4.2.3.3.5.2 VNF package and VNF image integrity |
Home → VirtNP3GPP → 18.3.0 |
| 33527-i00 33527-i01 → 33527-i10 33527-i20 →  33527-i30 → 33527-j00 | |
| Test Name | TC_VNF PACKAGE AND IMAGE_ INTEGRITY | |
| Threat Reference | Clause 5.3.2.5.1 of the TR 33.927[2], "Software Tampering "; |
|
| Requirement Name | VNF package and VNF image integrity |
|
| Requirement Reference | ||
| Requirement Description |
|
|
| Test Purpose |
|
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the VNF package on boarding and the VNF image instantiation. |
|
| PDFs | 48b9d73944469a706d0a264301c66015 | |
4.2.3.3.5.2 VNF package and VNF image integrity |
Home → VirtNP3GPP → 18.0.1 |
| 33527-i00  33527-i01 → 33527-i10 33527-i20 → 33527-i30 → 33527-j00 | |
| Test Name | TC_VNF PACKAGE AND IMAGE_ INTEGRITY | |
| Threat Reference | Clause 5.3.2.5.1 of the TR 33.927[2], "Software Tampering "; |
|
| Requirement Name | VNF package and VNF image integrity |
|
| Requirement Reference | ||
| Requirement Description |
|
|
| Test Purpose |
|
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the VNF package on boarding and the VNF image instantiation. |
|
| PDFs | 7c97daf26b04a1e782d18ac30733cc54 | |
4.2.7.1 Security functional requirements on GVNP lifecycle management |
Home → VirtNP3GPP → 18.3.0 |
| 33527-i00 33527-i01 33527-i10 → 33527-i20  33527-i30 → 33527-j00 | |
| Test Name | TC_LIFECYCLE MANAGEMENT SECURITY | |
| Threat Reference | Threats on interface between 3GPP VNF and VNFM, in clause 5.3.2.3 of TR 33.927 [3]. |
|
| Requirement Name | GVNP lifecycle management security |
|
| Requirement Reference | ||
| Requirement Description |
Note: According to the definition in ETSI GS NFV 003 [6], VNFM is responsible for the lifecycle management of VNF. The lifecycle management of VNF is set of functions required to manage the instantiation, maintenance and termination of VNF. The GVNP of type 1 is 3GPP VNF. A 3GPP VNF lifecycle management begins when the 3GPP VNF is instantiated by a VNFM after the 3GPP VNF package is delivered to the operator and uploaded to NFVO. It is different terminology with the product lifecycle management process in clause 6 that includes set of functions required to manage first commercial introduction, update, minor release, major release, end of life. |
|
| Test Purpose |
Note: Void |
|
| Pre-Conditions |
Execute the following steps:
|
|
| Execution Steps | ||
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 61dd0e55c1d77b6e8ff1a28a5efbe6b0 | |
4.2.7.1 Security functional requirements on GVNP lifecycle management |
Home → VirtNP3GPP → 18.0.1 |
| 33527-i00  33527-i01 33527-i10 → 33527-i20 33527-i30 → 33527-j00 | |
| Test Name | TC_LIFECYCLE MANAGEMENT SECURITY | |
| Threat Reference | Threats on interface between 3GPP VNF and VNFM, in clause 5.3.2.3 of TR 33.927 [3]. |
|
| Requirement Name | GVNP lifecycle management security |
|
| Requirement Reference | ||
| Requirement Description |
