SlideShare a Scribd company logo
SESSION	ID:SESSION	ID:
#RSAC
Tarun	Viswanathan
Open	Security	Controller	- Security	
Orchestration	for	OpenStack
CSV-W02
Platform	Solution	Architect
Intel
Manish	Dave
Platform	Architect
Intel
#RSAC
Notices	and	Disclaimers
Intel	technologies’	features	and	benefits	depend	on	system	configuration	and	may	require	enabled	hardware,	software	or	service	
activation.	Learn	more	at	intel.com,	or	from	the	OEM	or	retailer.
No	computer	system	can	be	absolutely	secure.	
Tests	document	performance	of	components	on	a	particular	test,	in	specific	systems.	Differences	in	hardware,	software,	or	
configuration	will	affect	actual	performance.	Consult	other	sources	of	information	to	evaluate	performance	as	you	consider	your	
purchase. For	more	complete	information	about	performance	and	benchmark	results,	visit	
http://www.intel.com/performance.
Intel,	the	Intel	logo	and	others	are	trademarks	of	Intel	Corporation	in	the	U.S.	and/or	other	countries.	*Other	names	and	brands
may	be	claimed	as	the	property	of	others.	
©	2016	Intel	Corporation.
#RSAC
SDI—The	Application	Defines	the	System
The evolution to software-defined infrastructure
#RSAC
Enterprise	Multi	Cloud	Security	Challenges
How	can	I	provide	consistent	security	
across	 a	multi	cloud	data	center	
environment.
Open	Security	Controller	
addresses	this	challenge.
#RSAC
Open	Security	Controller	Key	Design	Goals
Centralized	security	
policy	management	for	a	
multi	cloud	environment.
#RSAC
Conceptual	Architecture
#RSAC
OpenStack* Micro-Segmentation	Use	Case
#RSAC
OSC	API	Interaction	Model
PoliciesUser	IntentCloud	AppsApplications,	User	Intent,	and	Policies
Nuage VSP* Midokura*, Brocade*…NSX*
SDN	
Controllers
Virtualization Layer
Physical	
Infrastructure
Computing
Hardware
Storage
Layer
Network
Hardware
Virtual	Infra
OpenStack*
Virtual	
Compute
Virtual	
Storage
Virtual	
NetworkVirtualized	Security	Functions
CPA
DPA
Security	Function/Element	Managers
IPS	
Managers
NGFW	
Managers
ADC	
Managers
Open	Security	Controller
Manager
Plug-ins
VNF	Agent
Plug-ins
Business
Logic
Service Dispatcher
Jobs
Engine
SDN
Plug-ins
Virtualization
Connectors
Security	Functions
Catalog
H2	Database
User Interface API
GUI
NB	Rest	API1
Rest	API	
Web	Sockets
4 Rest	API	IPC5
Rest	API	
SFC	Policy
3 Rest	API
Images,	
deployment,	
notifications,	
authentication	
2
• Policy	interface
• User	intent
• Application	intent
• Lifecycle	
management
• Deployment	
specs,	auto-
scaling	and	HA
• Authentication
• Image	services
• Notification	for	
events
• Role	based	
access	control
• Traffic	redirection	API	
• SFC	policy	API
• Advanced	visibility	functionality	
(example	6	tuple	visibility)
• Dynamic	policy	updates	
and	mapping
• Domain/sub	domain	
updates	and	mapping
• Control	path	agent:	
provisioning,	de-
provisioning,	
heartbeats,	etc.
• Data	path	agent:	
instrumentation	and	
real	time	statistics
#RSAC
Customer	PoC:	Health	industry	IT	services	provider
• Customer	has	to	adhere	to	HIPAA	regulatory	
requirements
• Existing	solution	was	based	on	DC	edge	devices.
• Customer	wanted	to	get	to	a	dynamic	policy	
based	security	solution	for	East-West	traffic	
inspection. Commercial	x86	Server
Commercial	SDN	controller
(Compute	Node)	RHEL	7.2
(Control	Node)	Commercial	
OpenStack	Newton	Distro
Open	Security	Controller
Virtual	Intrusion	
Prevention	System
Next	Gen	Firewall	
Virtual	App	Delivery	Controller
#RSAC
Customer	Deployment	Architecture
High	
Latency
East-west
Traffic
Future:	Dynamic	Policy	Based	East-West	Security
X86	server
vIPS vADC App
Top	of	Rack	Switch
Security	between	
Tenants	and	Tiers
Latency	Goes	Down
Granular	Control	
and	Scalability
SDN	Controller		Physical	Appliances
Current:	Topology	Based	Security	
Firewall
Intrusion	Prevention	Systems/
Intrusion	Detection	Systems
Application	Delivery	Controller
Top	of	Rack	Switch
App App App App
X86	Server
East-west
Traffic
Security	Function	Manager
Security	Controller
#RSAC
Customer	PoC:	Large	financial	services	provider
Commercial	x86	Server
Commercial	SDN	controller
(Compute	Node)	RHEL	7.2
(Control	Node)	Commercial	
OpenStack	Distro
Open	Security	Controller
Next	Gen	Firewall	Vendor	1
Next	Gen	Firewall	vendor	2	
• Customer	has	to	adhere	to	PCI	regulatory	
requirements
• Customer	wanted	to	get	to	a	Risk	Based	
automated	security	policy	management	
capability	for	their	Openstack	environment
#RSAC
Customer	deployment	Workflow
One	Time	Setup
1. Openstack	Connector
2. Create		Security	Services
a) Policy	manager	Plugins	
for	NGFW	1,	NGFW	2	
3. Configure	Security	
Services
a) Distributed	Appliance
b) Deployment-
Specifications
Protection	Policy
1. Define	Global	Risk	based	
Sec-Groups
2. All	Policy	managers	
dynamically	updated
3. Automated	traffic	
redirection via	SDN	
Plugin
Automated	Zero-
Trust	Security
Network	flows	automatically	
updated	to	redirect	traffic	to	
security	service	chain
Security	Admin
Spins	workload	up	or down
Dev-Ops
#RSAC
DEMO
Automated	Security	Services	Orchestration	for	Openstack
#RSAC
Demo	Topology
#RSAC
#RSAC
Apply:	Risk	Based	Approach
1. Identify	workload	which	needs	micro	segmentation
2. Identify	security	controls	to	mitigate	risks	(vIPS,	vNGFW,	vADC)
3. Automate	Security	Controls	orchestration
#RSAC
Call	to	Action
Current	Status
POC	with	early	adopter	customers	/	Security	VNF’s
Open	Security	Controller	available	as	Opensource	~	Mid	2017	compatible	with	
few	Security	VNF	and	SDN	vendors
Call	to	Action
Contact	us	to	get	engaged	in	the	community:	Email:	manish.dave@intel.com or	
Tarun@intel.com
Additional	Information:	www.intel.com/osc

