RA-1 Section 2.3.8.3)


 Ref #

 RA-1 Sub-Category

 Description

 RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

 RC Notes

1

 sec.ci.001

 Confidentiality/Integrity

 The Platform **must** support Confidentiality and Integrity of data at rest and in-transit

 [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)

Openstack Keystone

security confidentiality & integrity



2

 sec.ci.003

 Confidentiality/Integrity

 The Platform **must** support Confidentiality and Integrity of data related metadata

  [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



security confidentiality & integrity



3

 sec.ci.004

 Confidentiality

 The Platform **must** support Confidentiality of processes and restrict information sharing with only the process owner (e.g., tenant).

  [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



 Functional

 Functest

Tenant isolation

4

 sec.ci.005

 Confidentiality/Integrity

 The Platform **must** support Confidentiality and Integrity of process-related metadata and restrict information sharing with only the process owner (e.g., tenant).

  [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



security confidentiality & integrity



5

 sec.ci.006

 Confidentiality/Integrity

 The Platform **must** support Confidentiality and Integrity of workload resource utilization (RAM, CPU, Storage, Network I/O, cache, hardware offload) and restrict information sharing with only the workload owner (e.g., tenant).

  [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



security confidentiality & integrity



6

 sec.ci.007

 Confidentiality/Integrity

 The Platform **must not** allow Memory Inspection by any actor other than the authorized actors for the Entity to which Memory is assigned (e.g., tenants owning the workload), for Lawful Inspection, and by secure monitoring services. Admin access must be carefully regulated 

  [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



security confidentiality & integrity



7

 sec.ci.008

 Confidentiality

 The Cloud Infrastructure **must** support tenant networks segregation

 [6.3.3 Confidentiality and Integrity](./chapter06.md#633-confidentiality-and-integrity)



 Functional

Functest

Tenant isolation

Workload Security (RA-1 Section 2.3.8.4)


 Ref #

 RA-1 Sub-Category

 Description

 RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

RC Notes

1

 sec.wl.001

 Workload

 The Platform **must** support Workload placement policy

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)

Nova/placement

security workload



2

 sec.wl.002

 Workload

 The Platform **must** support operational security

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)



security workload



3

 sec.wl.003

 Workload

 The Platform **must** support secure provisioning of workloads 

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)



security workload



4

 sec.wl.004

 Workload

 The Platform **must** support Location assertion (for mandated in-country or location requirements)

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)



security workload



5

 sec.wl.005

 Workload

 Production workloads **must** be separated from non-production workloads

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)



security workload

6

 sec.wl.006

 Workload

 Workloads **must** be separable by their categorisation (for example, payment card information, healthcare, etc.)

 [6.3.4 Workload Security](./chapter06.md#634-workload-security)



security workload



Image Security (RA-1 Section 2.3.8.5)


 Ref #

 RA-1 Sub-Category

 Description

  RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

RC Notes

1

 sec.img.001

 Image

 Images from untrusted sources **must not** be used

6.3.5 Image Security



security image



2

 sec.img.002

 Image

 Images **must** be maintained to be free from known vulnerabilities

6.3.5 Image Security
Internal image scanning tool

security workload



3

 sec.img.003

 Image

 Images **must not** be configured to run with privileges higher than the privileges of the actor authorized to run them

6.3.5 Image Security

security workload

4

 sec.img.004

 Image

 Images **must** only be accessible to authorized actors

6.3.5 Image Security

security workload



5

 sec.img.005

 Image

 Image Registries **must** only be accessible to authorized actors

6.3.5 Image Security

security workload

6

 sec.img.006

 Image

 Image Registries **must** only be accessible over secure networks

6.3.5 Image Security

security workload



7

 sec.img.007

 Image

 Image registries **must** be clear of vulnerable and stale (out of date) versions

6.3.5 Image Security

security workload



Security LCM (RA-1 Section 2.3.8.6)


 Ref #

 RA-1 Sub-Category

 Description

 RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

 RC Notes

1

 sec.lcm.001

 LCM

 The Platform **must** support Secure Provisioning, Maintaining availability, Deprovisioning (secure Clean-Up) of workload resources; Secure clean-up: tear-down, defending against virus or other attacks, or observing of cryptographic or user service data

(7.2.2. Configuration Management)



security LCM



2

 sec.lcm.002

 LCM

 Operational **must** use management protocols limiting security risk such as SNMPv3, SSH v2, ICMP, NTP, syslog and TLS

(7.2.2. Configuration Management)



security LCM



3

 sec.lcm.003

 LCM

 The Cloud Operator **must** implement change management for Cloud Infrastructure, Cloud Infrastructure Manager and other components of the cloud; Platform change control on hardware

(7.2.2. Configuration Management)



security LCM



4

 sec.lcm.005

 LCM

 Platform **must** provide logs and these logs must be regularly scanned

6.3.7 Security Audit Logging



security LCM



5

 sec.lcm.006

 LCM

 The Platform **must** verify the integrity of all Resource management requests

6.3.7 Security Audit Logging



security LCM

6

 sec.lcm.007

 LCM

 The Platform **must** be able to update newly instantiated, suspended, hibernated, migrated and restarted images with current time information

(7.2.2. Configuration Management)



security LCM

7

 sec.lcm.008

 LCM

 The Platform **must** be able to update newly instantiated, suspended, hibernated, migrated and restarted images with relevant DNS information.

