Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Practical Deployments of Security for SDN

In a previous SecurityWeek column in May of this year, I wrote about “Network Security Considerations for SDN”. As described in the article, SDN technology includes the separation of control plane from the data plane (onto a centralized controller), dynamic programmable flows via this centralized controller, and automation and orchestration for the various SDN components.

In a previous SecurityWeek column in May of this year, I wrote about “Network Security Considerations for SDN”. As described in the article, SDN technology includes the separation of control plane from the data plane (onto a centralized controller), dynamic programmable flows via this centralized controller, and automation and orchestration for the various SDN components. In order to support this new architecture, I also proposed a set of considerations for network security in software defined networks including:

Programmability – the ability to implement security “zones” that are abstracted from physical constructs

Dynamic policies – the ability for security policies to track virtual workloads that move between servers

Automation – the ability to automate and orchestrate security provisioning, but to preserve separation of duties so that the actual policies are defined by security IT administrators

But the true test of any technology is how it’s actually being used and deployed. Can a security solution with the above characteristics solve interesting use cases for organizations?

Let’s explore the following use cases.

Software Defined NetworkingNetwork access control

In a traditional network access control or 802.1X deployment, users/devices are authenticated on wired, wireless and remote access networks. Depending on how their roles are mapped in standard identity repositories, the user/device is then placed an appropriate VLAN, or a specific ACL authorization is enabled on an endpoint. In many cases, the identity information is captured and preserved, to be shared with other enforcement devices like firewalls.

This of course is an overly simplified version of network access control (NAC). The reality is that NAC is a notoriously challenging technology requiring multi-year rollouts to coordinate networking changes and VLAN creation. SDN can simplify this because traffic flows can be directed appropriately depending on the results of authentication. For example, if a user laptop is found to have malware, the policy flows for quarantine and remediation of this laptop can be programmed centrally.

Advertisement. Scroll to continue reading.

Security for multi-tenant cloud deployments

In multi-tenant cloud environments, compute resources are pooled together to support multiple businesses. This optimizes costs and enables delivery of virtual applications to meet business demands. For services providers or enterprises delivering IT-as-a-service in this cloud environment, the security policies for these “tenants” or different business units may be different.

An SDN architecture provides a number of benefits. First, it provides the ability to program the behavior of networks to optimize parameters like network resilience, service performance and more. From a security perspective, an SDN controller can deliver dynamic service steering to allow traffic flows to be steered to services such as firewalling and intrusion preventions services that may reside on different parts of the network.

With a security solution that can support dynamic and programmable policies, the association of virtual networks and virtual workloads is automated with security policies. This provides not only better visibility and protection of virtual applications from authorized access and threats but can offer new offerings for service providers.

Firewall load balancing sandwich

Application delivery controllers (ADCs), the modern version of load balancers, are often deployed in a “firewall sandwich” to increase the availability and scalability of firewalls. There are two challenges with ADCs and firewalls. One issue is asymmetric routing through the firewalls—when one inbound packet goes through one firewall and the return packet goes through a different one. Another issue is the ability to recover from a firewall failure, particularly when the failure occurs after a complete connection has been established, or if a firewall passes the inbound packet but hasn’t processed the return packet yet.

While there are solutions to these firewall load balancing problems, SDN has the option to help with these problems in a more efficient manner by being able to direct flows to the appropriate firewall, and dealing with firewall failures.

Practical Use Case or Killer App?

Many have opined that security is the killer app for SDN… is this true? While SDN is a major innovation for networking, the security use cases outlined above are evolutionary, not revolutionary. However, SDN allows these use cases to be implemented in a manner that requires fewer configuration changes, and fewer networking headaches. Therefore, for countless IT administrators who are facing these challenges every day, it may be the killer app for them.

Written By

Danelle is CMO at Ordr. She has more than 20 years of experience in bring new cybersecurity technologies to market. Prior to Ordr, she was CMO at Blue Hexagon (acquired by Qualys), a company using deep-learning to detect malware, and CMO at SafeBreach where she helped build the marketing organization and define the Breach and Attack Simulation category. Previously, she led strategy and marketing at Adallom, a cloud security company acquired by Microsoft. She was also Director, Security Solutions at Palo Alto Networks, driving growth in critical IT initiatives like Zero Trust, virtualization and mobility. Danelle was co-founder of a high-speed networking chipset startup, co-author of a Cisco IP communications book and holds 2 US patents. She holds an MSEE from UC Berkeley.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...