Mitigating Security Risk in Practical vCPE Solutions

13
Ulrich Kohn, CISSP Technical Marketing Director Mitigating Security Risk in Practical vCPE Solutions

Transcript of Mitigating Security Risk in Practical vCPE Solutions

Page 1: Mitigating Security Risk in Practical vCPE Solutions

Ulrich Kohn, CISSPTechnical Marketing Director

Mitigating Security Risk in Practical vCPE Solutions

Page 2: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.2

Protection Is Becoming a Challenge

Multiple reasons why security is a key concern

• Attackers: from script kiddies to organized crime and intelligence services• Increased sophistication:

advanced persistent threats (APT), bootkit-based threats• Disruptive technologies:

control/data plane separation; virtualization; open versus proprietary

Page 3: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.3

NFV: Opportunity or Threat to Network Security?

Managed security services is a $20 to $30bn market – KEEP THE BALANCE

• Immediate activation of security safeguards

• Security analytics• PaaS and security offload,

pooling of security expertise• Application isolation, micro-

segmentation, central control

• Image, patch management

Opportunities• Larger attack surface, high-

value targets• Higher system complexity• Shared resources, common

hypervisor• From proprietary to open

protocols• Out-of-country processing

(compliance)

Challenges

Page 4: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.4

Vodafone VPN+ Multi-Vendor Demonstrationat Mobile World Congress, February 2016

Automated site activation including firewalling

Use Case 1:

Automated scale-in and scale-out

Use Case 2:

DDos prevention with analytics

Use Case 3:

Page 5: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.5

Some Attack Vectors

Virtualised Network Functions (VNFs)

Management and

orchestration

VNF VNF VNF VNF VNF

NFV Infrastructure (NFVI)

Virtual Compute

Virtual Storage

Virtual Network

Virtualisation Layer

Hardware Resources

Compute Storage NetworkDisgruntled employee

Hypervisor and controllerattacks

Customer portal, public APIse.g. DDoS

Backdoor to hypervisor, control software

Rogue VNF, noisy neighbor, malicious code

Social engineering

Spoofing, sniffing, MITM

Compromise remote debugging/test

interfaces

Increased complexity, human error

Rootkit

Page 6: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.6

OpenStack Security Controls

• Keystone authentication and token-based authorization• TLS for accessing APIs• SSH for VM management / system-level communication; SSH key injection with VM creation• Multi-tenant capability• Traffic isolation by VLANs, Linux name spaces, security groups (Neutron, Nova); port/tenant

based: address filter, firewall, NAT• Availability zones• Sanitization of released storage space

Network

Horizon

Dashboard

ImagesObjectStorage

VolumeService

ComputeService

Keystone

IdentityService

Virtual Infrastructure Manager (VIM)

NeutronGlanceSwiftCinderNovaAPI, Authentication, Network, Images, Volums, Objects

Page 7: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.7

vCPE Use Case – Edge NFV

Enterprise

Metro NetworkCarrier Ethernet

Communication Service Provider

vRouter

FSP 150 ProVM with integrated server

Core IP-MPLS

Servers e.g. video

vFirewallvIDS

Challenges with OpenStack in a distributed compute environment

• OpenStack optimized for DC applications within security perimeter• vCPE Use case: internal OpenStack interfaces connect over public networks• End point in untrusted environment (CSP view)• Present implementations do not provide comprehensive security controls*

*Source: NFV Interoperability Evaluation, NIA/EANTC report on LightReading.com; Dec. 2015

Page 8: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.8

A BT Perspective:Securing Openstack Over the Internet

Source: “How NFV is different from Cloud: Using Openstack for Distributed NFV”, Peter Willis, BT; SDN and OF World Congress, Düsseldorf, Oct 2015.

Page 9: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.9

Risk Mitigation in Edge NFV

Virtual Compute

Network

VNF VNF

VNF VNF

virtu

alvi

rtual

,ph

ysica

l

Risk mitigation with OpenStack security controls

Security appliances such as IDS/IPS, firewalls but also service assurance functions

Security additions to DPDK e.g. experimental Crypto API (Release 2.2), keep alive signaling, new performance management functionsEncryption per virtual connections and/or bulk encryption

Trusted platform module, hardware security modules for secure boot, key integrity

Lower layer encryption becomes essential security control

CPE device

Page 10: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.10

Security Assurance in Edge NFV

Open OS/Hyperv.X86 Server

perf. assurancehardened SW/HW

OpenStack in boxHW accelerationtamper resistant

assu

ranc

e le

vel Hardened Server

FSP 150vSE

Hybrid ServerFSP 150 ProVM

COTS Server

Open OS/Hyperv.X86 Server

perf. assurancehardened SW/HW

HW encryption

Open OS/Hyperv.X86 Server

functionality

Page 11: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.11

Security Work of Selected Standard Bodies and Industry Alliances• ETSI NFV ISG: “NFV Security; Problem Statement”, ETSI GS NFV-

SEC 001, October 2014 + SEC 00x releases in 2015• OpenStack Foundation: “OpenStack Security Guide“; best practices

and implementation guide for securing an OpenStack implementation

• ONF: “Principles and Practices for Securing Software-Defined Networks”, January 2015, ONF TR-511

• ONOS: Security response process, security emergency team• OPNFV security-related projects such as Moon, Barbican

Standard bodies and industry alliances focus on security

Page 12: Mitigating Security Risk in Practical vCPE Solutions

© 2016 ADVA Optical Networking. All rights reserved. Confidential.12

Securing Edge NFV Devices

• OpenStack in distributed compute environments calls for additional security controls

• Defense in depth for mitigating attack surface in NFV-centric networks

• Pure-player software and hybrid edge NFV devices for different levels of security assurance

ADVA Optical Networking - your expert in edge NFV

Page 13: Mitigating Security Risk in Practical vCPE Solutions

Thank You

IMPORTANT NOTICEThe content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.

The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.

Copyright © for the entire content of this presentation: ADVA Optical Networking.