policy-driven, knowledge-centric, holis

20
NetSecOps: Policy-Driven, Knowledge-Centric, Holis<c Network Security Opera<ons (A collabora<ve project between the University of Kentucky and the University of Utah) James Griffioen, Laboratory for Advanced Networking University of Kentucky NSF CC*/CICI PI Workshop 2017 Albuquerque, NM October 3, 2017

Upload: others

Post on 07-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Policy-Driven, Knowledge-Centric, Holis

NetSecOps:Policy-Driven,Knowledge-Centric,

Holis<cNetworkSecurityOpera<ons

(Acollabora<veprojectbetweentheUniversityofKentuckyandtheUniversityofUtah)

JamesGriffioen,

LaboratoryforAdvancedNetworkingUniversityofKentucky

NSFCC*/CICIPIWorkshop2017Albuquerque,NM

October3,2017

Page 2: Policy-Driven, Knowledge-Centric, Holis

NSFCampusCyberinfrastructurePIandCybersecurityInnova9onforCyberinfrastructurePIWorkshop

October3-4,2017|Albuquerque,NM

BroaderImpact:•  Limitorpreventthegrowingnumberof

a[acksoncampusnetworks.•  Addresstheshortageofqualified

securityexpertsoncampuses,andmakeITsecurityteamsmoreeffec<ve.

•  Advancescien<ficresearch,par<cularlyresearchusingbigdata

Solu9on/Approach:

Metadatatag:<tohelpothersunderstandyourcurrentstate–pickoneormany>•  <projecturl>•  <Readyfortransi5ontoprac5ce!>•  <Publica5onspending>•  <Needcollaborators!•  <Needmorefunds>•  <Socialmedia>•  <Studentengagement>

QuadChartfor:SecureandResilientArchitecture:NetSecOps—Policy-Driven,Knowledge-Centric,Holis<cNetworkSecurityOpera<ons(Acollabora<veNSFCICIprojectbetweenUnivofUtahandUnivofKY)

Network

KnowledgeStore

NetworkControl

ExistingData Sources

NetworkControl Apps

KnowledgeDiscovery Apps

PolicyDocuments

Policy Generation& Verification Apps

h[p://www.flux.utah.edu/project/NetSecOps h[p://www.netlab.uky.edu/NetSecOps

Challenge:•  Campussecurityopera<onsrelyon

humandomainexpertstointerpretandmaphigh-levelpolicydocumentstolow-levelnetworkconfigura<ons.

•  Segmentsofthecampushaveverydifferentpoliciesandregula<on.

•  Data-intensivescien<ficresearchtrafficoeenrequiresexcep<onstoITpolicies.

•  Goal:AssistITsecurityteamsbyautoma<ngopera<onalstepsthataretediousanderror-prone.

•  Systema<callycapturecampusnetworksecuritypolicies.

•  Developfine-grainedcontrolabstrac<onsandSDNcapabili<estoimplementbothsecuritypoliciesand(research)policyexcep<on.

•  Createpolicytraceabilitytoolstoverifyintegrityofpolicymappings.

•  Reasonaboutsecurityusinginforma<onfrompointsolu<ons.

Page 3: Policy-Driven, Knowledge-Centric, Holis

NetSecOps(NetworkSecurityOpera<ons)

BasicGoal:AssistITsecurityteamsbyautoma<ngnetworksecurityopera<onalstepsthataretediousanderror-prone.

Page 4: Policy-Driven, Knowledge-Centric, Holis

Network

KnowledgeStore

NetworkControl

ExistingData Sources

NetworkControl Apps

KnowledgeDiscovery Apps

PolicyDocuments

Policy Generation& Verification Apps

NetSecOpsArchitecture

Page 5: Policy-Driven, Knowledge-Centric, Holis

Network

KnowledgeStore

NetworkControl

ExistingData Sources

NetworkControl Apps

KnowledgeDiscovery Apps

PolicyDocuments

Policy Generation& Verification Apps

NetSecOpsArchitecture

Page 6: Policy-Driven, Knowledge-Centric, Holis

Network

KnowledgeStore

NetworkControl

ExistingData Sources

NetworkControl Apps

KnowledgeDiscovery Apps

PolicyDocuments

Policy Generation& Verification Apps

NetSecOpsArchitectureHowdoesthisaffectthedesignofScienceDMZs?

