SlideShare a Scribd company logo
WWW.GTRI.COM
SDN Security:
Two Sides of the Same Coin
Scott Hogg, CTO GTRI
CCIE #5133, CISSP #4610
Thursday June 9, 2016
© 2016 Global Technology Resources, Inc.
All rights reserved.
© 2016 Global Technology Resources, Inc. All Rights Reserved.
2
Today’s Agenda
• Brief Review of Software Defined Networking (SDN)
• Heads:
o Attack Vectors for SDN Systems
o Securing an SDN System
• Tails:
o SDN Security Use Cases and Applications
• Open Discussion (time permitting)
Defining SDN
• Software-Defined Networking is an approach to
networking that separates the control plane from the
forwarding plane to support virtualization.
• SDN is a new paradigm
for network
virtualization.
SDN High-Level Architecture
Controller
Network
Element
Network
Element
Network
Element
Network
Element
Application Layer
Or
SDN Layer
Virtualized Application Services
Northbound API
Southbound API
Control Layer
Or
Controller Layer
Data Plane Layer
Or
Infrastructure Layer
Agent
Agent
Agent
Agent
Controller
East/West
Interface
SDN Benefits
• Greater span of control and network analytics and response.
• Better intelligence with a global view of the network rather than each
network element looking at the network from its own viewpoint.
• Improved application experience and empower the network
owner/operator.
• Rapid deployment of applications using networking that supports
the application’s specific needs.
• Simplified and automated IT administration.
• Opportunity to open up the network to a diverse set of vendors
and disaggregation.
SDN Use Cases
SDN Use Cases
Heads: Security of SDN Systems
• There are several attack vectors on SDN systems. The more
common SDN security concerns include:
o Attacks targeting the SDN controller – either DoS or to instantiate
new flows (spoofing northbound API messages or spoofing
southbound flows)
o Attacker creates their own controller and gets network elements to
receive flows from that controller – spoofing flows from the
legitimate controller
o Targeting the network elements – DoS or to instantiate new flows
o Attacking the DCI protocol – NVGRE, STT, VXLAN – these protocols
may lack authentication, with no encryption – this is either part of
the protocol design, or the way the vendor has implemented the
protocol
© 2016 Global Technology Resources, Inc. All Rights Reserved.
8
SDN Security Considerations
© 2016 Global Technology Resources, Inc. All Rights Reserved.
9
Controller
Network
Element
Network
Element
Network
Element
Network
Element
SDN Layer
Virtualized Application Services
Northbound API
Southbound API
Controller Layer
Data Plane Layer
Agent
Agent
Agent
Agent
Controller
SDN Vulnerability Genome Project
© 2016 Global Technology Resources, Inc. All Rights Reserved.
10
Source: http://sdnsecurity.org/project_SDN-Security-Vulnerbility-attack-list.html
Recent SDN System Vulnerabilities
• Some versions of SDN systems may contain other opensource software
that is discovered to have vulnerabilities: bash, OpenSSH, OpenSSL, ntpd
• Several vulnerabilities have been reported and fixed within OpenDaylight
o https://wiki.opendaylight.org/view/Security_Advisories
• Netdump vulnerability took 4 months to correct
o http://seclists.org/bugtraq/2014/Aug/75
• Now OpenDaylight project has security team in place
• ONIE vulnerabilities identified in BigSwitch’s Switch Light controller,
Cumulus Linux, Mellanox-OS (August 2015)
• CVE-2015-5699 - Cumulus Linux's Switch Configuration Tools Backend,
clcmd_server, Vulnerable to Local Privilege Escalation (August 11, 2015)
• August 3, 2015 – Cisco APIC root access vulnerability
o http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
20150722-apic
© 2016 Global Technology Resources, Inc. All Rights Reserved.
11
Hardening an SDN System
• Use TLS 1.2 (or UDP/DTLS) to authenticate and encrypt traffic between network
device agent and controller, authenticate controller and network devices/SDN
agent using certificates
• High-Availability controller architecture
• Prevent unauthorized access to SDN control network
• Use Out-of-Band (OOB) network for control traffic, OOB and secure protocols for
controller management and northbound communications
• Harden the controller and the network elements (typical host hardening)
