SlideShare a Scribd company logo
IEEE SDN Initiative
Standardization Committee Meeting
Security Considerations & Concerns
Anton Kaska BTNE, LLC
June 23, 2015 Piscataway, NJ
1
What are we facing?
ONF Model
ONF SAYS:
Computing Trends are driving
network change…
1. Changing Traffic Patterns
2. Consumerization of IT
3. Rise of Cloud Services
4. Big Data=More Bandwidth
Constraints listed include:
• Complexity leads to stasis
• Inability to scale
• Vendor Dependence
WHAT IS INDUSTRY
SAYING?
1. The same approach
2. The same architecture
3. The same security
drivers
…not quite
Not a new challenge we are facing
3
Defense in Depth with specifics for
Software Defined Networking
 Baseline Security Models
 Integrity Checks
 Brewer-Nash Model?
 Physical Security
How do we accomplish and not fail (PCI,
ETSI, IEEE, etc?
4
BSI-Standard 100-2:IT-
Grundschutz Vorgehensweise
3 GPP
TS 33.210TS Network Domain Security
TS 33.310 Authentication Framework
TS 33.401 Security Architecture
A Flexible Model
5
Remember Physical Security
Summary
• Multiple attempts at security Standards but focused on verticals,
size, business models, point technologies, etc.
• Using security as it has been practically applied, as a historical
illustration
• we will not meet the challenges sufficiently
• there are many examples to glean knowledge from.
• A flexible approach is required.
• Given the speed with which technology advances, leveraging existing
best practices and solutions that have proven themselves (Defense in
Depth Theory, Chinese Walls, etc.) will provide acceptable and
practical levels of mitigation that are implementable with tolerable
financial and political cost.
• A more complex matrixes approach leveraging industry specific
and/or business requirement based risk mitigation is likely a
requirement when viewed long term
• This is in my opinion the harder nut to crack for the industries as a whole
(and organizations such as IEEE)
6

More Related Content

PPTX
Securing the ‘Wild Wild West’: USM for Universities
PPTX
Computer security aspects in
PPTX
Network Security Terminologies
PDF
Cyber Security vs.pdf
PPTX
Cloud Security using NIST guidelines
PPTX
Ics & computer security for nuclear facilities
PPTX
PhD-Guidance-in-Cyber-Security
Securing the ‘Wild Wild West’: USM for Universities
Computer security aspects in
Network Security Terminologies
Cyber Security vs.pdf
Cloud Security using NIST guidelines
Ics & computer security for nuclear facilities
PhD-Guidance-in-Cyber-Security

What's hot (19)

PPTX
Security Architecture and Design - CISSP
PPTX
OSI Security Architecture
PPT
Epic Sales Presentation
PPTX
Lecture 07 networking
PDF
Cloud Computing Security V1.2
PDF
IoT security-arrow-roadshow #iotconfua
PDF
Infosec resume-duckworth
PDF
Darryl T. Smith Resume (1)
PDF
NIST Zero Trust Explained
PDF
Network access control (nac)
PPT
What is NAC
PPTX
Zero Trust
DOCX
Matrix Table
PPTX
Firewalls
PPTX
JDMDE Specialisation KaHo Sint-Lieven
PDF
Intel Security Endpoint Protection
PPTX
Network Security Projects
PPTX
Advanced Firewalls Progress Report
Security Architecture and Design - CISSP
OSI Security Architecture
Epic Sales Presentation
Lecture 07 networking
Cloud Computing Security V1.2
IoT security-arrow-roadshow #iotconfua
Infosec resume-duckworth
Darryl T. Smith Resume (1)
NIST Zero Trust Explained
Network access control (nac)
What is NAC
Zero Trust
Matrix Table
Firewalls
JDMDE Specialisation KaHo Sint-Lieven
Intel Security Endpoint Protection
Network Security Projects
Advanced Firewalls Progress Report
Ad

Viewers also liked (13)

