Security and Identity Management

View as MarkdownOpen in Claude

Security and Identity Management

Identity & Access Management (IAM)

Req IDTest Details (Legend)Requirement AreaDescription
SEC01addAuthenticationUsers: Support standards-based user authentication via OIDC for platform and tenant-facing services, and validate OIDC-issued tokens including signature, issuer, audience, expiration, and required claims for identity and authorization decisions.
SEC02addAuthenticationIn-Cluster Workloads/Nodes: Support authenticated in-cluster identities for workloads and nodes, using short-lived credentials or tokens
SEC03addAuthenticationExternal Services: Support authentication of out of cluster service accounts for service-to-service access. Must support credential-based access, including long-lived credentials where required.
SEC04addINFOAuthorization (RBAC)
SEC05INFOIdentity / Directory ServicesThe platform shall integrate with an LDAP (RFC2307bis) directory service such that users identities and group membership can be resolved by dependent services for authentication and authorization decisions (e.g. storage - POSIX-based access control )
SEC06INFOWorkload/Service IdentitySupport standard workload, service, and node security identities, including OIDC-based identity federation and Kubernetes Service Accounts where applicable.
SEC07INFOAdmin InterfacesAll administrative interfaces—whether UI, CLI, or API—must be protected by Multi-Factor Authentication (e.g. kubectl)
SEC08addAudit LogsAudit logs must be generated and retained for all security-relevant events, including management and control plane API calls, authentication events, and authorization decisions. Audit logs shall be retained for a minimum of 30 days and accessible to authorized platform operators.

Cryptography and Key Management

Req IDTest Details (Legend)Requirement AreaDescription
SEC09addINFOKey & Certificate Lifecycle
SEC10addKey UsageThe platform shall support use of managed keys and certificates across platform services for encryption, authentication, and signing.

Network Isolation & Encryption

Req IDTest Details (Legend)Requirement AreaDescription
SEC11addTenancy ModelHard physical or logical isolation for network, data, and compute. Separation of control planes and tenants is mandatory. This includes separation of storage resources.
SEC12addBMC SecurityOut-of-band management (BMC) must be on a dedicated, restricted network (physically separate or VLAN/VRF-isolated). Direct access from the public internet or general corporate networks must be blocked, and only accessed via a hardened bastion (jumphost) server.
SEC13addNetwork Traffic EncryptionEncryption and mutual authentication (mTLS or equivalent) for all east-west and north-south network traffic

Edge Network Security

Req IDTest Details (Legend)Requirement AreaDescription
SEC14INFOPrivate AccessNo public internet access by default; all API endpoints (e.g. K8s API Server) must be restricted via firewall/private link.
SEC15INFOEdge Network Security PolicyAll traffic must be filtered via Security Groups and/or user customizable ACLs using 5-tuple rules.
SEC16INFOEnforcementNCP must specify the enforcement technology (e.g., Hardware firewalls, SDN, DPUs/SmartNICs) and its specific placement in the packet path.
SEC17INFOThreat Intelligence & ScaleAbility to subscribe to GeoIP threat & Embargo feeds and import them into security groups. NCP should share the max supported records/rules.
SEC18INFOMACSec protection links:Protect links between NCP Data Center and NVIDIA POP & Object store.

Hardware Security & Compliance

Req IDTest Details (Legend)Requirement AreaDescription
SEC19INFOSOC 2SOC2 type 1 or better is required covering Security, Availability, and Confidentiality across all services and DC infrastructure
SEC20INFOAt-Rest Data ProtectionMandatory encryption of all data at rest (e.g. local NVMe/SSD, network-attached storage) via Self-Encrypted Drives (SED).
SEC21addData SanitizationData sanitization must be performed between tenants or on a hardware replacement, including cryptographic erase of all data drives between tenants; sanitization/wipe of any persistent or volatile memory including SRAM/GPU memory; resetting of TPM and BIOS
SEC22INFORoot of Trust + Secure Boot.Mandatory support across all platforms for Hardware Root of Trust mechanisms (TPM 2.0). The platform must enable UEFI OS Secure Boot w/ TPM 2.0.