• Closely monitor controllers for suspicious activity
• Secure coding practices for all northbound applications requesting SDN resources
• Ability to validate flows in network device tables against controller policy
• Use Data Center Interconnect (DCI) protocols that can authenticate tunnel
endpoints and secure tunneled traffic
© 2016 Global Technology Resources, Inc. All Rights Reserved.
12
Tails: SDN Security-Specific Use Case
• SDN allows for creative new approaches to security
• We will now review 6 SDN uses cases for security
1. Traffic Filtering with SDN
2. Network Slicing, Campus Slicing, Multi-Tenancy,
Enclaves, Isolation, Network Segmentation
3. DDoS Mitigation
4. Network Access Control (NAC)
5. Security Traffic Monitoring
6. Moving Target Defense (MTD)
© 2016 Global Technology Resources, Inc. All Rights Reserved.
13
Traffic Filtering with SDN
• That which is not permitted is denied – make the SDN
switches not transparent learning/forwarding
• Cisco APIC-EM configures the ACI policy for traffic
permitted between End Point Groups (EPGs) and for
traffic steering – if not permitted, traffic is dropped
• Integrate SDN system with Cisco Identity Services Engine
(ISE) for device profiling, user authentication, SGT,
TrustSec tagging
• Traffic steering toward firewall or content filter, security
service insertion between client and server
© 2016 Global Technology Resources, Inc. All Rights Reserved.
14
SDN Switches As Firewalls?
© 2016 Global Technology Resources, Inc. All Rights Reserved.
15
SDN Controller
Network
Element
SDN Layer
Northbound API
Southbound API
Controller Layer
Data Plane Layer
Agent
Agent
Agent
Agent
Network
Element
Network
Element
Network
Element
Software-Defined Perimeter (SDP)
Network Segmentation with SDN
• Separating the network into logically separated networks
• Network Slicing, Campus Slicing, Secured Enclaves, Micro-
Segmentation, Virtual Routing and Forwarding, etc.
• Done by adding a slicing layer between the control plane and
the data plane, policies are slice-specific
• Enforce strong isolation between slices - actions in one slice
do not affect another (Flowspace)
• Examples: Cisco XNC with Networking Slicing application,
FlowVisor is a special purpose OpenFlow controller that acts
as a transparent proxy between OpenFlow switches and
multiple OpenFlow controllers
© 2016 Global Technology Resources, Inc. All Rights Reserved.
16
Network Segmentation with SDN
• “Network Slicing” Use Case
© 2016 Global Technology Resources, Inc. All Rights Reserved.
17
Source: Cisco Extensible Network Controller Topology-Independent Forwarding and Network Slicing Applications
http://www.cisco.com/en/US/prod/collateral/netmgtsw/ps13397/ps13400/data_sheet_c78-729458.pdf
Network Segmentation with SDN
• FlowVisor
performs
policy checks
across
flowspace and
enforces
isolation
between each
slice
© 2016 Global Technology Resources, Inc. All Rights Reserved.
18
Source: Can the Production Network Be the Testbed?
By Rob Sherwood, Glen Gibb, Kok-Kiong Yap, Guido Appenzeller ,Martin Casado, Nick McKeown, Guru Parulkar
DDoS Mitigation with SDN
• SDN can be used to create a DDoS mitigation system
• SDN network sends DDoS telemetry data to the DDoS
detection system (volumetric, app attacks, protocol DDoS)
• DDoS detection system communicates with northbound API
which configures the policy on the controller for the
destination of the attack
• SDN controller sends flows to network devices to drop
suspicious inbound traffic toward victim
• Cleaned traffic is allowed to pass toward the destination
• Examples: Radware Defense Flow, Radware Defense4All in
ODL Helium, A10 Networks Thunder Threat Protection
System, others…
© 2016 Global Technology Resources, Inc. All Rights Reserved.
19
DDoS Mitigation with SDN
• Radware
DefenseFlow
integrates with
Cisco’s XNC,
OpenDaylight,
BigSwitch Floodlight,
and NEC’s
ProgrammableFlow
OpenFlow-based
switches and
controller
© 2016 Global Technology Resources, Inc. All Rights Reserved.
20
Source: http://www.radware.com/Products/DefenseFlow/
Network Access Control (NAC) with SDN
• SDN systems can prevent unauthorized access or isolate compromised
hosts to a quarantine network, Automated Malware Quarantine (AMQ)
