SlideShare a Scribd company logo
1 of 17
NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property
of their respective owners. © 2017 NXP B.V.
PUBLIC
SDN and NFV Integrated OpenStack Cloud
- Birds-eye View of Security -
Trinath Somanchi, Sridhar Pothuganti
NXP – HSDC – INDIA
Lightning Talks – OpenStack Summit, Sydney
Wednesday, 8th November 2017
PUBLIC 1
Session Outline
• OpenStack with SDN and NFV – From Data Center to
Edge
• The OpenStack SDN and NFV Cloud
• Five Dimensional Threat Analysis
• Threat focus areas – Birds-eye View
• Layered Security Approaches
• Secured Platform - NFVI
• Security Initiatives from OpenStack
• Security Checklist
PUBLIC2
Threat Analysis on
SDN and NFV integrated
OpenStack Cloud
PUBLIC 3
SDN and NFV - From Data Center to Edge
• Data Centers are moving to be Hybrid
• Aggregation Nodes are paths to support
Edge devices
• Edge devices evolve to hold VNFs
• Edge devices moving toward – Distributed
Control with local controllers
• New SDN – Security Defined Networking
• Security – a Challenge to tackle from DC to
Edge
• NFVI Security – a major concern
PUBLIC 4
The OpenStack SDN and NFV Cloud
Operation Support Systems
Business Support Systems
Compute Storage Network
Virtualization Layer
Compute
Virtualizatio
n
Storage
Virtualizatio
n
Network
Virtualizatio
n
Vi-Ha
EMS - 1 EMS - 2 EMS - n
VNF - 1 VNF - 2 VNF - n
Orchestrator
Orchestrator
Orchestrator
VNF
Manager(s)
Virtualized
Infrastructure
Manager(s)
Vn-Nf
Service, VNF,
Infrastructure Description
Os-Ma
Se-Ma
Ve-Vnfm
Or-Vnfm
Or-Vi
Vi-Vnfm
Nf-Vi
NFVI
Virtual NetworkingNeutron
WorkflowMistral
Service Function Chaining
Networking
SFC
Open Virtual Networking
Networking
OVN
Orchestration
Heat
Heat-translator
TOSCA Parser
Multi Site OpenStack Networking Tricircle
Multi Site OpenStack VIM KingBird
VNF Image Store Glance
Block and Object Store
Swift
Cinder
NFVO and VNFM Tacker
Monitor and TelemetryCeilometer
ODL SDN Controller Plugin
Networking
ODL
Monitoring and Logging Monasca
Secrets Store Barbican
VNF High Availability Masakari Disaster RecoveryFreezer
PUBLIC 5
Five Dimensional Threat Analysis
Each Threat exposes a different aspect of SYSTEM VUNERABILITY at each layer.
Threat
Analysis
SDN
fabric
NFV Infrastructure
> Attacks on Shared pool of resources
> Hypervisor layer attacks
> Vulnerabilities in virtualized entities
VNF Layer
> Dos/DDoS attacks
> Control Plane attacks
> Noisy neighbor
> Attacks due to insecure interfaces
control and monitoring gaps
> Different vendor NFV standards
SDN Fabric
> Attacks on Forwarding plane
> Flooding of network
> weak ACL in Ctrl and Mgmt plane
> Vulnerabilities in SDN resources
NFV MANO
> Weak access control
> Inefficient monitoring
> Vulnerabilities in underlying layers
Others
> Weak access control
> Insecure interface
> Vulnerabilities in other layers
PUBLIC 6
VNF
Manager
Voice
Voice
BB
BB
IPTV
IPTV
EMS EMS EMS
VNFs
SDN
C
OSS/BSS
NFV Orchestrator
Network
Orchestration
Service
Orchestration
VIM
IP
Edge
IP
Edge
DC
Edge
DC
Edge
OpenStackTelco Cloud
Attacks
from VMs
Attacks on
Host,
Hypervisor
and VM
DDoS/MiM/Network
Traffic Poisoning
Attacks
Attacks from
remote/3rd
Party
applications
Threat Focus Areas – Birds-eye View
PUBLIC 7
Security Focus
PUBLIC 8
Layered Security approaches
OpenStack bridges between three security domains