(7.2.2. Configuration Management)



security LCM



8

 sec.lcm.009

 LCM

 The Platform **must** be able to update the tag of newly instantiated, suspended, hibernated, migrated and restarted images with relevant geolocation (geographical) information

(7.2.2. Configuration Management)



security LCM



9

 sec.lcm.010

 LCM

 The Platform **must** log all changes to geolocation along with the mechanisms and sources of location information (i.e. GPS, IP block, and timing).

(7.2.2. Configuration Management)



security LCM



10

 sec.lcm.011

 LCM

 The Platform **must** implement Security life cycle management processes including proactively update and patch all deployed Cloud Infrastructure software.

(7.2.2. Configuration Management)



security LCM



Monitoring and Security Audit (RA-1 Section 2.3.8.7)

The Platform is assumed to provide configurable alerting and notification capability and the operator is assumed to have automated systems, policies and procedures to act on alerts and notifications in a timely fashion. In the following the monitoring and logging capabilities can trigger alerts and notifications for appropriate action.


 Ref #

 RA-1 Sub-Category

 Description

 RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

RC Notes

1

 sec.mon.001

 Monitoring/Audit

 Platform **must** provide logs and these logs must be regularly scanned for events of interest

7.4.1. Logging






2

 sec.mon.002

 Monitoring

 Security logs **must** be time synchronised

6.3.7 Security Audit Logging  and 7.4.1. Logging






3

 sec.mon.003

 Monitoring

 The Platform **must** log all changes to time server source, time, date and time zones

7.4.1. Logging






4

 sec.mon.004

 Audit

 The Platform **must** secure and protect Audit logs (contain sensitive information) both in-transit and at rest

6.3.7 Security Audit Logging  and 7.4.1. Logging






5

 sec.mon.005

 Monitoring/Audit

 The Platform **must** Monitor and Audit various behaviours of connection and login attempts to detect access attacks and potential access attempts and take corrective actions accordingly

7.4. Logging, Monitoring and Analytics (includes Alerting)






6

 sec.mon.006

 Monitoring/Audit

 The Platform **must** Monitor and Audit operations by authorized account access after login to detect malicious operational activity and take corrective actions accordingly

7.4. Logging, Monitoring and Analytics (includes Alerting)






7

 sec.mon.007

 Monitoring/Audit

 The Platform **must** Monitor and Audit security parameter configurations for compliance with defined security policies

7.2.2. Configuration Management






8

 sec.mon.008

 Monitoring/Audit

 The Platform **must** Monitor and Audit externally exposed interfaces for illegal access (attacks) and take corrective security hardening measures

7.4. Logging, Monitoring and Analytics (includes Alerting)




9

 sec.mon.009

 Monitoring/Audit

 The Platform **must** Monitor and Audit service handling for various attacks (malformed messages, signalling flooding and replaying, etc.) and take corrective actions accordingly

7.4. Logging, Monitoring and Analytics (includes Alerting) - partial






10

 sec.mon.010

 Monitoring/Audit

 The Platform **must** Monitor and Audit running processes to detect unexpected or unauthorized processes and take corrective actions accordingly

(7.4. Logging, Monitoring and Analytics (includes Alerting))




11

 sec.mon.011

 Monitoring/Audit

 The Platform **must** Monitor and Audit logs from infrastructure elements and workloads to detected anomalies in the system components and take corrective actions accordingly

7.4. Logging, Monitoring and Analytics (includes Alerting)






12

 sec.mon.012

 Monitoring/Audit

 The Platform **must** Monitor and Audit Traffic patterns and volumes to prevent malware download attempts

(7.4. Logging, Monitoring and Analytics (includes Alerting))






13

 sec.mon.013

 Monitoring

 The monitoring system **must not** affect the security (integrity and confidentiality) of the infrastructure, workloads, or the user data (through back door entries).

(7.4.4. Logging, Monitoring, and Analytics (LMA) Framework)






14

 sec.mon.015

 Monitoring

 The Platform **must** ensure that the Monitoring systems are never starved of resources







15

 sec.lcm.017

 Audit

 The Platform **must** Audit systems for any missing security patches and take appropriate actions

(7.2.2. Configuration Management)






Compliance with Standards (RA-1 Section 2.3.8.8)


 Ref #

 RA-1 Sub-Category

 Description

  RA-1 Traceability

RI ToolsetRI Notes

 RC Category

 RC Toolset

 RC Notes

1

 sec.std.018

 Standards

 The Public Cloud Operator **must**, and the Private Cloud Operator **may** be certified to be compliant with the International Standard on Awareness Engagements (ISAE) 3402 (in the US: SSAE 16); International Standard on Awareness Engagements (ISAE) 3402. US Equivalent: SSAE16







  • No labels