• SDN systems can intervene in assigning addresses to nodes joining
network based on their security posture
• Authenticated end nodes are able to send/receive if they pass security
checks (AV running/updated, patched, …)
• End nodes can only send/receive with their assigned IP/MAC addresses
o Source Address Validation Improvements (SAVI) and First Hop Security (FHS)
• Or direct end-node traffic to Cisco Cloud Threat Defense system, detect
the issue, check with ISE, set SGT=BAD, to contain the traffic
• Examples: Cisco Cloud Threat Defense, HP VAN Sentinel Security
Application
© 2016 Global Technology Resources, Inc. All Rights Reserved.
21
SDN Security Components
© 2016 Global Technology Resources, Inc. All Rights Reserved.
22
Source: 2014 Cisco Live BRKSEC-2760
Security Monitoring with SDN
• Switches often lack sufficient resources to perform
packet/port mirroring/taps
o Every IT silo/team wants their own tap/SPAN session (Network Packet
Broker (NPB))
• Bi-directional packet capture is much better than NetFlow
• Dedicated copper/optical packet monitoring switches can be
very expensive, many taps are required – no blocking ability
• Tap Aggregation is an application that is simple for a SDN
controller and uses low-cost SDN-capable network devices
• Examples: Cisco XNC with Monitor Manager and Nexus 3000
Tap Aggregation Switch, BigSwitch Big Tap Monitoring Fabric,
Microsoft Distributed Ethernet Monitoring (DEMon)
© 2016 Global Technology Resources, Inc. All Rights Reserved.
23
Using SDN to Create a Packet Monitoring System
http://www.networkworld.com/article/2226003/cisco-subnet/using-sdn-to-create-a-packet-monitoring-system.html
Security Monitoring with SDN
• Cisco XNC Monitor Manager, Cisco Nexus Data Broker
© 2016 Global Technology Resources, Inc. All Rights Reserved.
24
Source: Cisco Nexus Data Broker
http://www.cisco.com/c/en/us/products/cloud-systems-management/nexus-data-broker/index.html
Moving Target IPv6 Defense (MT6D)
• MT6D is a system created by
graduate students in the
Information Technology
Security Laboratory at
Virginia Tech to obscure IPv6
addresses
• Periodically hiding/changing
characteristics of victim to
make it more difficult to
find/attack
© 2016 Global Technology Resources, Inc. All Rights Reserved.
25
Source: http://www4.ncsu.edu/~hp/Panos.pdf
SDN Security Summary
• SDN has the potential to provide many new creative
ways to network and secure systems
• SDN represents a new way of thinking, we all need to be
cognizant about this technology shift
• Heads: SDN systems are vulnerable to threats, but SDN
implementations can be hardened against security
attacks
• Tails: SDN systems can provide innovative security
applications that are not possible with traditional
methods
© 2016 Global Technology Resources, Inc. All Rights Reserved.
26
SDN & Security Resources
• Solution Brief: SDN Security Considerations in the Data Center
o https://www.opennetworking.org/solution-brief-sdn-security-considerations-in-the-
data-center
• SDN Security Challenges in SDN Environments
o https://www.sdxcentral.com/resources/security/security-challenges-sdn-software-
defined-networks/
• SDN Security Attack Vectors and SDN Hardening
o http://www.networkworld.com/article/2840273/sdn/sdn-security-attack-vectors-and-
sdn-hardening.html
• With Cisco ACI, Do You Still Need A Firewall?
o https://cisco-
marketing.hosted.jivesoftware.com/people/shogg@gtri.com/blog/2015/03/02/with-
cisco-aci-do-you-still-need-a-firewall
• Is an SDN Switch A New Form of a Firewall?
o http://www.networkworld.com/article/2905257/sdn/is-an-sdn-switch-a-new-form-of-
a-firewall.html
© 2016 Global Technology Resources, Inc. All Rights Reserved.
27
FREE SDN Technology Review
• We are offering a FREE 3-hour (~1/2 day) SDN technology review
for your company
• Bring your networking, security, DevOps, and other technology
teams together
• Review SDN capabilities within your existing networked systems
• Discuss SDN architecture and design options
• Review network automation and network programmability potential
• Engage in conversation on securely deploying IPv6 and using SDN for
security
WWW.GTRI.COM
Questions and Answers
Next Steps
Thank you!
SHogg@GTRI.com
303-949-4865
@scotthogg