Critical elements of a Secure OpenStack Cloud
PUBLIC 9
Secure OpenStack as Virtual Infrastructure Manager
Keystone
A&A
Multi-factor Auth
Enabled Federated
Identity.
Access policies.
Non-Persistent
tokens.
Strong HA for PKI
Tokens.
Nova
•Trusted Compute
pools.
Keypair based
access to VMs.
Encrypting
Metadata traffic.
SELinux and
Virtualization.
FIPS 140-2 certified
Hypervisors.
Compiler
Hardening.
Secured
communication.
Neutron
Networking
resource policy
engine
Security Groups
Enable Quotas.
Mitigate ARP
Spoofing.
Secured
Communications.
Glance
Ownership to
Images.
Strictly checked
configuration
Keystone for
Authentication
Encryption of
Images.
Vulnerability checks
on Images.
Cinder
Secured
Communication
Limit max body
size – Request.
Strict permission
and Configuration.
Enable Volume
Encryption.
Secured Network
attached Storage.
Swift
Network Security –
Rsync.
File permissions.
Secured Storage
Services.
Strict ACL.
Secured
Communication.
Barbican
Key Management
as a Service.
Manage Secrets,
PKI keys, Split
keys.
Isolation of Keys is
a top priority
OpenStack
Security
OpenStack
Security Advisories
(OSSA)
•OpenStack
Security Notes
(OSSN)
•OpenStack
Security Guide
•OpenStack
Security Project
blog
• OpenStack
Security
Management tools.
PUBLIC 10
OpenStack readiness for Secured Cloud
“Notable Fortune 100 enterprises BMW, Disney and Walmart have irrefutably proven that OpenStack is viable for production environments [5]
• Securing OpenStack is an extension of a well-understood problem― securing normal IT
infrastructure, such as keeping the infrastructure patched, reducing attack surfaces, and managing
logging and auditing.
PUBLIC 11
Secured Platform – NFVI
Run-Time Security
Management and Enforcement
OP-TEE
Framework, drivers
Secure Installer, Loader
Secure Credential Mgmt
Secure Storage
Secure System Partitioning
Resource Mgmt
Tool
LUKS
dm-crypt
TSS
PKCS-11
Extended
Verification Mod
Integrity
Measurement
Architecture
Secure Monitoring, Statistics
QorIQ Trust
Tools
Secure Provisioning and Update
Application Isolation
Environment
I/O isolation, protection
SE-Linux
KVM, Docker, Java
Application
Application
Application
Application
Linux LTS kernel
- Latest security patches
Trust Architecture
ARMv8 cores ARM Trust-Zone
Secure Boot – HW Root of Trust
Secure
Monitor
Compute, IO, Memory partitioning
Run-Time Integrity
Checker
Secure Key
Storage
Manufacturing
Protection
8
Secure
Boot
1
Secure
Storage
2
Key
Protection
3
Key
Revocation
4
Secure
Debug
5
Tamper
Detection
6
Strong
Partitioning
7
PUBLIC 12
NFVI - Secure Platform in a Gateway
QorIQ Trust
Architecture provides
HW Root of Trust.
Anti-cloning features.
Anti-rollback to
vulnerable firmware.
Persistent secret
storage not visible to
hackers.
Secure Boot
Secure signing of
images and key
provisioning.
3-way secrets
isolation between
NXP, ODM and
customer.
Secured firmware
upgrades
Secure
Provisioning
Secure run-time
system operations.
Secure credential
management – e.g.
DRM keys.
Detect tampering of
software via integrity
checks.
Decrypt system
firmware on-the-fly
Trusted Linux
Isolate and host
multiple services in
containers, VMs.
Verify applications
before install and
launch.
HW level resource
isolation and
management.
Application
Isolation
NIST certified
Security engine with
rich algorithm
support.
