{"id":4586,"date":"2016-03-22T10:24:11","date_gmt":"2016-03-22T15:24:11","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4586"},"modified":"2016-03-31T12:34:44","modified_gmt":"2016-03-31T17:34:44","slug":"maintaining-a-secure-sdn","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/maintaining-a-secure-sdn\/","title":{"rendered":"Maintaining a Secure SDN"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\">As technologies continue to evolve, the nature of IT infrastructure is changing. Virtualisation, hyper-convergence and increased connectivity are presenting fresh opportunities for malicious intruders to gain access to networks.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">One of the platforms presenting new possibilities to both network administrators and hackers is SDN.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>What is SDN?<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_network.png\" rel=\"attachment wp-att-4589\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4589 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_network.png\" alt=\"sdnsecurity_network\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_network.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_network-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_network-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A software-defined network or SDN is an architecture within which network administrators can govern traffic from a central administrative console, through software \u2013 rather than with switches and dials.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Services can be routed to wherever they\u2019re required, regardless of the physical connection between servers and other devices.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">At the heart of SDN technology lies the virtualisation of a network, programmed automation, and a separation of network functionalities.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Its objective is to empower network administrators to respond quickly to changing business needs, in a flexible environment similar to the storage and server infrastructure seen in a virtualised data centre.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Enterprise networks and data centres can use SDN to automate the provisioning of network resources, create and manage virtual machines, and engage software programming to streamline network operations.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>How are SDNs Vulnerable?<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Within an SDN architecture, the control of a network is divorced from its physical infrastructure. Administrators can separate the system which governs where the network traffic goes (known as the control plane) from the systems which forward network traffic to specific destinations (which is the data plane).<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Network services may also be managed across a range of devices and equipment originating from different vendors.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This approach gives software-defined networking its inherent flexibility and efficiency \u2013 but it\u2019s the very separation of control and data planes, coupled with potential security holes offered by third-party equipment, <a href=\"http:\/\/searchitchannel.techtarget.com\/feature\/Software-defined-networking-tutorial-to-improve-security\" target=\"_blank\" rel=\"nofollow\">that can put an SDN at risk<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Steps Toward Security<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_weaklink.png\" rel=\"attachment wp-att-4592\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4592 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_weaklink.png\" alt=\"sdnsecurity_weaklink\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_weaklink.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_weaklink-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_weaklink-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.sdxcentral.com\/resources\/security\/security-challenges-sdn-software-defined-networks\/\" target=\"_blank\" rel=\"nofollow\">Security needs<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> to be written into the DNA of a software-defined network from the start; built into its architecture, and delivered throughout the network as a service.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this way, the integrity, availability and confidentiality of connected resources and data passing through the network may be maintained.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The central administrative console (known as the SDN Controller) is both the hub of the system and potentially its weakest link. To properly protect it:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">1. Ensure that tight controls are put in place, so that unauthorised users cannot gain access to the SDN Controller.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">2. Take physical and data redundancy measures to ensure that the SDN Controller is available, at all times. It\u2019s the availability of the central console which ultimately determines the availability of the network, as a whole.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">3. Monitor and vet the SDN Controller itself, all software applications loaded onto it, and all the devices it governs, to ensure that they are all secure and trusted entities, which are communicating with each other in legitimate ways.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">4. Set out a monitoring and management policy to observe and ensure that the SDN Controller is operating as it should be.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">5. Put forensic testing, disaster recovery, and remediation measures in place. If a cyber-attack, outage, or other incident occurs, these will enable administrators to quickly establish what actually happened, the steps needed to recover, and how such incidents may be guarded against, in future.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Optimising Your Security Strategies<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As in all things, opinions vary as to which method of securing an SDN is best: embedded security within the network core, or dispersing it among the individual devices, servers, and storage.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Whatever measures you take, ensure that they are:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Easy to implement, manage, and monitor: The SDN environment is in constant state of movement, and security measures that are hard to deploy will only add unneeded complexity to a dynamic system.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Economical in scope and cost, so the protection can be distributed all over: Measures also need to be adaptable to an environment which is highly scalable.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Up to date with the current threat levels and techniques being used to target organisations in your sector: Policies and tools will need to adapt to accommodate these new threats, as they come to light.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>SDSec<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_security.png\" rel=\"attachment wp-att-4591\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4591 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_security.png\" alt=\"sdnsecurity_security\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_security.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_security-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/sdnsecurity_security-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Reflecting the current trend towards integration of services and separation of physical functions, software-defined security or SDSec takes a similar approach to SDN, itself.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">SDSec aims to enhance network security by de-coupling the security control plane from the plane governing security processing and forwarding. Enforcement of network security is essentially virtualised, and may be managed as a single system.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Network functions like intrusion and firewalls may be separated from their implementation through proprietary hardware, and run as software.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>The Bottom Line<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">SDN security services, network tools and related software applications are on the increase, together with dedicated software for network virtualisation, and professional services in the software-defined networking sector.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With <a href=\"http:\/\/www.computerworld.com\/article\/3007723\/networking\/identifying-the-security-pitfalls-in-sdn.html\" target=\"_blank\" rel=\"nofollow\">IDC predicting<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> that the world-wide market for SDN will reach $8 billion by 2018, enhancing the deployment and security of software-defined network technology looks set to become a priority, for many network administrators.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technologies continue to evolve, the nature of IT infrastructure is changing. Virtualisation, hyper-convergence and increased connectivity are presenting fresh opportunities for malicious intruders to gain access to networks. \u00a0 One of the platforms presenting new possibilities to both network administrators and hackers is SDN. What is SDN? A software-defined network or SDN is an [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-4586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4586"}],"version-history":[{"count":4,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4586\/revisions"}],"predecessor-version":[{"id":4594,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4586\/revisions\/4594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4592"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}