SlideShare a Scribd company logo
Inherent Security Design
Patterns for SDN/NFV
Deployments
John McDowall
Palo Alto Networks
Drivers for Consumers and Providers of Cloud/NFV
Automa'on	
  
Minimize	
  
	
  OPEX	
  &	
  CAPEX	
  
Dynamic	
  
Resources	
  
Self-­‐Service	
  
Portals	
  
Scalability	
  
Agility	
  Producers Consumers
Make security easy-to-deploy
by consumers
No Bottlenecks
Need well-defined security posture
New	
  
Business	
  	
  
Models	
  
“….if	
  innova+on	
  doesn’t	
  get	
  ahead	
  of	
  the	
  
hackers,	
  we	
  will	
  likely	
  see	
  roadblocks	
  to	
  
rolling	
  out	
  new	
  SDx	
  applica+ons	
  ….	
  
	
  	
  
	
  ….	
  because	
  of	
  the	
  fear	
  that	
  SDx	
  
Infrastructure	
  cannot	
  protect	
  against	
  and	
  
contain	
  new	
  aAacks.	
  “	
  	
  
SDxCentral SDx Infrastructure Security Report 2015 Edition
Key Security Perspectives 
The security perimeter no longer exists.
Understanding the Cyber Attack Pattern Lifecycle
How do we prevent attacks with SDN/NFV ?
Preventing Across the Cyber Attack* Life Cycle
Unauthorized Access Unauthorized Use
Gather
Intelligence
Leverage
Exploit
Execute
Malware
Command
& Control
Actions on
the
objective
Reconnaissance Weaponization
& Delivery
Malware
Communicates
with Attacker
Exploitation Data Theft,
Sabotage,
Destruction
* Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. Lockheed Martin Corporation
Breach	
  the	
  Perimeter	
  1 Deliver	
  the	
  Malware	
  2 Exfiltrate	
  Data	
  4Lateral	
  Movement	
  3
Security Challenges with NFV
Manual	
  
Deployments	
  	
  
Slow	
  and	
  error-­‐
prone	
  processes	
  to	
  
enable	
  security	
  
Transient	
  
Workloads	
  	
  
Workload	
  lifespan	
  
is	
  in	
  hours,	
  days	
  or	
  
weeks	
  
Sta'c	
  
Remedia'on	
  	
  
Lack	
  of	
  dynamic	
  
remediaCon	
  
measures	
  
Malware	
  	
  
30,000	
  	
  
new	
  malware	
  /day	
  
Security Design Patterns for
NFV
Applying Zero Trust* to NFV
FoundationalSecurity
DesignPattern
* No More Chewy Centers: The Zero Trust Model of Information Security John Kindervag, Forester Research, 2014
Verify	
  and	
  
Never	
  Trust	
  
Inspect	
  and	
  
Log	
  all	
  Traffic	
  
Design	
  
Network	
  
Inside-­‐Out	
  
Predefine:
•  User-Access Controls
•  Layer-7 Interactions
Build:
•  Security Compliance
•  Auditable Entities
Enable:
•  Fine grained kill switch
•  Real-time Security Updates
Foundation Security Blueprint
FoundationalSecurity
DesignPattern
•  Define	
  allowable	
  
interacCons	
  
•  Add	
  applicaCon	
  
security	
  paOern	
  
•  Sign-­‐off	
  by	
  security	
  
team	
  
•  Deploy	
  zero-­‐trust	
  
applicaCon	
  security	
  
paOern.	
  
•  Merge	
  
parameterized	
  
paOern	
  with	
  tenant	
  
instance	
  
•  Deny-­‐All	
  to	
  Only-­‐
Allowed	
  
•  Real-­‐Cme	
  InspecCon	
  
•  Update	
  threat	
  
paOerns,	
  sigs	
  et	
  al	
  
•  Disrupt	
  and/or	
  
block	
  cyber	
  
aOacks	
  
•  Archive	
  logs	
  &	
  
policies	
  
•  Perform	
  forensics	
  
•  Generate	
  report	
  
Prepare	
   Deploy	
   Update	
   Remove	
  
1 2 3 4
Virtual Function Security Model Virtual Function
Implementation of Foundation Security Pattern
SecureEncapsulation
DesignPattern
Enforce zero-trust
model – block all
traffic until policy is
applied.
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
1
Security
Controller
Get signed “security pattern”
from VM deployment
Descriptor and deploy with
application.
2
Get VNI/Tenant ID for
instance mapping
bridge
vxlan nic
Apply policy/tenant
based on tenant ID
and application
security pattern
retrieved from
deployment.
4
3
v-­‐wire	
  v-wire NFV deployed
security enforcement
point.
1
Data	
  link	
  
Control	
  link	
  
v-­‐wire	
  
Summary
•  Security was one on the biggest impediments to
deployment of NFV. 
•  Leveraging NFV to define a foundational pattern to
protect application workloads. 
•  Application Security patterns can now be applied to the
foundational pattern to implement security from the
inside out
•  Security is now a resource that scales with your NFV
infra-structure.
11