Note: According to the definition in ETSI GS NFV 003 [6], VNFM is responsible for the lifecycle management of VNF. The lifecycle management of VNF is set of functions required to manage the instantiation, maintenance and termination of VNF. The GVNP of type 1 is 3GPP VNF. A 3GPP VNF lifecycle management begins when the 3GPP VNF is instantiated by a VNFM after the 3GPP VNF package is delivered to the operator and uploaded to NFVO. It is different terminology with the product lifecycle management process in clause 6 that includes set of functions required to manage first commercial introduction, update, minor release, major release, end of life. |
|
| Test Purpose |
Note: This test case is not applicable when the VNF and VNFM belongs to the same VNF vendor. If the VNF and VNFM belongs to the same VNF vendor and the interface between VNF and VNFM is proprietary interface, the API level authorization is not needed. |
|
| Pre-Conditions |
Execute the following steps:
|
|
| Execution Steps | ||
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 888ecb174a9f673acb3a2236a8c125c5 | |
4.2.7.2 Security functional requirements on executive environment provision |
Home → VirtNP3GPP → 18.3.0 |
| 33527-i00 → 33527-i01 33527-i10 33527-i20 →  33527-i30 → 33527-j00 | |
| Test Name | TC_SECURE EXECUTIVE ENVIRONMENT PROVISION | |
| Threat Reference | Threats on interface between 3GPP VNF and virtualisation layer, in clause 5.3.2.3 of TR 33.927 [3]. |
|
| Requirement Name | secure executive environment provision |
|
| Requirement Reference | ||
| Requirement Description | The VNF shall support to compare the owned resource state with the parsed resource state from VNFD (VNF Description) by the VNFM. The VNF can query the parsed resource state by the VNFM from the OAM. The VNF shall send an alarm to the OAM if the two resource states are inconsistent. This comparing process can be triggered periodically by the VNF, or the administrator can manually trigger the VNF to perform the comparing process. |
|
| Test Purpose |
|
|
| Pre-Conditions | There are a VNF, a virtualization layer (or simulated virtualization layer), an OAM, a VNFM, a VIM (or simulated OAM, VNFM, VIM) on the test environment.
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | 9ce9a88089f4c48035f6d8c985504998 | |
4.2.7.2 Security functional requirements on executive environment provision |
Home → VirtNP3GPP → 18.0.1 |
| 33527-i00 →  33527-i01 33527-i10 33527-i20 → 33527-i30 → 33527-j00 | |
| Test Name | TC_SECURE EXECUTIVE ENVIRONMENT PROVISION | |
| Threat Reference | Threats on interface between 3GPP VNF and virtualisation layer, in clause 5.3.2.3 of TR 33.927 [3]. |
|
| Requirement Name | secure executive environment provision |
|
| Requirement Reference | ||
| Requirement Description | The VNF shall support to compare the owned resource state with the parsed resource state from VNFD (VNF Description) by the VNFM. The VNF can query the parsed resource state by the VNFM from the OAM. The VNF shall send an alarm to the OAM if the two resource states are inconsistent. This comparing process can be triggered periodically by the VNF, or the administrator can manually trigger the VNF to perform the comparing process. |
|
| Test Purpose |
|
|
| Pre-Conditions | There are a VNF, a virtualization layer (or simulated virtualization layer), an OAM, a VNFM, a VIM (or simulated OAM, VNFM, VIM) on the test environment.
