diff --git a/doc/common/references.rst b/doc/common/references.rst index 0a8d696ad3..9d5dfc7369 100644 --- a/doc/common/references.rst +++ b/doc/common/references.rst @@ -26,8 +26,8 @@ Ref Doc Number Title [17] ETSI GS NFV-SEC 003 V1.1.1 “Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf `__ [18] ETSI GS NFV-SEC 013 V3.1.1 “Network Functions Virtualisation (NFV) Release 3; NFV Security; Security Specification for MANO Components and Reference points”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/014/03.01.01_60/gs_NFV-SEC014v030101p.pdf `__ [19] ETSI GS NFV-SEC 013 V2.6.1 “Network Functions Virtualisation (NFV) Release 2; Security; VNF Package Security Specification ”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/021/02.06.01_60/gs_nfv-sec021v020601p.pdf `__ -[20] GSMA FS.31 V2.0 February 2020 “Baseline Security controls ”. Available at `https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls `__ -[21] GSMA whitepaper January 2021 “Open Networking & the Security of Open Source Software deployment ”. Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment `__ +[20] GSMA FS.31 V2.0 February 2020 “Baseline Security controls ”. Available at `https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-31-gsma-baseline-security-controls/ `__ +[21] GSMA whitepaper January 2021 “Open Networking & the Security of Open Source Software deployment ”. Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/ `__ [22] Cloud Security Alliance (CSA) and SAFECode “The Six Pillars of DevSecOps: Automation (2020) ”. Available at `https://safecode.org/resource-secure-development-practices/the-six-pillars-of-devsecops-automation/ `__ [23] ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary. Available at `https://www.iso.org/standard/73906.html `__. [24] Cloud Security Alliance (CSA) “Information Security Management through Reflexive Security ”. Available at `https://cloudsecurityalliance.org/artifacts/information-security-management-through-reflexive-security/ `__ @@ -40,9 +40,9 @@ Ref Doc Number Title [31] IEEE 1588-2019 "Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", Available at `https://standards.ieee.org/standard/1588-2019.html `__ [32] ITU-T G.8262 "Timing characteristics of a synchronous equipment slave clock", Available at `https://www.itu.int/rec/T-REC-G.8262 `__ [33] ITU-T G.8275.2 "Precision time protocol telecom profile for time/phase synchronization with partial timing support from the network", Available at `https://www.itu.int/rec/T-REC-G.8275.2 `__ -[34] GSMA OPG.02 "Operator Platform: Requirements and Architecture", Available at `https://www.gsma.com/futurenetworks/operator-platform-hp/ `__ +[34] GSMA OPG.02 "Operator Platform: Requirements and Architecture", Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/operator-platform-hp/ `__ [35] O-RAN.WG6.AAL-GAnP-v01.00 "O-RAN Acceleration Abstraction Layer General Aspects and Principles 1.0”, November 2020", Available at `https://www.o-ran.org `__ -[36] GSMA FS.40-v02.00 "5G Security Guide, version 2.0, 20 October 2021”, November 2020", Available at `https://www.gsma.com/security/publications/ `__ +[36] GSMA FS.40-v02.00 "5G Security Guide, version 2.0, 20 October 2021”, November 2020", Available at `https://www.gsma.com/solutions-and-impact/technologies/security/publications/ `__ [37] ETSI TS 103 457 "CYBER; Trusted Cross-Domain Interface: Interface to offload sensitive functions to a trusted domain”, TS 103 457 - V1.1.1, Available at `https://www.etsi.org/deliver/etsi_ts/103400_103499/103457/01.01.01_60/ts_103457v010101p.pdf `__ [38] RFC 2544 "Benchmarking Methodology for Network Interconnect Devices", Available at `https://www.ietf.org/rfc/rfc2544.txt `__ [39] O-RAN.WG6 "WG6: Cloudification and Orchestration Workgroup specifications", Available at `https://www.o-ran.org `__ @@ -52,7 +52,7 @@ Ref Doc Number Title [43] ITU-T L.1361 "Measurement method for energy efficiency of network functions virtualization", Available at `https://www.itu.int/rec/T-REC-L.1361 `__ [44] "Open RAN Technical Priority - Focus on Energy Efficiency", Available at `https://www.o-ran.org/ecosystem-resources `__ [45] "QuEST Forum - NFV Workload Efficiency Whitepaper", Available at `https://tl9000.org/resources/documents/NFV%20Workload%20Efficiency%20Whitepaper.pdf `__ -[46] GSMA FS.16 "Network Equipment Security Assurance Scheme – Development and Lifecycle Security Requirements, version 2.2", Available at `https://www.gsma.com/security/resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements/ `__ +[46] GSMA FS.16 "Network Equipment Security Assurance Scheme – Development and Lifecycle Security Requirements, version 2.2", Available at `https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements-2/ `__ ==== ======================================================= ================================================================================================================================================================================================================================================================================================================================================================================================================================= Cloud Native and Kubernetes References @@ -150,8 +150,8 @@ Security Related References * - [S9] - - "Open Networking & the Security of Open Source Software deployment". - Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment/ - `__. + Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/ + `__. * - [S10] - - OWASP "Secure Coding Practices - Quick Reference Guide". diff --git a/doc/conf.py b/doc/conf.py index d8f0808c1d..ac92e9c197 100644 --- a/doc/conf.py +++ b/doc/conf.py @@ -21,7 +21,12 @@ 'https://static1.squarespace.com/static/5ad774cce74940d7115044b0/t/5db36ffa820b8d29022b6d08/1572040705841/ORAN-WG4.IOT.0-v01.00.pdf/2018/180226_NGMN_RANFSX_D1_V20_Final.pdf', 'https://ntia.gov', 'https://www.ngmn.org/wp-content/uploads/Publications/2018/180226_NGMN_RANFSX_D1_V20_Final.pdf', - 'https://wiki.lfnetworking.org/' + 'https://wiki.lfnetworking.org/', + "https://www.gsma.com/solutions-and-impact/technologies/security/publications", + "https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-31-gsma-baseline-security-controls/", + "https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/", + "https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements-2/", + "https://www.gsma.com/solutions-and-impact/technologies/networks/operator-platform-hp/" ] intersphinx_mapping = { 'ref_model': ('https://cntt.readthedocs.io/projects/rm/en/latest/', None), diff --git a/tox.ini b/tox.ini index 19ddd64a2e..84bf07c5d5 100644 --- a/tox.ini +++ b/tox.ini @@ -7,7 +7,7 @@ skipsdist = true [testenv:docs] basepython = python3.10 deps = - -chttps://opendev.org/openstack/requirements/raw/branch/stable/zed/upper-constraints.txt + -chttps://opendev.org/openstack/requirements/raw/branch/stable/2023.1/upper-constraints.txt -r{toxinidir}/test-requirements.txt commands = sphinx-build -W --keep-going -W -T -b html -D language=en doc _build/html