PDF
1474595020.pdf ปุ๋ย 9
PDF
Self Improvement Complete Directory
PPTX
Guess who
PPTX
Hope and Dream (Biographical Recount)
DOCX
Curriculum_Vitae
ODP
Diapo bien utiliser
PPTX
Some tips on distinguish the good all in one solar led lights.
PPTX
Struktur Sosial
DOC
OJO ELIJAH OLURINDE RESUME 1
DOCX
SAP ABAP-Archana Jha
DOC
Nallen c v 15
PPTX
Project 2
PPTX
Retirement Seminar v1
1474595020.pdf ปุ๋ย 9
Self Improvement Complete Directory
Guess who
Hope and Dream (Biographical Recount)
Curriculum_Vitae
Diapo bien utiliser
Some tips on distinguish the good all in one solar led lights.
Struktur Sosial
OJO ELIJAH OLURINDE RESUME 1
SAP ABAP-Archana Jha
Nallen c v 15
Project 2
Retirement Seminar v1
Ad

Similar to 13.Anton-Position-Security-Considerations-23June2015[1] (20)

PDF
Security sdn
DOCX
PPTX
SDN and Named Data Networking Security
PDF
SDN Standards: What and Whatnot
PPTX
FIOT_Uni4.pptx
PDF
SDN Security: Two Sides of the Same Coin
PDF
Sdn&security
PDF
TACTiCS_WP Security_Addressing Security in SDN Environment
PDF
The evolving threat in the face of increased connectivity
PPTX
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
PDF
The Open Networking Foundation: Standard Bearer for SDN
PDF
6th SDN Interest Group Seminar - Session7 (131210)
PDF
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
PDF
ONOS SDN-IP: Tutorial and Use Case for SDX
PPTX
OSI Security Architecture.pptx shshhd shshjdjdjdd dhdjdjjdjdjdjdjjdjdjdjjdjdj...
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
PPTX
OFC2016 SDN Framework and APIs
PPTX
ioT_SDN
PPTX
ONF Snapshot
PDF
SDN-ppt-new
Security sdn
SDN and Named Data Networking Security
SDN Standards: What and Whatnot
FIOT_Uni4.pptx
SDN Security: Two Sides of the Same Coin
Sdn&security
TACTiCS_WP Security_Addressing Security in SDN Environment
The evolving threat in the face of increased connectivity
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
The Open Networking Foundation: Standard Bearer for SDN
6th SDN Interest Group Seminar - Session7 (131210)
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
ONOS SDN-IP: Tutorial and Use Case for SDX
OSI Security Architecture.pptx shshhd shshjdjdjdd dhdjdjjdjdjdjdjjdjdjdjjdjdj...
Security of software defined networking (sdn) and cognitive radio network (crn)
OFC2016 SDN Framework and APIs
ioT_SDN
ONF Snapshot
SDN-ppt-new

13.Anton-Position-Security-Considerations-23June2015[1]

  • 1. IEEE SDN Initiative Standardization Committee Meeting Security Considerations & Concerns Anton Kaska BTNE, LLC June 23, 2015 Piscataway, NJ 1
  • 2. What are we facing? ONF Model ONF SAYS: Computing Trends are driving network change… 1. Changing Traffic Patterns 2. Consumerization of IT 3. Rise of Cloud Services 4. Big Data=More Bandwidth Constraints listed include: • Complexity leads to stasis • Inability to scale • Vendor Dependence WHAT IS INDUSTRY SAYING? 1. The same approach 2. The same architecture 3. The same security drivers …not quite
  • 3. Not a new challenge we are facing 3 Defense in Depth with specifics for Software Defined Networking  Baseline Security Models  Integrity Checks  Brewer-Nash Model?  Physical Security
  • 4. How do we accomplish and not fail (PCI, ETSI, IEEE, etc? 4 BSI-Standard 100-2:IT- Grundschutz Vorgehensweise 3 GPP TS 33.210TS Network Domain Security TS 33.310 Authentication Framework TS 33.401 Security Architecture
  • 5. A Flexible Model 5 Remember Physical Security
  • 6. Summary • Multiple attempts at security Standards but focused on verticals, size, business models, point technologies, etc. • Using security as it has been practically applied, as a historical illustration • we will not meet the challenges sufficiently • there are many examples to glean knowledge from. • A flexible approach is required. • Given the speed with which technology advances, leveraging existing best practices and solutions that have proven themselves (Defense in Depth Theory, Chinese Walls, etc.) will provide acceptable and practical levels of mitigation that are implementable with tolerable financial and political cost. • A more complex matrixes approach leveraging industry specific and/or business requirement based risk mitigation is likely a requirement when viewed long term • This is in my opinion the harder nut to crack for the industries as a whole (and organizations such as IEEE) 6