Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Information Security Policies and Standards
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
Chapter 5 Database Application Security Models
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Department Of Computer Engineering
A Survey on Interfaces to Network Security
Network security policy: best practices
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Security Requirements for Software Defined Networks Internet Area WG IETF 85: Atlanta November 4, 2012 Margaret Wasserman
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Security fundamentals Topic 10 Securing the network perimeter.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Some Great Open Source Intrusion Detection Systems (IDSs)
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
SDN challenges Deployment challenges
Security on OpenStack 11/7/2013
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Rakesh Kumar Juniper networks Anil Lohiya Juniper networks
User-group-based Security Policy for Service Layer
Yang model for requesting
Configuring Windows Firewall with Advanced Security
The SUPA Information Model
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-00 Rakesh Kumar Juniper networks.
Threat Management Gateway
Nicolas BOUTHORS Qosmos
Integration of Network Services Interface version 2 with the JUNOS Space SDK
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Introduction to Networking
Use Cases and Requirements for I2NSF_
Introduction to Networking
FRD Examples November 28, 2017 L. Ong.
Virtual LANs.
Interface to Routing System (I2RS)
Security in Networking
Nicolas BOUTHORS Qosmos
Securing Cloud-Native Applications Jason Schmitt CEO
HP Networking OpenFlow in Action
TE Topology and Tunnel Modeling for Transport Networks draft-bryskin-teas-te-topo-and-tunnel-modeling Igor Bryskin (Huawei Technologies) Xufeng Liu (Jabil)
Continuous Automated Chatbot Testing
Brief Introduction to IEEE P802.1CF
* Essential Network Security Book Slides.
Chapter 8: Monitoring the Network
Rakesh Kumar Juniper networks Anil Lohiya Juniper networks
Antonio Pastor Diego R. López Adrian Shaw
Network Architecture By Dr. Shadi Masadeh 1.
Introduction to Network Security
LM 5. Wireless Network Security
János Farkas, Balázs Varga, Rodney Cummings, Jiang Yuanlong
ONAP Architecture Principle Review
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks Anil Lohiya Juniper networks Dave Qi Bloomberg Nabll Bitar Nokia Senand Palislamovic Nokia Liang Xia Huawei IETF-99, Prague July 18, 2017

Agenda Draft overview Main updates outline Next steps and plans

Client-facing Interface RESTful API Draft scope – Identify requirements to build I2NSF client-facing Interface Client-facing Interface RESTful API ( User-construct based, independent of network topology, NSF type and its location in network) Security Controller End-user/application express security policies using client-facing interface All end-user interaction through an abstraction layer in security controller End-user security policies enforced on traffic originated and destined to end-points Security policy deployed in NSF by security controller NSF-Facing Interface NSFs (Routers, Switches, Firewall) (Virtual & Physical) I2NSF Agent End-points (Applications, Servers, Laptops, Users, Locations)

Main Updates Outline Introduce requirements preference MUST MAY RECOMMENDED Several new requirements based on ONUG feedback 3 new categories of security policy: Segmentation policies, Threat policies, Governance and Compliance policies More fine-grained policy building blocks: Source Policy Endpoint Group, Destination Policy Endpoint Group, Direction, Threat Group, Match Condition, Exceptions, Actions… Consistent policy enforcement: according to network/policy building blocks change, audit and log the change A lot of improved description Security controller takes care of all the mapping and conversion.

Draft overview – Designing Principles User-construct based modeling: abstract + decoupling Easier for end-user to express policy which reflects business needs Not dependent on low level network information More concretely: Decoupling from low level network information: network topology, NSF type/model/location… Using Declarative/Descriptive model instead of Imperative/Prescriptive model Being not dependent on NSFs’ operation in network, such as: How to be connected in network Control plane interactions: HA, scalability, etc Data plane implementations: encap, sfc, etc Deployment Models: direct interaction, NMS proxy interaction Security controller takes care of all the mapping and conversion.

Draft overview – Set of requirements… (1/2) Functional requirements for interface, to support: Multi-tenancy (isolation): Policy-Administrator of Policy-Tenant manages Policy-User Authentication and authorization RBAC Protection against: attacks (DoS/DDoS) Misconfiguration, Input data validation Dynamic control of policy enforcement Admin-Enforced Time-Enforced Event-Enforced Definition of dynamic policy end group User-Group, Device-Group, Application-Group, Location-Group Security policy building blocks 3 categories of security policy: Segmentation policies, Threat policies, Governance and Compliance policies Building blocks: Source Policy Endpoint Group, Destination Policy Endpoint Group, Direction, Threat Group, Match Condition, Exceptions, Actions…

Draft overview – Set of requirements… (2/2) Comprehensive set of actions: Permit, Deny, Drop connection, Log, Authenticate connection, Quarantine/Redirect, Netflow, Count, Encrypt, Decrypt, Throttle, Mark, Instantiate-NSF Consistent policy enforcement: according to network/policy building blocks change, audit and log the change detect and correct policy conflicts, and backward compatibility Integration with external systems Threat feeds, Honeypots Security Information & Event Management (SIEM) Network and Behavior analytic engines Telemetry data collection Get data from NSF system logs, syslog, flow records, security violations Export data to external systems for monitoring and analytics Operational requirements for interface APIs API versioning for problem debugging, and backward compatibility API extensibility Data Model Transport: Yang + netconf/restconf Miscellaneous Notification to end-user based on NSF events and policy violations Test policies for conflicts before deploying Affinity to allow end-user so that a policy is enforced on a specific NSF Need to work on it some more

Next steps and plans for draft draft-ietf-i2nsf-client-facing-interface-req-03 Add examples for requirement Illustrate each requirement with use-case example for clarity Align to I2NSF Terminology draft Incorporate ideas from WG mailing discussions Few comments received so far Linda Dunbar Clarification about actual requirements vs high level requirements More clear clarification of the difference between “User-construct based policies” and the general “intent-based policy” Solicit inputs on requirements Get more use-cases from WG members in different segments Service providers, Enterprise, cloud operators

Thanks! Rakesh Kumar