More Related Content

What's hot

Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
islam Salah
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
SDxCentral
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
Venkata Naga Ravi
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
Pramod Kuruvatti
 
SDN, OpenFlow, NFV, and Virtual Network
SDN, OpenFlow, NFV, and Virtual NetworkSDN, OpenFlow, NFV, and Virtual Network
SDN, OpenFlow, NFV, and Virtual Network
Tim4PreStartup
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
rjain51
 
Introductionto SDN
Introductionto SDN Introductionto SDN
Introductionto SDN
Md. Shariful Islam Robin
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Cisco Canada
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVKingston Smiler
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud
seungdols
 
Software Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_truptiSoftware Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_trupti
trups7778
 
Fundamentos de SDN (Software Defined Networking)
Fundamentos de SDN (Software Defined Networking)Fundamentos de SDN (Software Defined Networking)
Fundamentos de SDN (Software Defined Networking)
Ignacio Gonzalez de los Reyes Gavilan
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
Dave Neary
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
HayderThary
 
ONOS SDN Controller - Introduction
ONOS SDN Controller - IntroductionONOS SDN Controller - Introduction
ONOS SDN Controller - Introduction
Eueung Mulyana
 
Storage area network
Storage area networkStorage area network
Storage area network
Syed Ubaid Ali Jafri
 

What's hot (20)

Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
SDN, OpenFlow, NFV, and Virtual Network
SDN, OpenFlow, NFV, and Virtual NetworkSDN, OpenFlow, NFV, and Virtual Network
SDN, OpenFlow, NFV, and Virtual Network
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Introductionto SDN
Introductionto SDN Introductionto SDN
Introductionto SDN
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFV
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud
 
Software Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_truptiSoftware Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_trupti
 
Fundamentos de SDN (Software Defined Networking)
Fundamentos de SDN (Software Defined Networking)Fundamentos de SDN (Software Defined Networking)
Fundamentos de SDN (Software Defined Networking)
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
ONOS SDN Controller - Introduction
ONOS SDN Controller - IntroductionONOS SDN Controller - Introduction
ONOS SDN Controller - Introduction
 
Storage area network
Storage area networkStorage area network
Storage area network
 

Viewers also liked

OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
David Jorm
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware
 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
Priyanka Aash
 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security Journey
Yun Zhi Lin
 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and Friends
Yun Zhi Lin
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
Cisco Canada
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Anthony Burke
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
Brent Salisbury
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
CA Technologies
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Adi Gazit Blecher
 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
WebNMS
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
CA Technologies
 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's Network
Open Networking Summits
 
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
CA Technologies
 
Developed vs Developing Countries
Developed vs Developing CountriesDeveloped vs Developing Countries
Developed vs Developing Countries
suchyno51712
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
sidneel
 

Viewers also liked (20)

Sdn&security
Sdn&securitySdn&security
Sdn&security
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security Journey
 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and Friends
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's Network
 
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
 
Developed vs Developing Countries
Developed vs Developing CountriesDeveloped vs Developing Countries
Developed vs Developing Countries
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
 

Similar to SDN Security: Two Sides of the Same Coin

IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
Christian Esteve Rothenberg
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
Priyanka Aash
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking Guide
Joel W. King
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
Justyna Bak
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
OnBoard Security, Inc. - a Qualcomm Company
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
Zivaro Inc
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
Mark Hinkle
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
Katie Hyman
 
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFIRTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
Gerardo Pardo-Castellote
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
APNIC
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SAMeh Zaghloul
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problems
kiansahafi
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Aruba, a Hewlett Packard Enterprise company
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
HansFarroCastillo1
 

Similar to SDN Security: Two Sides of the Same Coin (20)

IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking Guide
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFIRTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problems
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 

More from Zivaro Inc

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix Investment
Zivaro Inc
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration Showdown
Zivaro Inc
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
Zivaro Inc
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
Zivaro Inc
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
Zivaro Inc
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
Zivaro Inc
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics Day
Zivaro Inc
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network Architecture
Zivaro Inc
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
Zivaro Inc
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
Zivaro Inc
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech Day
Zivaro Inc
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Zivaro Inc
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
Zivaro Inc
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
Zivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
Zivaro Inc
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tZivaro Inc
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
Zivaro Inc
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
Zivaro Inc
 

