{"id":450704,"date":"2024-10-20T09:13:29","date_gmt":"2024-10-20T09:13:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-27033-72023\/"},"modified":"2024-10-26T17:11:03","modified_gmt":"2024-10-26T17:11:03","slug":"bs-iso-iec-27033-72023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-27033-72023\/","title":{"rendered":"BS ISO\/IEC 27033-7:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Overview 5.1 General 5.2 Description of network virtualization 5.3 Security model 5.3.1 Model of network virtualization security <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3.2 Network virtualization components 6 Security threats <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7 Security recommendations 7.1 General 7.2 Confidentiality <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 Integrity 7.4 Availability 7.5 Authentication 7.6 Access control <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.7 Non-repudiation 8 Security controls 8.1 General <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8.2 Virtual network infrastructure security 8.3 Virtual network function security <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.4 Virtual network management security 8.4.1 SDN controller security <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.4.2 NFV orchestrator security 9 Design techniques and considerations 9.1 Overview <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9.2 Integrity protection of platform 9.3 Hardening for network virtualization 9.4 API authentication and authorization 9.5 Software defined security for virtual network <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (informative) Use cases of network virtualization <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex B (informative) Detailed security threat description of network virtualization <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Network security – Guidelines for network virtualization security<\/b><\/p>\n |