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results |
|
|
| Expected Format of Evidence |
|
|
| PDFs | d475915204fc027f1ade961b7e5ad22f | |
4.2.7.3 Instantiating VNF from trusted VNF image |
Home → VirtNP3GPP → 18.3.0 |
| 33527-i01 33527-i10 33527-i20 →  33527-i30 → 33527-j00 | |
| Test Name | TC_INSTANTIATING VNF _ TRUSTED IMAGE | |
| Threat Reference | TR 33.926 [7], Clause5.3.4.1, "Software Tampering "; |
|
| Requirement Name | Instantiating VNF from trusted VNF image |
|
| Requirement Reference | ||
| Requirement Description | A VNF shall be initiated from trusted images in a VNF package. The VNF image(s) shall be signed by an authorized party. The authorized party is trusted by the operators. |
|
| Test Purpose | To test whether the instantiating VNF from trusted VNF image. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
Note: The digital signature validation of the image is also described in clause 4.2.3.3.5.2 VNF package and VNF image integrity, but the two test cases have the different test purposes. This test case focuses on VNF image credibility, while clause 4.2.3.3.5.2 is concerned with VNF image integrity. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the VNF package on boarding. |
|
| PDFs | ca1861ec7d9c76e6bd693dadbf38e95b | |
4.2.7.3 Instantiating VNF from trusted VNF image |
Home → VirtNP3GPP → 18.0.1 |
|  33527-i01 33527-i10 33527-i20 → 33527-i30 → 33527-j00 | |
| Test Name | TC_INSTANTIATING VNF _ TRUSTED IMAGE | |
| Threat Reference | TR 33.926 [7], Clause5.3.4.1, "Software Tampering "; |
|
| Requirement Name | Instantiating VNF from trusted VNF image |
|
| Requirement Reference | ||
| Requirement Description | A VNF shall be initiated from trusted images in a VNF package. The VNF image(s) shall be signed by an authorized party. The authorized party is trusted by the operators. |
|
| Test Purpose | To test whether the instantiating VNF from trusted VNF image. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
Note: The digital signature validation of the image is also described in clause 4.2.3.3.5.2 VNF package and VNF image integrity, but the two test cases have the different test purposes. This test case focuses on VNF image credibility, while clause 4.2.3.3.5.2 is concerned with VNF image integrity. |
|
| Expected Results |
|
|
| Expected Format of Evidence | Snapshots containing the result of the VNF package on boarding. |
|
| PDFs | 294cada30f38ce4d578f115beeb8b30f | |
4.3.6.2 Separation of inter-VNF and intra-VNF traffic |
Home → VirtNP3GPP → 18.3.0 |
| 33527-i00 33527-i01 33527-i10 → 33527-i20  33527-i30 → 33527-j00 | |
| Test Name | TC_TRAFFIC_SEPARATION_INTER-VNF_INTRA-VNF | |
| Threat Reference | Security threat caused by lack of GVNP traffic isolation in clause 5.3.2.7.15 of TR 33.927 [3] |
|
| Requirement Name | inter-VNF and intra-VNF Traffic Separation |
|
| Requirement Reference | ||
| Requirement Description | The network used for the communication between the VNFCIs of a VNF (intra-VNF traffic) and the network used for the communication between VNFs (inter-VNF traffic) shall be separated to prevent the security threats from the different networks affect each other. |
|
| Test Purpose | To test whether the traffics between inter-VNF traffic and intra-VNF traffic are separated. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | In the step 1, the inter-VNF traffic and intra-VNF traffic are separated according the document by the vendor. In the step 2 and step 3, the VNFCI refuses traffic. |
|
| Expected Format of Evidence | A PASS or FAIL. |
|
| PDFs | 84c8f1cf01482a03eb762d5da3adb76e | |
4.3.6.2 Separation of inter-VNF and intra-VNF traffic |
Home → VirtNP3GPP → 18.0.1 |
| 33527-i00  33527-i01 33527-i10 → 33527-i20 33527-i30 → 33527-j00 | |
| Test Name | TC_TRAFFIC_SEPARATION_INTER-VNF_INTRA-VNF | |
| Threat Reference | Security threat caused by lack of GVNP traffic isolation in clause 5.3.2.7.15 of TR 33.927 [3] |
|
| Requirement Name | inter-VNF and intra-VNF Traffic Separation |
|
| Requirement Reference | ||
| Requirement Description | The network used for the communication between the VNFCs of a VNF (intra-VNF traffic) and the network used for the communication between VNFs(inter-VNF traffic) shall be separated to prevent the security threats from the different networks affect each other. |
|
| Test Purpose | To test whether the traffics between inter-VNF traffic and intra-VNF traffic are separated. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | In the step 1, the inter-VNF traffic and intra-VNF traffic are separated according the document by the vendor. In the step 2 and step 3, the VNFCI refuses traffic. |
|
| Expected Format of Evidence | A PASS or FAIL. |
|
| PDFs | 5193fc27db1382e330259049a7cee498 | |