More from Zivaro Inc (20)

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix Investment
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration Showdown
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics Day
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network Architecture
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech Day
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

SDN Security: Two Sides of the Same Coin

  • 1. WWW.GTRI.COM SDN Security: Two Sides of the Same Coin Scott Hogg, CTO GTRI CCIE #5133, CISSP #4610 Thursday June 9, 2016 © 2016 Global Technology Resources, Inc. All rights reserved.
  • 2. © 2016 Global Technology Resources, Inc. All Rights Reserved. 2 Today’s Agenda • Brief Review of Software Defined Networking (SDN) • Heads: o Attack Vectors for SDN Systems o Securing an SDN System • Tails: o SDN Security Use Cases and Applications • Open Discussion (time permitting)
  • 3. Defining SDN • Software-Defined Networking is an approach to networking that separates the control plane from the forwarding plane to support virtualization. • SDN is a new paradigm for network virtualization.
  • 4. SDN High-Level Architecture Controller Network Element Network Element Network Element Network Element Application Layer Or SDN Layer Virtualized Application Services Northbound API Southbound API Control Layer Or Controller Layer Data Plane Layer Or Infrastructure Layer Agent Agent Agent Agent Controller East/West Interface
  • 5. SDN Benefits • Greater span of control and network analytics and response. • Better intelligence with a global view of the network rather than each network element looking at the network from its own viewpoint. • Improved application experience and empower the network owner/operator. • Rapid deployment of applications using networking that supports the application’s specific needs. • Simplified and automated IT administration. • Opportunity to open up the network to a diverse set of vendors and disaggregation.
  • 8. Heads: Security of SDN Systems • There are several attack vectors on SDN systems. The more common SDN security concerns include: o Attacks targeting the SDN controller – either DoS or to instantiate new flows (spoofing northbound API messages or spoofing southbound flows) o Attacker creates their own controller and gets network elements to receive flows from that controller – spoofing flows from the legitimate controller o Targeting the network elements – DoS or to instantiate new flows o Attacking the DCI protocol – NVGRE, STT, VXLAN – these protocols may lack authentication, with no encryption – this is either part of the protocol design, or the way the vendor has implemented the protocol © 2016 Global Technology Resources, Inc. All Rights Reserved. 8
  • 9. SDN Security Considerations © 2016 Global Technology Resources, Inc. All Rights Reserved. 9 Controller Network Element Network Element Network Element Network Element SDN Layer Virtualized Application Services Northbound API Southbound API Controller Layer Data Plane Layer Agent Agent Agent Agent Controller
  • 10. SDN Vulnerability Genome Project © 2016 Global Technology Resources, Inc. All Rights Reserved. 10 Source: http://sdnsecurity.org/project_SDN-Security-Vulnerbility-attack-list.html
  • 11. Recent SDN System Vulnerabilities • Some versions of SDN systems may contain other opensource software that is discovered to have vulnerabilities: bash, OpenSSH, OpenSSL, ntpd • Several vulnerabilities have been reported and fixed within OpenDaylight o https://wiki.opendaylight.org/view/Security_Advisories • Netdump vulnerability took 4 months to correct o http://seclists.org/bugtraq/2014/Aug/75 • Now OpenDaylight project has security team in place • ONIE vulnerabilities identified in BigSwitch’s Switch Light controller, Cumulus Linux, Mellanox-OS (August 2015) • CVE-2015-5699 - Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation (August 11, 2015) • August 3, 2015 – Cisco APIC root access vulnerability o http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa- 20150722-apic © 2016 Global Technology Resources, Inc. All Rights Reserved. 11