More Related Content

PDF
'Moon' Security Management System for OPNFV
PPTX
Security at the Speed of the Network
PDF
Virtual Networking Security - Network Security
PDF
Network Function Virtualization - Security Best Practices AtlSecCon 2015
PDF
VMUGIT UC 2013 - 03b Trend Micro
PDF
Node JS reverse shell
KEY
mod_security introduction at study2study #3
PPT
NFV Security PPT
'Moon' Security Management System for OPNFV
Security at the Speed of the Network
Virtual Networking Security - Network Security
Network Function Virtualization - Security Best Practices AtlSecCon 2015
VMUGIT UC 2013 - 03b Trend Micro
Node JS reverse shell
mod_security introduction at study2study #3
NFV Security PPT

What's hot (20)

PDF
Mod Security
PDF
Cisco amp for meraki
PDF
Cisco umbrella overview
ODP
Web Application Firewall
PPTX
Equifax cyber attack contained by containers
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
PDF
Cloud Native Security: New Approach for a New Reality
PPTX
Pxosys Webinar Amplify your Security
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PDF
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
PDF
Хакеро-машинный интерфейс
PDF
Introduction to Mod security session April 2016
PDF
VMworld 2013: Security Automation Workflows with NSX
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
PDF
Hacking IoT with EXPLIoT Framework
PPTX
Preventing Today's Malware
PPTX
How to Test High-Performance Next-Generation Firewalls
PPTX
Sourcefire Webinar - NEW GENERATION IPS
Mod Security
Cisco amp for meraki
Cisco umbrella overview
Web Application Firewall
Equifax cyber attack contained by containers
TechWiseTV Workshop: OpenDNS and AnyConnect
Cloud Native Security: New Approach for a New Reality
Pxosys Webinar Amplify your Security
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Using Your Network as a Sensor for Enhanced Visibility and Security
Хакеро-машинный интерфейс
Introduction to Mod security session April 2016
VMworld 2013: Security Automation Workflows with NSX
ASA Firepower NGFW Update and Deployment Scenarios
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Hacking IoT with EXPLIoT Framework
Preventing Today's Malware
How to Test High-Performance Next-Generation Firewalls
Sourcefire Webinar - NEW GENERATION IPS
Ad

Viewers also liked (12)

PPTX
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
PDF
Open Source Means Upstream First
PDF
Nuts & Bolts of the Dynamic Attack Chain
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
PPTX
Crack the Code
PPTX
InduSoft System security webinar 2012
PPTX
Amien Harisen - APT1 Attack
PPTX
Security best practices
PDF
The Anatomy of a Data Breach
PDF
Openstack meetup: NFV and Openstack
PPTX
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
Open Source Means Upstream First
Nuts & Bolts of the Dynamic Attack Chain
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Crack the Code
InduSoft System security webinar 2012
Amien Harisen - APT1 Attack
Security best practices
The Anatomy of a Data Breach
Openstack meetup: NFV and Openstack
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Ad

Similar to Inherent Security Design Patterns for SDN/NFV Deployments (20)

PPTX
Web Application Security for Continuous Delivery Pipelines
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Rik Ferguson
PPTX
.conf Go Zurich 2022 - Security Session
PDF
Resume | Vijay Navgire
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
Managed security services
PDF
Protecting microservices using secure design patterns 1.0
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PPTX
CSO CXO Series Breakfast
PPTX
chapitre1-cloud security basics-23 (1).pptx
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PPTX
Regulated Reactive - Security Considerations for Building Reactive Systems in...
PDF
Data Center Server security
Web Application Security for Continuous Delivery Pipelines
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Azure 101: Shared responsibility in the Azure Cloud
Rik Ferguson
.conf Go Zurich 2022 - Security Session
Resume | Vijay Navgire
AWS live hack: Atlassian + Snyk OSS on AWS
Crush Cloud Complexity, Simplify Security - Shield X
CyberCrime in the Cloud and How to defend Yourself
CSS 17: NYC - Realities of Security in the Cloud
Managed security services
Protecting microservices using secure design patterns 1.0
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
CSS17: Atlanta - Realities of Security in the Cloud
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
CSO CXO Series Breakfast
chapitre1-cloud security basics-23 (1).pptx
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Data Center Server security

More from OPNFV (20)

