The invention claimed is:1. A method for configuring a secure domain, SD, in a network functions virtualization infrastructure, NFVI, the SD being controlled by a network functions virtualization orchestrator, NFVO, and a virtualized infrastructure manager, VIM where the NFVO and the VIM are connected to a virtualized network function, VNF, manager, the SD comprising virtual objects handling privileged information, said method comprising:obtaining, from the NFVO or the VNF manager, network service, NS, instance information of a virtual object, based on input from a party associated with the SD;searching in the NS instance information, for a level of confidentiality and geographic location information; andwhen having identified the level of confidentiality and the geographic location information, allocating the virtual object to the SD according to the geographic location information, based on the level of confidentiality and a specific role of the party;authorizing access to a set of operations on the virtual object, for the party, wherein the operations are based on the specific role of the party, in a hierarchy of party roles;receiving, from the NFVO or the VNF manager, a selection input for a further virtual object, the selection input comprising a level of confidentiality of the further virtual object and a location attribute of the further virtual object;when the location attribute of the further virtual object indicates a location within the geographic location information of the NS instance information, allocating the further virtual object to the NS according to the level of confidentiality as comprised in the selection input, based on the specific role of the party; andwhen the location attribute of the further virtual object does not indicate a location within the geographic location information of the NS instance information, the method further comprises: checking whether location attributes of a second virtual object and of a second virtual link for accessing the second virtual object, allocated to an existing VNF, indicate a second location within or outside borders of a jurisdiction indicated in the geographic location information of the NS instance information; andconfiguring the SD to allow lawful intercept, LI, by a privileged party in a hierarchy in the roles, when said location attributes of the second virtual object and of the second virtual link for accessing the second virtual object, indicate a second location within said borders of the jurisdiction, based on the role of the privileged party.2. The method according to claim 1, wherein the hierarchy of party roles comprises a hierarchy of one or more user roles and one or more administrator roles.3. The method according to claim 1, wherein the set of operations comprises any one of: allocating a virtualized network function, VNF, performing a network or storage request, and updating or querying an allocated resource.4. The method according to claim 1, wherein separation of duty is applied to the hierarchy of party roles.5. The method according to claim 1, wherein obtaining NS instance information comprises allocating NS instance information from the NFVO or from the VNF manager.6. The method according to claim 1, wherein the virtual object comprises any one of: a virtual link, a VNF, a VNF component, a VNF component instance, a virtual machine image, a virtual storage, vTap and vFEP.7. The method according to claim 1, further comprising:receiving, from the NFVO or the VNF manager, a resource selection input, comprising a location attribute of a resource; andwhen the location attribute of the resource indicates a location within the geographic location information of the NS instance information, allowing the resource to be allocated for a VNF of the NS.8. The method according to claim 7, wherein the resource comprises storage resource or a virtual link.9. The method according to claim 1, further comprising:receiving, from the NFVO or the VNF manager, a selection input indicating scaling down of resources used for the SD; anderasing data stored on resources, used for the SD, to be removed prior to release of said resources.10. An apparatus capable of configuring a secure domain, SD, in a network functions virtualisation infrastructure, NFVI, where the SD is controlled by a network function virtualizations orchestrator, NFVO, and a virtualized infrastructure manager, VIM, where the NFVO and the VIM are associated with a virtualized network function, VNF, manager, the SD comprising virtual objects handling privileged information, the apparatus having a processing circuit and a memory circuit, the memory circuit having instructions executable by the processor circuit, wherein said processing circuit when executing the instructions is configured to:obtain, from the NFVO or the VNF manager, network service, NS, instance information of a virtual object, based on input from a party associated with the SD;search in the NS instance information, for a level of confidentiality and geographic location information; andallocate the virtual object to the SD according to the geographic location information, based on the level of confidentiality and a specific role of the party, when having identified the level of confidentiality and the geographic location;authorize access to a set of operations on the virtual object, for the party, wherein the operations are based on the specific role of the party, in a hierarchy of party roles;receive, from the NFVO or the VNF manager, a selection input for a further virtual object, the selection input comprising a level of confidentiality of the further virtual object and a location attribute of the further virtual object;when the location attribute of the further virtual object indicates a location within the geographic location information of the NS instance information, allocate the further virtual object to the NS according to the level of confidentiality as comprised in the selection input, based on the specific role of the party; andwhen the location attribute of the further virtual object does not indicate a location within the geographic location information of the NS instance information, wherein the processing circuit when executing the instructions is configured to: check whether location attributes of a second virtual object and of a second virtual link for accessing the second virtual object, allocated to an existing VNF, indicate a second location within or outside borders of a jurisdiction indicated in the geographic location information of the NS instance information; andconfigure the SD to allow lawful intercept, LI, by a privileged party in a hierarchy in the roles, when said location attributes of the second virtual object and of the second virtual link for accessing the second virtual object, indicate a second location within said borders of the jurisdiction, based on the role of the privileged party.11. The apparatus according to claim 10, for which the hierarchy of party roles comprises a hierarchy of one or more user roles and one or more administrator roles.12. The apparatus according to claim 10, wherein the set of operations comprises any one of: allocating a VNF, performing a network or storage request, and updating or querying an allocated resource.13. The apparatus according to claim 10, wherein separation of duty is applied to the hierarchy of party roles.14. The apparatus according to claim 10, wherein the processing circuit when executing the instructions is configured to allocate NS instance information from the NFVO.15. The apparatus according to claim 10, wherein the virtual object comprises any one of: a virtual link, a VNF, a VNF component, a VNF component instance, virtual machine image, a virtual storage, vTap and vFEP.16. The apparatus according to claim 10, wherein the resource comprises storage resource or a virtual link.