True Random
Number Generation
with 100% entropy
Integrated with Linux
IPSec and
OpenSSL.
Crypto
Acceleration
802.11ax,
ac, ad
ARM CPUs
up to 100K Coremark
Trust
Arch
Packet Engine
2-20Gbps
Ethernet Controllers
2x 1GE -> 2x 10GE
Security
Engine
Secure Gateway
LS1046
LS1043
LS1012
LS1024
Networking, Security drivers
Linux NW Stack
OpenWRT
Layer 4-7
DPI, AIS
Customer
Applications
Layer 2 – 4 offload
(IPSec, Firewall, NAPT, QoS)
Customer Control
Plane
DPDK, ODPVirtualizationFramework
Secure Platform
LA1575
PUBLIC 13
Secure SDN and NFV Integrated OpenStack Cloud
VNF
Manager
Voice
Voice
BB
BB
IPTV
IPTV
EMS EMS EMS
VNFs
SDN
C
OSS/BSS
NFV Orchestrator
Network
Orchestration
Service
Orchestration
VIM
IP
Edge
IP
Edge
DC
Edge
DC
Edge
Telco Cloud
Security Orchestration
Virtualized
Security
Hardware
Security
VNF Security
Engine
Firewall
IPS/IDS
Authorized Access
Security Policing
Trust attestation
PUBLIC 14
Security Checklist
 Monitor Virtual networks – Daily practice.
 VNF FCAPS – Analysis and Analytics.
 OpenStack communication via Secured tunnels.
 Encrypted password for DB access – Monthly TODO.
 Verify VNF images for Vulnerabilities.
 Infra design – Network Security Defense patterns.
 Scan block storage.
 Strict Policy and Security groups.
 OpenStack Security ML
 Hardware Crypto accelerators.
 Role based access control.
 Scan the complete cloud.
 Secure the Data plane layer – Use TLS 1.2 for authentication.
 Security Harden SDN Controller Operating System.
 Strict authentication and Authorization to SDN Controller.
 Implement HA of SDN Controller to guard against DDoS attacks.
 Enable Application level Security.
 Use TLS or SSH – NBC and Controller management.
 All routers and switches security hardened.
 Isolate tenant traffic from management traffic.
 Periodically patch the software components for vulnerabilities.
 Security Monitoring – a daily practice.
 Adopt Security Orchestrator frameworks – VSF Orchestration.
 Isolated Key Manager – a chest for all keys.
 Encrypt and split the storage.
 ReSTful communication – Secured.
 No Test ports/API at Production.
 Upgrade the system – for security bug fixes.
 Distributed SDN Controllers and VNF Managers – Large DC
 Leverage Hardware security capabilities.
 FIPS 140-2 certified Hypervisors.
 Federated Identity.
ABSOLUTE SECURITY IS A MYTH.
PUBLIC 15
That’s all folks
1. Securing OpenStack Clouds - https://www.openstack.org/assets/securing-openstack-clouds/OpenStack-SecurityBrief-
letteronline.pdf
2. OpenStack Security Guide - https://docs.openstack.org/security-guide/
3. OpenStack Security Wiki - https://wiki.openstack.org/wiki/Security
4. OpenStack Security - https://security.openstack.org/
5. Security Notes (OSSN) - https://wiki.openstack.org/wiki/Security_Notes
6. Security Advisories - https://security.openstack.org/ossalist.html
7. OpenStack is Ready for Business - https://www.openstack.org/enterprise/forrester-report/
8. QorIQ Layerscape Secure Platform - Securing the Complete Product Lifecycle -
https://www.nxp.com/products/microcontrollers-and-processors/power-architecture-processors/qoriq-
platforms/developer-resources/qoriq-layerscape-secure-platform-securing-the-complete-product-lifecycle:SECURE-
PLATFORM
References
NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners. © 2017 NXP B.V.

