I2NSF Use Cases in Access Networks Diego Lopez Telefónica I+D IETF91, Honolulu, 9-14 Nov.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
The System Center Family Microsoft. Mobile Device Manager 2008.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
1Proprietary and Confidential AirVantage API – Getting started David SCIAMMA – June 13th 2014.
 Troy Hopwood Program Manager Microsoft Corporation BB53.
Bringing Handheld, PDA’s, and Smart Phone to the Enterprise Martin Graf Group Product Manager Oracle Corporation Session id:
My First Building Block Presented By Tracy Engwirda 28 September, 2005.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
A Survey on Interfaces to Network Security
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Cost Effort Complexity Benefit Cloud Hosted Low Cost Agile Integrated Fully Supported.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
T Sponsors Kent Weare Integration MVP, Author API Management Part 1 – An Introduction to Azure API Management BizTalk Summit 2015 – London ExCeL London.
Simship.com LRC, September 22, 2004 Dr. Stephen Flinter Connect Global Solutions.
THE POTENTIAL FOR EFFECTIVE WEB CONTENT CONTROL BASED ON CURRENT TECHNOLOGY Carolyn Watters and Michael Shepherd Web Information Filtering Lab Faculty.
Enforcing Policies on Social Media Data Extracted from the Web Nicoletta Fornara and Truc-Vien T. Nguyen Università della Svizzera italiana Lugano, Switzerland.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Using Windows Firewall and Windows Defender
Policy chains: the PoSecCo approach to policy management in Future Internet Cataldo Basile Politecnico di Torino Pisa - June 9, 2011.
Applying FI-WARE Generic Enablers to Smart Grid Management: Electric Car Charging Scenario Dr. Steven Davy Mobile, Middleware, TSSG Mas2tering.
SharePoint 2007 Overview and Solution Examples Inetium.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Secure Credential Manager Claes Nilsson - Sony Ericsson
MBL206 A First Look at the Microsoft Location Server (MLS) Steve Lombardi Technical Product Manager MapPoint Business Unit Microsoft Corporation.
Wellington SharePoint Users Group 2007 Microsoft Office System Overview Ryan Duguid.
Network Security & Accounting
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
The DEER Distributed European Electronic Resource Dr Suzanne Keene Francesca Monti University College London.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Role Activity Sub-role Functional Components Control Data Software.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Palo Alto Networks - Next Generation Security Platform
Windows Vista Configuration MCTS : Network Security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
© 2007 Open Grid Forum Authentication Service Profile Christos Kanellopoulos 14 th EUGridPMA, Lisbon, PT October 7 th, 2008.
1/10/2018 9:33 PM Cloud Roadshow © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO.
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Web Security Flex
What is WWW? The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet.
Mobile Data Solutions Inc
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Threat Management Gateway
Use Cases and Requirements for I2NSF_
Chapter 6: Community Features.
Rights Management Services (RMS)
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Continuous Automated Chatbot Testing
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Which is right for your business, Office 365 or Microsoft 365?
IBM GTS Storage Security and Compliance overview.
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Presentation transcript:

I2NSF Use Cases in Access Networks Diego Lopez Telefónica I+D IETF91, Honolulu, 9-14 Nov.

Seeking an Open OAM Interface n What?: Open OAM interface for virtualized network security services (vNSF) n Who?: Actors: n Network operator n Customer(s) n Where?: Access network n Residential (and SME) landline network access: xDSL, FTTH n Mobile network Access: 2G, 3G, 4G, 5G… 2 Project SECURED (

A Few Examples of vNSFs n Traffic inspection n All services that copy/analize traffic n E.g.: IDS,DPI,DLP n Traffic Manipulation n Alteration of the original traffic n E.g.: IPS,ACL,FW,VPN n Traffic Impersonation n Impersonate a customer device or service n E.g.: Honeypot 3 Project SECURED ( vNSF Online traffic User access Online traffic Internet side Offline: Alerts vNSF Online traffic User access vNSF Offline: Alerts Online traffic Internet side

4 Project SECURED ( OAM Environments vNSF OSS/BSS vNSF OSS/BSS Closed Open Over a secure channel Over open channel Customer

Operator-Managed n Network Operator interactions n vNSF deployment n instantiating a vNSF on a NFVI n vNSF Customer provisioning n List vNSF functionalities n enroll/cancel subscriptions n vNSF configuration –By policy language. –By configuration templates/files 5 Project SECURED (

Customer-Managed n Customer direct interactions n vNSF self-provisioning n enroll/cancel subscriptions n Probably also need a vNSF configuration n vNSF validation n Customer could require a proof of correct vNSF execution: –Integrity –Isolation & privacy –Confidentiality? 6 Project SECURED (

Example: The NFV #7 Use Case for vCPE 7 Project SECURED ( Network Operator Mgmt Sys OAM Interface VNSF

Bringing This into Reality: The SECURED Architecture 8 Project SECURED ( PSAM PSAR PSA Manifest PSA Storage PSA Storage M2L Plugin User Portal Onboarding Process Back End API Manager (index, DB) Manager (index, DB) Web Portal End User PSA Portal Service PSA Portal Service Developer API Developer API PSA Provision Service PSA Provision Service User Profile Repository User Profile Repository SPM NED Developer OSS/BSS/ Orchestrator Authentication

n Programmatic interfaces n PSAM API n User provisioning n Load PSA in the system n PSAR API n Service support (information manager) n Deployment of PSA n User Portal n Public eye area Specifying PSAM and PSAR in SECURED 9 Project SECURED (

Expressing Policies n vNSF configuration language n Set by Operator or by Customer itself [... ] n the subject of the policy n (e.g., employee, family member) n subject may be implicit (e.g., all devices of a customer) n the action of the policy n (e.g., block, allow, protect… ) n the object of the policy that undergoes the action n (e.g., , web traffic, DNS request) n [ condition that characterize actions n (e.g., time, type of traffic...) n Examples: enable basic parental control enable ”school protection control” allow Internet traffic from 8:30 to 20:00 [time = 8:30-20:00] scan for malware detection [check type = malware] protect traffic to corporate network with integrity and confidentiality [protection type = integrity AND confidentiality] remove tracking data from Facebook [website = *.facebook.com] my son is allowed to access facebook from 18:30 to 20:00 10 Project SECURED (

THANK YOU ! Project SECURED (

EU disclaimer SECURED (project no ) is co-funded by the European Union (EU) via the European Commission (EC), under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the EC and the EC is not responsible for any use that might be made of its content. SECURED disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Disclaimer 12 Project SECURED (