summaryrefslogtreecommitdiffstats
path: root/docs/opnfvsecguide/introduction
diff options
context:
space:
mode:
authorLuke Hinds <luke.hinds@nokia.com>2015-11-10 18:57:43 +0000
committerLuke Hinds <luke.hinds@nokia.com>2015-11-10 19:02:04 +0000
commit18140941aa30ef189615367185c63cc761d74bbb (patch)
tree9b0022fbb47dcaf75f0abdfbce33b2f2fe72678f /docs/opnfvsecguide/introduction
parent256683072fb4c5b0bba36ddfd273b9bab0213945 (diff)
Added opnfv-security-guide
Modified conf.py to include RTD theme.... html_theme = 'sphinx_rtd_theme' Change-Id: I9b004725ba4ca6606ad8b9e8700f4395ccdeafaa Signed-off-by: Luke Hinds <luke.hinds@nokia.com>
Diffstat (limited to 'docs/opnfvsecguide/introduction')
-rw-r--r--docs/opnfvsecguide/introduction/acknowledgements.rst3
-rw-r--r--docs/opnfvsecguide/introduction/background.rst19
2 files changed, 22 insertions, 0 deletions
diff --git a/docs/opnfvsecguide/introduction/acknowledgements.rst b/docs/opnfvsecguide/introduction/acknowledgements.rst
new file mode 100644
index 000000000..60c687d05
--- /dev/null
+++ b/docs/opnfvsecguide/introduction/acknowledgements.rst
@@ -0,0 +1,3 @@
+Acknowledgements
+----------------
+
diff --git a/docs/opnfvsecguide/introduction/background.rst b/docs/opnfvsecguide/introduction/background.rst
new file mode 100644
index 000000000..7766b36fa
--- /dev/null
+++ b/docs/opnfvsecguide/introduction/background.rst
@@ -0,0 +1,19 @@
+Background
+----------
+
+Pre-virtualization security protection was largely centered on the network. Malicious attacks from hostile machines, would seek to exploit network based operating systems and applications, with the goal of compromising their target node.
+
+Physical security had always been a much simpler business, with most focus on the secure access of the data center hardware.
+In-turn security was built up in layers (defense in depth) where machines would be daisy chained with network cables via security appliances to provide controlled segmentation and isolation. This form of security was built upon the principle of an ‘air gap’ being present, whereby machines were separate physical units, joined largely by the network stack.
+
+With the advent of virtualization (namely the hypervisor), new attack vectors have surfaced as the ‘air-gap’ is no longer key design aspect for security. Further to this elements orchestation nodes and network controllers lead to an even wider attack surface:
+
+* Guests breaking isolation of the hypervisor.
+
+* Unauthorized access and control of supporting orchestration nodes.
+
+* Unauthorized access and control of supporting overlay network control systems.
+
+The hypervisor and the overlay network have now become the ‘Achilles heel’ whereby all tenant data isolation is enforced within the hypervisor and its abstraction of hardware and the virtualized overlay network.
+
+This guide has been formulated, in order to assist users of the OPNFV platform in securing an Telco NFV / SDN environment. \ No newline at end of file