More Related Content

What's hot

VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsTrinath Somanchi
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFEmulex Corporation
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld
 
Network Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoFNetwork Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoFAPNIC
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined NetworkingPrasenjit Sarkar
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overviewsidneel
 
Nfv open stack-shuo-yang
Nfv open stack-shuo-yangNfv open stack-shuo-yang
Nfv open stack-shuo-yangOW2
 
NFV : Virtual Network Function Architecture
NFV : Virtual Network Function ArchitectureNFV : Virtual Network Function Architecture
NFV : Virtual Network Function Architecturesidneel
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFAPNIC
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overviewsidneel
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecturesidneel
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginnersDave Neary
 
Network Softwerization Impact, NFV, SDN
Network Softwerization Impact, NFV, SDNNetwork Softwerization Impact, NFV, SDN
Network Softwerization Impact, NFV, SDNMarie-Paule Odini
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPooja Patel
 

What's hot (20)

VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
 
Network Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoFNetwork Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoF
 
NFV and OpenStack
NFV and OpenStackNFV and OpenStack
NFV and OpenStack
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
 
Nfv open stack-shuo-yang
Nfv open stack-shuo-yangNfv open stack-shuo-yang
Nfv open stack-shuo-yang
 
NFV : Virtual Network Function Architecture
NFV : Virtual Network Function ArchitectureNFV : Virtual Network Function Architecture
NFV : Virtual Network Function Architecture
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoF
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
 
NFV & Openstack
NFV & OpenstackNFV & Openstack
NFV & Openstack
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
 
Network Softwerization Impact, NFV, SDN
Network Softwerization Impact, NFV, SDNNetwork Softwerization Impact, NFV, SDN
Network Softwerization Impact, NFV, SDN
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSX
 

Viewers also liked

OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101Trinath Somanchi
 
Optimize Your Funnel By Getting Inside Your Buyer's Head
Optimize Your Funnel By Getting Inside Your Buyer's HeadOptimize Your Funnel By Getting Inside Your Buyer's Head
Optimize Your Funnel By Getting Inside Your Buyer's HeadDavid Skok
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Smart Citizen Kit in Barcelona, Amsterdam & Manchester
Smart Citizen Kit in Barcelona, Amsterdam & ManchesterSmart Citizen Kit in Barcelona, Amsterdam & Manchester
Smart Citizen Kit in Barcelona, Amsterdam & ManchesterFrank Kresin
 
DEVNET-1154 Open Source Presentation on Open Standards
DEVNET-1154	Open Source Presentation on Open StandardsDEVNET-1154	Open Source Presentation on Open Standards
DEVNET-1154 Open Source Presentation on Open StandardsCisco DevNet
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIsCisco DevNet
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)Apigee | Google Cloud
 
DevNet Express - Spark & Tropo API - Lisbon May 2016
DevNet Express - Spark & Tropo API - Lisbon May 2016DevNet Express - Spark & Tropo API - Lisbon May 2016
DevNet Express - Spark & Tropo API - Lisbon May 2016Cisco DevNet
 
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...Cisco DevNet
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFVCisco DevNet
 
New NeXt for Advanced Developers
New NeXt for Advanced DevelopersNew NeXt for Advanced Developers
New NeXt for Advanced DevelopersCisco DevNet
 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingAnju Ann
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
Current and Future Directions of Internet of Things
Current and Future Directions of Internet of ThingsCurrent and Future Directions of Internet of Things
Current and Future Directions of Internet of ThingsDr. Mazlan Abbas
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017Carol Smith
 

Viewers also liked (20)

OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101
 
Hadoop on-mesos
Hadoop on-mesosHadoop on-mesos
Hadoop on-mesos
 
Optimize Your Funnel By Getting Inside Your Buyer's Head
Optimize Your Funnel By Getting Inside Your Buyer's HeadOptimize Your Funnel By Getting Inside Your Buyer's Head
Optimize Your Funnel By Getting Inside Your Buyer's Head
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Smart Citizen Kit in Barcelona, Amsterdam & Manchester
Smart Citizen Kit in Barcelona, Amsterdam & ManchesterSmart Citizen Kit in Barcelona, Amsterdam & Manchester
Smart Citizen Kit in Barcelona, Amsterdam & Manchester
 
DEVNET-1154 Open Source Presentation on Open Standards
DEVNET-1154	Open Source Presentation on Open StandardsDEVNET-1154	Open Source Presentation on Open Standards
DEVNET-1154 Open Source Presentation on Open Standards
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)
 