  • 12. Hardening an SDN System • Use TLS 1.2 (or UDP/DTLS) to authenticate and encrypt traffic between network device agent and controller, authenticate controller and network devices/SDN agent using certificates • High-Availability controller architecture • Prevent unauthorized access to SDN control network • Use Out-of-Band (OOB) network for control traffic, OOB and secure protocols for controller management and northbound communications • Harden the controller and the network elements (typical host hardening) • Closely monitor controllers for suspicious activity • Secure coding practices for all northbound applications requesting SDN resources • Ability to validate flows in network device tables against controller policy • Use Data Center Interconnect (DCI) protocols that can authenticate tunnel endpoints and secure tunneled traffic © 2016 Global Technology Resources, Inc. All Rights Reserved. 12
  • 13. Tails: SDN Security-Specific Use Case • SDN allows for creative new approaches to security • We will now review 6 SDN uses cases for security 1. Traffic Filtering with SDN 2. Network Slicing, Campus Slicing, Multi-Tenancy, Enclaves, Isolation, Network Segmentation 3. DDoS Mitigation 4. Network Access Control (NAC) 5. Security Traffic Monitoring 6. Moving Target Defense (MTD) © 2016 Global Technology Resources, Inc. All Rights Reserved. 13
  • 14. Traffic Filtering with SDN • That which is not permitted is denied – make the SDN switches not transparent learning/forwarding • Cisco APIC-EM configures the ACI policy for traffic permitted between End Point Groups (EPGs) and for traffic steering – if not permitted, traffic is dropped • Integrate SDN system with Cisco Identity Services Engine (ISE) for device profiling, user authentication, SGT, TrustSec tagging • Traffic steering toward firewall or content filter, security service insertion between client and server © 2016 Global Technology Resources, Inc. All Rights Reserved. 14
  • 15. SDN Switches As Firewalls? © 2016 Global Technology Resources, Inc. All Rights Reserved. 15 SDN Controller Network Element SDN Layer Northbound API Southbound API Controller Layer Data Plane Layer Agent Agent Agent Agent Network Element Network Element Network Element Software-Defined Perimeter (SDP)
  • 16. Network Segmentation with SDN • Separating the network into logically separated networks • Network Slicing, Campus Slicing, Secured Enclaves, Micro- Segmentation, Virtual Routing and Forwarding, etc. • Done by adding a slicing layer between the control plane and the data plane, policies are slice-specific • Enforce strong isolation between slices - actions in one slice do not affect another (Flowspace) • Examples: Cisco XNC with Networking Slicing application, FlowVisor is a special purpose OpenFlow controller that acts as a transparent proxy between OpenFlow switches and multiple OpenFlow controllers © 2016 Global Technology Resources, Inc. All Rights Reserved. 16
  • 17. Network Segmentation with SDN • “Network Slicing” Use Case © 2016 Global Technology Resources, Inc. All Rights Reserved. 17 Source: Cisco Extensible Network Controller Topology-Independent Forwarding and Network Slicing Applications http://www.cisco.com/en/US/prod/collateral/netmgtsw/ps13397/ps13400/data_sheet_c78-729458.pdf
  • 18. Network Segmentation with SDN • FlowVisor performs policy checks across flowspace and enforces isolation between each slice © 2016 Global Technology Resources, Inc. All Rights Reserved. 18 Source: Can the Production Network Be the Testbed? By Rob Sherwood, Glen Gibb, Kok-Kiong Yap, Guido Appenzeller ,Martin Casado, Nick McKeown, Guru Parulkar
  • 19. DDoS Mitigation with SDN • SDN can be used to create a DDoS mitigation system • SDN network sends DDoS telemetry data to the DDoS detection system (volumetric, app attacks, protocol DDoS) • DDoS detection system communicates with northbound API which configures the policy on the controller for the destination of the attack • SDN controller sends flows to network devices to drop suspicious inbound traffic toward victim • Cleaned traffic is allowed to pass toward the destination • Examples: Radware Defense Flow, Radware Defense4All in ODL Helium, A10 Networks Thunder Threat Protection System, others… © 2016 Global Technology Resources, Inc. All Rights Reserved. 19
  • 20. DDoS Mitigation with SDN • Radware DefenseFlow integrates with Cisco’s XNC, OpenDaylight, BigSwitch Floodlight, and NEC’s ProgrammableFlow OpenFlow-based switches and controller © 2016 Global Technology Resources, Inc. All Rights Reserved. 20 Source: http://www.radware.com/Products/DefenseFlow/