More Related Content

PDF
LF_DPDK17_Making networking apps scream on Windows with DPDK
PDF
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
PDF
LF_DPDK_Accelerate storage service via SPDK
PDF
LF_DPDK17_The Path to Data Plane Microservices
PDF
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
PDF
Intel® QuickAssist Technology (Intel® QAT) and OpenSSL-1.1.0: Performance
PDF
Model Import Connector for RepSM Release Notes
PPT
ITE v5.0 - Chapter 2
LF_DPDK17_Making networking apps scream on Windows with DPDK
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
LF_DPDK_Accelerate storage service via SPDK
LF_DPDK17_The Path to Data Plane Microservices
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
Intel® QuickAssist Technology (Intel® QAT) and OpenSSL-1.1.0: Performance
Model Import Connector for RepSM Release Notes
ITE v5.0 - Chapter 2

What's hot (20)

PPT
Ite v5.0 chapter4
PPT
Windows 7 by microsoft
PDF
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
DOC
unit5final
PDF
ICS Threat Scenarios
PDF
Ni poster 06 08
PDF
LogRhythm PowerTech Interact Data Sheet
PPTX
SCADA and HMI Security in InduSoft Web Studio
PPTX
Getting Started with IBM i Security
PDF
Comguard expanding-portfolio
PPTX
ESET is introducing its brand new product ESET Secure Authentication
PDF
ISE-802.1X-MAB
PPTX
ESET: Delivering Benefits to Enterprises
PDF
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
PPT
It essentials pc hardware and software overview
PPTX
ESET: Delivering Benefits to Medium and Large Businesses
PPT
ITE - Chapter 4
PPT
Ite pc v40_chapter9
PPTX
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
PDF
Intel Gateway Solutions for the Internet of Things
Ite v5.0 chapter4
Windows 7 by microsoft
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
unit5final
ICS Threat Scenarios
Ni poster 06 08
LogRhythm PowerTech Interact Data Sheet
SCADA and HMI Security in InduSoft Web Studio
Getting Started with IBM i Security
Comguard expanding-portfolio
ESET is introducing its brand new product ESET Secure Authentication
ISE-802.1X-MAB
ESET: Delivering Benefits to Enterprises
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
It essentials pc hardware and software overview
ESET: Delivering Benefits to Medium and Large Businesses
ITE - Chapter 4
Ite pc v40_chapter9
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Intel Gateway Solutions for the Internet of Things
Ad

Similar to Open security controller security orchestration for openstack (20)

PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
PDF
2017 02-17 rsac 2017 tech-f02
PDF
Intel and Red Hat: Enhancing OpenStack for Enterprise Deployment
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
How Dell and Intel are Optimizing OpenStack Clouds
PDF
IOCs Are Dead—Long Live IOCs!
PDF
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PPTX
Intel open stack-summit-session-nov13-final
PDF
A Fully Automated SOC: Fact or Fiction
PDF
vSEC pro VMware NSX
PDF
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PDF
Dev secops on the offense automating amazon web services account takeover
PDF
Améliorer OpenStack avec les technologies Intel
PPTX
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
PDF
OSB50: Operational Security: State of the Union
PDF
Intel APJ Enterprise Day - Keynote by RK Hiremane
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
2017 02-17 rsac 2017 tech-f02
Intel and Red Hat: Enhancing OpenStack for Enterprise Deployment
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
Threat intel- -content-curation-organizing-the-path-to-successful-detection
How Dell and Intel are Optimizing OpenStack Clouds
IOCs Are Dead—Long Live IOCs!
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel open stack-summit-session-nov13-final
A Fully Automated SOC: Fact or Fiction
vSEC pro VMware NSX
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
SDN and Security: A Marriage Made in Heaven. Or Not.
Dev secops on the offense automating amazon web services account takeover
Améliorer OpenStack avec les technologies Intel
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
OSB50: Operational Security: State of the Union
Intel APJ Enterprise Day - Keynote by RK Hiremane
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx

Open security controller security orchestration for openstack