DevNet Express - Spark & Tropo API - Lisbon May 2016
DevNet Express - Spark & Tropo API - Lisbon May 2016DevNet Express - Spark & Tropo API - Lisbon May 2016
DevNet Express - Spark & Tropo API - Lisbon May 2016
 
ioT_SDN
ioT_SDN ioT_SDN
ioT_SDN
 
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...
OpenStack and OpenDaylight, The Evolving Relationship in Cloud Networking: a ...
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFV
 
New NeXt for Advanced Developers
New NeXt for Advanced DevelopersNew NeXt for Advanced Developers
New NeXt for Advanced Developers
 
SDN Abstractions
SDN AbstractionsSDN Abstractions
SDN Abstractions
 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to Networking
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Current and Future Directions of Internet of Things
Current and Future Directions of Internet of ThingsCurrent and Future Directions of Internet of Things
Current and Future Directions of Internet of Things
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Similar to SDN and NFV integrated OpenStack Cloud - Birds eye view on Security

Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...OPNFV
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services SecureADVA
 
Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!mlacostma
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.Priyanka Aash
 
2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security SeminarShawn Wells
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerSaikat Chaudhuri
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenPrecisely
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep divesolarisyougood
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsADVA
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFVOPNFV
 
443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptxAbdulqader Al-kaboudei
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session Cisco Canada
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 

Similar to SDN and NFV integrated OpenStack Cloud - Birds eye view on Security (20)

Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services Secure
 
Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV
 
443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx443029825 cloud-computing-week8-9-pptx
443029825 cloud-computing-week8-9-pptx
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
cn-series-container-firewall.pdf
cn-series-container-firewall.pdfcn-series-container-firewall.pdf
cn-series-container-firewall.pdf
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 

Recently uploaded

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Recently uploaded (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