Page 7: Policy-Driven, Knowledge-Centric, Holis

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

HPC

MiddleboxBo[lenecks

TypicalCampusNetwork

Page 8: Policy-Driven, Knowledge-Centric, Holis

HPC

Conven9onalScienceDMZ

ScienceDMZ

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

Page 9: Policy-Driven, Knowledge-Centric, Holis

UKYSDNCore

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

Page 10: Policy-Driven, Knowledge-Centric, Holis

UKYSDNNetwork

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

Page 11: Policy-Driven, Knowledge-Centric, Holis

UKYSDNNetwork

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

SDNController

Controllertellsswitchesto:1.  Actlikealegacyrouter

bydefault2.  Routeauthorized

sciencetrafficdirectlytotheedge(bypassingmiddleboxes)

Page 12: Policy-Driven, Knowledge-Centric, Holis

UKYSDNNetwork

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

NormalFlowPath

Page 13: Policy-Driven, Knowledge-Centric, Holis

UKYSDNNetwork

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

NormalFlowPath

High-speedFlowPath

(a.k.a.,VIPLanes).Note:thesearePolicyExcep9ons

Page 14: Policy-Driven, Knowledge-Centric, Holis

All-CampusScienceDMZ

Flows(notmachines)jointheDMZ.

UKYAll-CampusScienceDMZ

Internet

BldgA

BldgB

BldgC

Middleboxes

CampusCore

FirewallsEdgeRouter

SDNCore

SDNSwitch SDNSwitch SDNSwitch

HPC

NormalFlowPath

High-speedFlowPath

Page 15: Policy-Driven, Knowledge-Centric, Holis

InternetPerformanceResults

SeeICCCN2017VIPLanesPaper

Mbps Gbps

Page 16: Policy-Driven, Knowledge-Centric, Holis

SecuringanAll-CampusScienceDMZ

•  ScalingtheScienceDMZtotheen<recampus– Thenumberofmachinesismuchlarger– Thenumberofpoten<alusersismuchlarger– Thenumberofpoliciesismuchlarger•  policiesareperflow,notpermachine

•  Scalingthedecision-makingprocesses– Definingpolicies– AuthorizingUsers– DefiningTrustrela<onships

Page 17: Policy-Driven, Knowledge-Centric, Holis

Establishing/ManagingTrust(InanAll-campusScienceDMZ)

•  AuthorizedBypassFlows:Authorizedbypasstrafficshouldbeatthegranularityofflows,asopposedtoallScienceDMZtraffic.

•  TrustedUsers:Users(notmachines)shouldbeauthen<catedandtrusted(i.e.,trustshouldbetraceabletopeople,notmachines).

•  LimitedTrust:Usertrustshouldbelimitedtoaspecificsetofflowsforalimitedamountof<me.

•  DistributedTrustInfrastructure:Trustdecisionsshouldnotbemadebyasingleen<ty(e.g.,campusIT),butrathershouldbedistributedinacontrolledwayamongtrustedusers.

•  DynamicallyEstablishedAuthorizedFlows:Trustedusersshouldbeabletodynamicallycreateauthorizedbypassflows.

•  RefinableTrust:Ifaflow’scharacteris<cscannotbeknownun<ltheflowbecomesac<ve,trustshouldberefinedtomatchtheflowassoonastheflowappears.

•  Trust,butverify:Userscouldmisuseprivilegeinunauthorizedways.Usageshouldbeverified.

•  BackwardCompa<bility:Legacyapplica<onsshouldbeabletomakeuseofVIPLaneswithoutmodifica<on.

Page 18: Policy-Driven, Knowledge-Centric, Holis

NetSecOpsPolicyExcep<ons

•  Flowsspaceisarrangedintoahierarchy–  Root=allflows–  Subnodes=strictsubsetofparent’sflows–  Flowsdefinedbytuple(e.g.,src/dstIPaddrsandports)

•  TrustedUsersassignedtomanagepor<onsofthehierarchy–  Caninstan<ateaflow(i.e.,createapolicyexcep<on)–  CandelegatecontroltootherTrustedUser– Delega<ondefinesahierarchyofresponsibility

SeeICCCN2017VIPLanesPaper

Page 19: Policy-Driven, Knowledge-Centric, Holis

Src:*Dst:*Group:CampusIT

Src:128.123.4.160/27Dst:*Group:CoEIT

Src:128.123.123.0/24Dst:*Group:A&SIT

Src:128.123.4.160/28Dst:*Group:CSResearchers

Src:128.123.4.176/28Dst:*Group:ECEResearchers

Src:128.123.4.160/29Dst:*Group:VIPLanes

Src:128.123.4.168/29Dst:*Group:GENIResearch

ExamplePolicyExcep<onTree

Policytreeiscreatedbyusersinadistributedway(throughawebserverthatmaintainsthepolicytree).

Page 20: Policy-Driven, Knowledge-Centric, Holis

ThankYou

Ques<ons?

Thisworkissupported,inpart,bytheNa5onalScienceFounda5onunderNSFgrantsACI-1642134,ACI-1642158,ACI-1541426andACI-1541380