...
ITEM | DETAILS |
R8 Presentation | |
Recording mp4 | |
Audio only |
Key Contacts - damian.nowak Martin Skorupski
...
ITEM | DETAILS |
R8 Presentation | |
Recording mp4 | |
Audio only |
Key Contacts - rouzaut Amy Zwarico Paweł Pawlak
Executive Summary - All ONAP applications should generate logs that can be collected by Kubernetes.
...
- Crypto Credentials Agility – ½ od apps in met and almost half not yet answered
- Implement Secure Design – 1/3 of projects did not answer
- Crypto Weaknesses – tests to be applied (3 including Morgan)
Projects that have already answered this question positively, should verify that the answer is still correct.
Continuation of REQ-350.
Business Impact - Improves the security posture of ONAP by lessening the risk.
Business Markets - All operators and service provider.
Funding/Financial Impacts - N/A
Organization Mgmt, Sales Strategies -There is no additional organizational management or sales strategies for this requirement outside of a service providers "normal" ONAP deployment and its attendant organizational resources from a service provider.
Support for the Multi Tenancy in ONAP (REQ-463)
Key Contacts - Olivier Phenix Seshu Kumar Mudiganti Mike Elliott rodrigo lima
Executive Summary - Allow ONAP to run in a multi-tenant environment, where each tenant can manage access to his service designs, instances, and namespace-specific component
Business Impact - Make ONAP more appealing for operators and service providers, which often require different user groups to have different access level to resources.
Business Markets - All operators and service providers can leverage the multi-tenancy functionality of ONAP
Funding/Financial Impacts - Reduction in operations expense from using industry standard Interfaces.
Organization Mgmt, Sales Strategies -There is no additional organizational management or sales strategies for this requirement outside of a service providers "normal" ONAP deployment and its attendant organizational resources from a service provider.
Identification of events that compromise the ONAP system (REQ-464)
Key Contacts - rouzaut Amy Zwarico Paweł Pawlak
Executive Summary -
Implementation is done to identify events that compromise the system.
This information feedback is done because only an intervention can stop this risk.
The events are logged and according to rules have intervened according to the risks.
External system must be use to save and display the log
Secure protocol must be use to transfert the log between ONAP and external system
Business Impact - Improves the security posture of ONAP by lessening the risk.
...