SDN and NFV integrated OpenStack Cloud - Birds eye view on Security

  • 1. NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners. © 2017 NXP B.V. PUBLIC SDN and NFV Integrated OpenStack Cloud - Birds-eye View of Security - Trinath Somanchi, Sridhar Pothuganti NXP – HSDC – INDIA Lightning Talks – OpenStack Summit, Sydney Wednesday, 8th November 2017
  • 2. PUBLIC 1 Session Outline • OpenStack with SDN and NFV – From Data Center to Edge • The OpenStack SDN and NFV Cloud • Five Dimensional Threat Analysis • Threat focus areas – Birds-eye View • Layered Security Approaches • Secured Platform - NFVI • Security Initiatives from OpenStack • Security Checklist
  • 3. PUBLIC2 Threat Analysis on SDN and NFV integrated OpenStack Cloud
  • 4. PUBLIC 3 SDN and NFV - From Data Center to Edge • Data Centers are moving to be Hybrid • Aggregation Nodes are paths to support Edge devices • Edge devices evolve to hold VNFs • Edge devices moving toward – Distributed Control with local controllers • New SDN – Security Defined Networking • Security – a Challenge to tackle from DC to Edge • NFVI Security – a major concern
  • 5. PUBLIC 4 The OpenStack SDN and NFV Cloud Operation Support Systems Business Support Systems Compute Storage Network Virtualization Layer Compute Virtualizatio n Storage Virtualizatio n Network Virtualizatio n Vi-Ha EMS - 1 EMS - 2 EMS - n VNF - 1 VNF - 2 VNF - n Orchestrator Orchestrator Orchestrator VNF Manager(s) Virtualized Infrastructure Manager(s) Vn-Nf Service, VNF, Infrastructure Description Os-Ma Se-Ma Ve-Vnfm Or-Vnfm Or-Vi Vi-Vnfm Nf-Vi NFVI Virtual NetworkingNeutron WorkflowMistral Service Function Chaining Networking SFC Open Virtual Networking Networking OVN Orchestration Heat Heat-translator TOSCA Parser Multi Site OpenStack Networking Tricircle Multi Site OpenStack VIM KingBird VNF Image Store Glance Block and Object Store Swift Cinder NFVO and VNFM Tacker Monitor and TelemetryCeilometer ODL SDN Controller Plugin Networking ODL Monitoring and Logging Monasca Secrets Store Barbican VNF High Availability Masakari Disaster RecoveryFreezer
  • 6. PUBLIC 5 Five Dimensional Threat Analysis Each Threat exposes a different aspect of SYSTEM VUNERABILITY at each layer. Threat Analysis SDN fabric NFV Infrastructure > Attacks on Shared pool of resources > Hypervisor layer attacks > Vulnerabilities in virtualized entities VNF Layer > Dos/DDoS attacks > Control Plane attacks > Noisy neighbor > Attacks due to insecure interfaces control and monitoring gaps > Different vendor NFV standards SDN Fabric > Attacks on Forwarding plane > Flooding of network > weak ACL in Ctrl and Mgmt plane > Vulnerabilities in SDN resources NFV MANO > Weak access control > Inefficient monitoring > Vulnerabilities in underlying layers Others > Weak access control > Insecure interface > Vulnerabilities in other layers
  • 7. PUBLIC 6 VNF Manager Voice Voice BB BB IPTV IPTV EMS EMS EMS VNFs SDN C OSS/BSS NFV Orchestrator Network Orchestration Service Orchestration VIM IP Edge IP Edge DC Edge DC Edge OpenStackTelco Cloud Attacks from VMs Attacks on Host, Hypervisor and VM DDoS/MiM/Network Traffic Poisoning Attacks Attacks from remote/3rd Party applications Threat Focus Areas – Birds-eye View
  • 9. PUBLIC 8 Layered Security approaches OpenStack bridges between three security domains Critical elements of a Secure OpenStack Cloud
  • 10. PUBLIC 9 Secure OpenStack as Virtual Infrastructure Manager Keystone A&A Multi-factor Auth Enabled Federated Identity. Access policies. Non-Persistent tokens. Strong HA for PKI Tokens. Nova •Trusted Compute pools. Keypair based access to VMs. Encrypting Metadata traffic. SELinux and Virtualization. FIPS 140-2 certified Hypervisors. Compiler Hardening. Secured communication. Neutron Networking resource policy engine Security Groups Enable Quotas. Mitigate ARP Spoofing. Secured Communications. Glance Ownership to Images. Strictly checked configuration Keystone for Authentication Encryption of Images. Vulnerability checks on Images. Cinder Secured Communication Limit max body size – Request. Strict permission and Configuration. Enable Volume Encryption. Secured Network attached Storage. Swift Network Security – Rsync. File permissions. Secured Storage Services. Strict ACL. Secured Communication. Barbican Key Management as a Service. Manage Secrets, PKI keys, Split keys. Isolation of Keys is a top priority OpenStack Security OpenStack Security Advisories (OSSA) •OpenStack Security Notes (OSSN) •OpenStack Security Guide •OpenStack Security Project blog • OpenStack Security Management tools.
  • 11. PUBLIC 10 OpenStack readiness for Secured Cloud “Notable Fortune 100 enterprises BMW, Disney and Walmart have irrefutably proven that OpenStack is viable for production environments [5] • Securing OpenStack is an extension of a well-understood problem― securing normal IT infrastructure, such as keeping the infrastructure patched, reducing attack surfaces, and managing logging and auditing.
