SDN/NFV Position Paper



Similar documents
SDN and NFV in the WAN

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES

The Role of Virtual Routers In Carrier Networks

Leveraging SDN and NFV in the WAN

Designing Virtual Network Security Architectures Dave Shackleford

SDN/Virtualization and Cloud Computing

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

ByteMobile Adaptive Traffic Management Product Family

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

Network Function Virtualization & Software Defined Networking

Securing the Intelligent Network

Using SDN-OpenFlow for High-level Services

Virtualization, SDN and NFV

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26

Network functions Virtualisation CIO Summit Peter Willis & Andy Reid

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

Data and Control Plane Interconnect solutions for SDN & NFV Networks Raghu Kondapalli August 2014

SOFTWARE DEFINED NETWORKING

Introduction to Quality Assurance for Service Provider Network Functions Virtualization

Service Automation Made Easy

Business Case for NFV/SDN Programmable Networks

Center SDN & NFV. Modern Data IN THE

Blue Planet. Introduction. Blue Planet Components. Benefits

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Enterprise Data Center Networks

OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014

Understanding the Business Case of Network Function Virtualization

ON.Lab Launches Revolutionary SDN Open Source Network Operating System ONOS on behalf of its Community of Service Providers and Innovator Partners

Quick Overview of SDN/NFV Research at Berkeley

Management & Orchestration of Metaswitch s Perimeta Virtual SBC

Applications of Software-Defined Networking (SDN) in Power System Communication Infrastructure: Benefits and Challenges

NETWORK FUNCTIONS VIRTUALIZATION FOR SECURITY (NFV-S)

Delivering Managed Services Using Next Generation Branch Architectures

Security Services. 30 years of experience in IT business

SDN-based Application-Aware Networking on the Example of YouTube Video Streaming

Trusting SDN. Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015

An Integrated Validation Approach to SDN & NFV

VIRTUALIZING THE EDGE

Surviving the SDN Wars. Curt Beckmann Chair of Forwarding Abstractions WG, ONF and EMEA CTO

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial

How To Orchestrate The Clouddusing Network With Andn

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

Public Cloud Workshop Offerings

Use Cases for the NPS the Revolutionary C-Programmable 7-Layer Network Processor. Sandeep Shah Director, Systems Architecture EZchip

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

OPC & Security Agenda

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Ensuring end-user quality in NFV-based infrastructures

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Problem statement of SDN and NFV co-deploy ment in cloud datacenters

Software Defined Networking (SDN) Solutions, Market Opportunities and Forecast

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Definition of a White Box. Benefits of White Boxes

Accelerating SDN Adoption with open source SDN platforms. Nov.11, 2014 Atsushi Iwata Director NEC Corporation of America

Software Defined Perimeter: Securing the Cloud to the Internet of Things

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

The Hillstone and Trend Micro Joint Solution

ETSI NFV ISG DIRECTION & PRIORITIES

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

Boosting Business Agility through Software-defined Networking

DPI & Traffic Analysis in Networks Based on NFV and SDN

Beyond the Data Center: How Network-Function Virtualization Enables New Customer-Premise Services

Unified Threat Management, Managed Security, and the Cloud Services Model

The Evolution of SDN and NFV Orchestration

Bringing Continuous Security to the Global Enterprise

Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms Abstract

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Traffic Management Solutions for Social Innovation Business

NEC s Carrier-Grade Cloud Platform

OpenStack Networking: Where to Next?

How OpenFlow-based SDN can increase network security

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Canvas VAS Transformation & Consolidation. Whitepaper. info@telenity.com

Dynamic Service Chaining for NFV/SDN

The New IP Networks: Time to Move From PoC to Revenue

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Interworking of NFV/SDN with QoE Monitoring in Mobile Networks

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

SDN Architecture and Service Trend

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications

FACING SECURITY CHALLENGES

Qualifying SDN/OpenFlow Enabled Networks

Network Services in the SDN Data Center

Guideline on Implementing Cloud Identity and Access Management

Transcription:

SDN/NFV Position Paper Virtualization Working Group Justin Foster justin_foster@trendmicro.com Kapil Raina kapil.raina@elastica.net Kelvin Ng Kelvin_NG@nyp.edu.sg Cloud Security Alliance, 2015

Agenda Goals White Paper on NFV/SDN (position paper) High level outline Next steps and timelines Cloud Security Alliance, 2015

Goals of Paper SDN/NFV are relatively new technologies Focus of working group initially was on mature technologies (e.g. compute virtualization) Position paper acknowledges these points and creates a more general framework, rather than a detailed approach as taken with the other areas Focus will be heavier on NFV as that is more directly related to enterprises and vendor (that are bulk of CSA audience)

What we Need Your participation Please review structural outline and make comments Feel free to volunteer to write components of the paper This is an industry led effort and should reflect a range of input

Outline of Paper Introduction to paper (1/2 page) What is NFV/SDN? (1 page) What are the benefits? What are the risks? Security framework for NFV (3 pages) Traffic analysis, control plane, CDN, security specific Security framework for SDN (2 pages) Application Plane Control Plane Next steps in creating risk model for NFV/SDN (1 page)

Introduction - NFV Basic overview of how this fits into the CSA working group NFV definition, use cases Use Case 1: Vendor community (how traffic inspection and traffic forwarding can be made easier) Use Case 2: Bad actors (how attacks can be launched against the infrastructure) Use Case 3: End User (what end users can do to secure their NFV infrastructure and leverage multi-vendor analysis) NFV benefits Lower costs, commoditized hardware for rapid deployment, greater management ease NFV security risks Lack of standards, oversight of software changes, software compromise of desktop/mobile world moves to networking

Introduction - SDN SDN Definition and Use Cases SDN focus on carrier networks SDN intersection with NFV SDN architecture (data/control plane) SDN security risks Control Plane (risks to controller compromise including trust of control communications) Data Plane (risks to interception and manipulation) How we will deal with NFV and SDN together in paper

NFV Security Framework Component Function Relevance NFV Security framework Traffic Analysis deep packet inspection, QoE DPI engines can now be placed directly at each egress point Control Plane AAA data, policy enforcement Simplifies some of SSO enforcement Application Optimization/ Acceleration CDN, caching of files Catch infected files and ensure they are not cached Security Specific Firewalls, A/V, IDS, etc Moves traditional boxes and cloud services away from fixed location or vendors; can leverage multi-vendor analysis

SDN Security Framework Component Function Relevance NFV Security framework Control Plane Manage devices Hijacking of networking devices being managed; insecure trust model in network; MITM attacks, etc Application (Data) Plane Deliver network data to devices Data validity and trust; DOS attacks Note: We do not specifically talk about Infrastructure layer (should we?)

Risk Model - Next Steps Ideally we need a risk model that can help detail (in subsequent efforts) a detailed checklist of security steps to protect NFV/SDN infrastructure Model will generally follow: Use case based approach Steps to protect infrastructure Steps to leverage NFV/SDN capability to provide additional security capabilities Auditing mechanisms to verify above Scoring mechanism to help users of model verify how secure they may be for their overall infrastructure How this model relates to other security frameworks (eg. CCM)

Whitepaper Timelines April 24, 2015: Presentation and call for volunteers May 24, 2015: Publication of detailed outline for paper and solicitation for further volunteers June 24, 2015: Initial draft of paper July 30, 2015: Formal draft issued for general review August 30, 2015: Presentation of paper during VMworld

???? Cloud Security Alliance, 2015