  • 21. Network Access Control (NAC) with SDN • SDN systems can prevent unauthorized access or isolate compromised hosts to a quarantine network, Automated Malware Quarantine (AMQ) • SDN systems can intervene in assigning addresses to nodes joining network based on their security posture • Authenticated end nodes are able to send/receive if they pass security checks (AV running/updated, patched, …) • End nodes can only send/receive with their assigned IP/MAC addresses o Source Address Validation Improvements (SAVI) and First Hop Security (FHS) • Or direct end-node traffic to Cisco Cloud Threat Defense system, detect the issue, check with ISE, set SGT=BAD, to contain the traffic • Examples: Cisco Cloud Threat Defense, HP VAN Sentinel Security Application © 2016 Global Technology Resources, Inc. All Rights Reserved. 21
  • 22. SDN Security Components © 2016 Global Technology Resources, Inc. All Rights Reserved. 22 Source: 2014 Cisco Live BRKSEC-2760
  • 23. Security Monitoring with SDN • Switches often lack sufficient resources to perform packet/port mirroring/taps o Every IT silo/team wants their own tap/SPAN session (Network Packet Broker (NPB)) • Bi-directional packet capture is much better than NetFlow • Dedicated copper/optical packet monitoring switches can be very expensive, many taps are required – no blocking ability • Tap Aggregation is an application that is simple for a SDN controller and uses low-cost SDN-capable network devices • Examples: Cisco XNC with Monitor Manager and Nexus 3000 Tap Aggregation Switch, BigSwitch Big Tap Monitoring Fabric, Microsoft Distributed Ethernet Monitoring (DEMon) © 2016 Global Technology Resources, Inc. All Rights Reserved. 23 Using SDN to Create a Packet Monitoring System http://www.networkworld.com/article/2226003/cisco-subnet/using-sdn-to-create-a-packet-monitoring-system.html
  • 24. Security Monitoring with SDN • Cisco XNC Monitor Manager, Cisco Nexus Data Broker © 2016 Global Technology Resources, Inc. All Rights Reserved. 24 Source: Cisco Nexus Data Broker http://www.cisco.com/c/en/us/products/cloud-systems-management/nexus-data-broker/index.html
  • 25. Moving Target IPv6 Defense (MT6D) • MT6D is a system created by graduate students in the Information Technology Security Laboratory at Virginia Tech to obscure IPv6 addresses • Periodically hiding/changing characteristics of victim to make it more difficult to find/attack © 2016 Global Technology Resources, Inc. All Rights Reserved. 25 Source: http://www4.ncsu.edu/~hp/Panos.pdf
  • 26. SDN Security Summary • SDN has the potential to provide many new creative ways to network and secure systems • SDN represents a new way of thinking, we all need to be cognizant about this technology shift • Heads: SDN systems are vulnerable to threats, but SDN implementations can be hardened against security attacks • Tails: SDN systems can provide innovative security applications that are not possible with traditional methods © 2016 Global Technology Resources, Inc. All Rights Reserved. 26
  • 27. SDN & Security Resources • Solution Brief: SDN Security Considerations in the Data Center o https://www.opennetworking.org/solution-brief-sdn-security-considerations-in-the- data-center • SDN Security Challenges in SDN Environments o https://www.sdxcentral.com/resources/security/security-challenges-sdn-software- defined-networks/ • SDN Security Attack Vectors and SDN Hardening o http://www.networkworld.com/article/2840273/sdn/sdn-security-attack-vectors-and- sdn-hardening.html • With Cisco ACI, Do You Still Need A Firewall? o https://cisco- marketing.hosted.jivesoftware.com/people/shogg@gtri.com/blog/2015/03/02/with- cisco-aci-do-you-still-need-a-firewall • Is an SDN Switch A New Form of a Firewall? o http://www.networkworld.com/article/2905257/sdn/is-an-sdn-switch-a-new-form-of- a-firewall.html © 2016 Global Technology Resources, Inc. All Rights Reserved. 27
  • 28. FREE SDN Technology Review • We are offering a FREE 3-hour (~1/2 day) SDN technology review for your company • Bring your networking, security, DevOps, and other technology teams together • Review SDN capabilities within your existing networked systems • Discuss SDN architecture and design options • Review network automation and network programmability potential • Engage in conversation on securely deploying IPv6 and using SDN for security
  • 29. WWW.GTRI.COM Questions and Answers Next Steps Thank you! SHogg@GTRI.com 303-949-4865 @scotthogg