  • 12. PUBLIC 11 Secured Platform – NFVI Run-Time Security Management and Enforcement OP-TEE Framework, drivers Secure Installer, Loader Secure Credential Mgmt Secure Storage Secure System Partitioning Resource Mgmt Tool LUKS dm-crypt TSS PKCS-11 Extended Verification Mod Integrity Measurement Architecture Secure Monitoring, Statistics QorIQ Trust Tools Secure Provisioning and Update Application Isolation Environment I/O isolation, protection SE-Linux KVM, Docker, Java Application Application Application Application Linux LTS kernel - Latest security patches Trust Architecture ARMv8 cores ARM Trust-Zone Secure Boot – HW Root of Trust Secure Monitor Compute, IO, Memory partitioning Run-Time Integrity Checker Secure Key Storage Manufacturing Protection 8 Secure Boot 1 Secure Storage 2 Key Protection 3 Key Revocation 4 Secure Debug 5 Tamper Detection 6 Strong Partitioning 7
  • 13. PUBLIC 12 NFVI - Secure Platform in a Gateway QorIQ Trust Architecture provides HW Root of Trust. Anti-cloning features. Anti-rollback to vulnerable firmware. Persistent secret storage not visible to hackers. Secure Boot Secure signing of images and key provisioning. 3-way secrets isolation between NXP, ODM and customer. Secured firmware upgrades Secure Provisioning Secure run-time system operations. Secure credential management – e.g. DRM keys. Detect tampering of software via integrity checks. Decrypt system firmware on-the-fly Trusted Linux Isolate and host multiple services in containers, VMs. Verify applications before install and launch. HW level resource isolation and management. Application Isolation NIST certified Security engine with rich algorithm support. True Random Number Generation with 100% entropy Integrated with Linux IPSec and OpenSSL. Crypto Acceleration 802.11ax, ac, ad ARM CPUs up to 100K Coremark Trust Arch Packet Engine 2-20Gbps Ethernet Controllers 2x 1GE -> 2x 10GE Security Engine Secure Gateway LS1046 LS1043 LS1012 LS1024 Networking, Security drivers Linux NW Stack OpenWRT Layer 4-7 DPI, AIS Customer Applications Layer 2 – 4 offload (IPSec, Firewall, NAPT, QoS) Customer Control Plane DPDK, ODPVirtualizationFramework Secure Platform LA1575
  • 14. PUBLIC 13 Secure SDN and NFV Integrated OpenStack Cloud VNF Manager Voice Voice BB BB IPTV IPTV EMS EMS EMS VNFs SDN C OSS/BSS NFV Orchestrator Network Orchestration Service Orchestration VIM IP Edge IP Edge DC Edge DC Edge Telco Cloud Security Orchestration Virtualized Security Hardware Security VNF Security Engine Firewall IPS/IDS Authorized Access Security Policing Trust attestation
  • 15. PUBLIC 14 Security Checklist  Monitor Virtual networks – Daily practice.  VNF FCAPS – Analysis and Analytics.  OpenStack communication via Secured tunnels.  Encrypted password for DB access – Monthly TODO.  Verify VNF images for Vulnerabilities.  Infra design – Network Security Defense patterns.  Scan block storage.  Strict Policy and Security groups.  OpenStack Security ML  Hardware Crypto accelerators.  Role based access control.  Scan the complete cloud.  Secure the Data plane layer – Use TLS 1.2 for authentication.  Security Harden SDN Controller Operating System.  Strict authentication and Authorization to SDN Controller.  Implement HA of SDN Controller to guard against DDoS attacks.  Enable Application level Security.  Use TLS or SSH – NBC and Controller management.  All routers and switches security hardened.  Isolate tenant traffic from management traffic.  Periodically patch the software components for vulnerabilities.  Security Monitoring – a daily practice.  Adopt Security Orchestrator frameworks – VSF Orchestration.  Isolated Key Manager – a chest for all keys.  Encrypt and split the storage.  ReSTful communication – Secured.  No Test ports/API at Production.  Upgrade the system – for security bug fixes.  Distributed SDN Controllers and VNF Managers – Large DC  Leverage Hardware security capabilities.  FIPS 140-2 certified Hypervisors.  Federated Identity. ABSOLUTE SECURITY IS A MYTH.
  • 16. PUBLIC 15 That’s all folks 1. Securing OpenStack Clouds - https://www.openstack.org/assets/securing-openstack-clouds/OpenStack-SecurityBrief- letteronline.pdf 2. OpenStack Security Guide - https://docs.openstack.org/security-guide/ 3. OpenStack Security Wiki - https://wiki.openstack.org/wiki/Security 4. OpenStack Security - https://security.openstack.org/ 5. Security Notes (OSSN) - https://wiki.openstack.org/wiki/Security_Notes 6. Security Advisories - https://security.openstack.org/ossalist.html 7. OpenStack is Ready for Business - https://www.openstack.org/enterprise/forrester-report/ 8. QorIQ Layerscape Secure Platform - Securing the Complete Product Lifecycle - https://www.nxp.com/products/microcontrollers-and-processors/power-architecture-processors/qoriq- platforms/developer-resources/qoriq-layerscape-secure-platform-securing-the-complete-product-lifecycle:SECURE- PLATFORM References
  • 17. NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners. © 2017 NXP B.V.