PPTX
How to Reuse OPNFV Testing Components in Telco Validation Chain
PPTX
Energy Audit aaS with OPNFV
PPTX
Hands-On Testing: How to Integrate Tests in OPNFV
PDF
Storage Performance Indicators - Powered by StorPerf and QTIP
PDF
Big Data for Testing - Heading for Post Process and Analytics
PPTX
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
ODP
How Many Ohs? (An Integration Guide to Apex & Triple-o)
PPTX
Being Brave: Deploying OpenStack from Master
PPTX
Upstream Testing Collaboration
PDF
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
PDF
Learnings From the First Year of the OPNFV Internship Program
PDF
OPNFV and OCP: Perfect Together
PDF
The Return of QTIP, from Brahmaputra to Danube
PDF
Improving POD Usage in Labs, CI and Testing
PDF
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
PDF
Distributed vnf management architecture and use-cases
PDF
Software-defined migration how to migrate bunch of v-ms and volumes within a...
PDF
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
PDF
My network functions are virtualized, but are they cloud-ready
PDF
Challenge in asia region connecting each testbed and poc of distributed nfv ...
How to Reuse OPNFV Testing Components in Telco Validation Chain
Energy Audit aaS with OPNFV
Hands-On Testing: How to Integrate Tests in OPNFV
Storage Performance Indicators - Powered by StorPerf and QTIP
Big Data for Testing - Heading for Post Process and Analytics
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
How Many Ohs? (An Integration Guide to Apex & Triple-o)
Being Brave: Deploying OpenStack from Master
Upstream Testing Collaboration
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
Learnings From the First Year of the OPNFV Internship Program
OPNFV and OCP: Perfect Together
The Return of QTIP, from Brahmaputra to Danube
Improving POD Usage in Labs, CI and Testing
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
Distributed vnf management architecture and use-cases
Software-defined migration how to migrate bunch of v-ms and volumes within a...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
My network functions are virtualized, but are they cloud-ready
Challenge in asia region connecting each testbed and poc of distributed nfv ...

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx

Inherent Security Design Patterns for SDN/NFV Deployments

  • 1. Inherent Security Design Patterns for SDN/NFV Deployments John McDowall Palo Alto Networks
  • 2. Drivers for Consumers and Providers of Cloud/NFV Automa'on   Minimize    OPEX  &  CAPEX   Dynamic   Resources   Self-­‐Service   Portals   Scalability   Agility  Producers Consumers Make security easy-to-deploy by consumers No Bottlenecks Need well-defined security posture New   Business     Models  
  • 3. “….if  innova+on  doesn’t  get  ahead  of  the   hackers,  we  will  likely  see  roadblocks  to   rolling  out  new  SDx  applica+ons  ….        ….  because  of  the  fear  that  SDx   Infrastructure  cannot  protect  against  and   contain  new  aAacks.  “     SDxCentral SDx Infrastructure Security Report 2015 Edition
  • 4. Key Security Perspectives The security perimeter no longer exists. Understanding the Cyber Attack Pattern Lifecycle How do we prevent attacks with SDN/NFV ?
  • 5. Preventing Across the Cyber Attack* Life Cycle Unauthorized Access Unauthorized Use Gather Intelligence Leverage Exploit Execute Malware Command & Control Actions on the objective Reconnaissance Weaponization & Delivery Malware Communicates with Attacker Exploitation Data Theft, Sabotage, Destruction * Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. Lockheed Martin Corporation Breach  the  Perimeter  1 Deliver  the  Malware  2 Exfiltrate  Data  4Lateral  Movement  3
  • 6. Security Challenges with NFV Manual   Deployments     Slow  and  error-­‐ prone  processes  to   enable  security   Transient   Workloads     Workload  lifespan   is  in  hours,  days  or   weeks   Sta'c   Remedia'on     Lack  of  dynamic   remediaCon   measures   Malware     30,000     new  malware  /day  
  • 8. Applying Zero Trust* to NFV FoundationalSecurity DesignPattern * No More Chewy Centers: The Zero Trust Model of Information Security John Kindervag, Forester Research, 2014 Verify  and   Never  Trust   Inspect  and   Log  all  Traffic   Design   Network   Inside-­‐Out   Predefine: •  User-Access Controls •  Layer-7 Interactions Build: •  Security Compliance •  Auditable Entities Enable: •  Fine grained kill switch •  Real-time Security Updates
  • 9. Foundation Security Blueprint FoundationalSecurity DesignPattern •  Define  allowable   interacCons   •  Add  applicaCon   security  paOern   •  Sign-­‐off  by  security   team   •  Deploy  zero-­‐trust   applicaCon  security   paOern.   •  Merge   parameterized   paOern  with  tenant   instance   •  Deny-­‐All  to  Only-­‐ Allowed   •  Real-­‐Cme  InspecCon   •  Update  threat   paOerns,  sigs  et  al   •  Disrupt  and/or   block  cyber   aOacks   •  Archive  logs  &   policies   •  Perform  forensics   •  Generate  report   Prepare   Deploy   Update   Remove   1 2 3 4 Virtual Function Security Model Virtual Function
  • 10. Implementation of Foundation Security Pattern SecureEncapsulation DesignPattern Enforce zero-trust model – block all traffic until policy is applied. Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   1 Security Controller Get signed “security pattern” from VM deployment Descriptor and deploy with application. 2 Get VNI/Tenant ID for instance mapping bridge vxlan nic Apply policy/tenant based on tenant ID and application security pattern retrieved from deployment. 4 3 v-­‐wire  v-wire NFV deployed security enforcement point. 1 Data  link   Control  link   v-­‐wire  
  • 11. Summary •  Security was one on the biggest impediments to deployment of NFV. •  Leveraging NFV to define a foundational pattern to protect application workloads. •  Application Security patterns can now be applied to the foundational pattern to implement security from the inside out •  Security is now a resource that scales with your NFV infra-structure. 11