Security Orchestrator Introducing a Security Orchestrator in the context of the ETSI NFV Reference Architecture

被引:44
|
作者
Jaeger, Bernd [1 ]
机构
[1] Nokia Networks, Secur Res, Munich, Germany
关键词
Security Orchestrator; Network Function Virtualization; Telco Cloud;
D O I
10.1109/Trustcom.2015.514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture.
引用
收藏
页码:1255 / 1260
页数:6
相关论文
共 50 条
  • [21] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [22] Climate, migration, and the local food security context: introducing Terra Populus
    Raphael J. Nawrotzki
    Allison M. Schlak
    Tracy A. Kugler
    Population and Environment, 2016, 38 : 164 - 184
  • [23] Climate, migration, and the local food security context: introducing Terra Populus
    Nawrotzki, Raphael J.
    Schlak, Allison M.
    Kugler, Tracy A.
    POPULATION AND ENVIRONMENT, 2016, 38 (02) : 164 - 184
  • [24] A Safety and Security Reference Architecture for Asset Administration Shell Design
    Hosseini, Ali Mohammad
    Sauter, Thilo
    Kastner, Wolfgang
    18TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2022 (WFCS 2022), 2022, : 175 - 182
  • [25] Security Reference Architecture for Cyber-Physical Systems (CPS)
    Moreno, Julio
    Rosado, David G.
    Sanchez, Luis E.
    Serrano, Manuel A.
    Fernandez-Medina, Eduardo
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2021, 27 (06) : 609 - 634
  • [26] Towards Automated Security Evaluation within the Industrial Reference Architecture
    Ehrlich, Marco
    Gergeleit, Martin
    Trsek, Henning
    Lukas, Georg
    2020 25TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2020, : 1640 - 1647
  • [27] A Reference Architecture for Improving Security and Privacy in Internet of Things Applications
    Addo, Ivor D.
    Ahamed, Sheikh I.
    Yau, Stephen S.
    Buduru, Arun
    2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 108 - 115
  • [28] A Reference Architecture for Big Data Systems in the National Security Domain
    Klein, John
    Buglak, Ross
    Blockow, David
    Wuttke, Troy
    Cooper, Brenton
    2016 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON BIG DATA SOFTWARE ENGINEERING (BIGDSE 2016), 2016, : 51 - 57
  • [29] Reference security architecture for Body Area Networks in healthcare applications
    Braham, Tasha-Gaye
    Butakov, Sergey
    Ruhl, Ron
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 57 - 64
  • [30] Security Considerations and Reference Architecture of a Cyber Computing Infrastructure for Online Education
    Mathew, George
    2012 IEEE SYMPOSIUM ON E-LEARNING, E-MANAGEMENT AND E-SERVICES (IS3E 2012), 2012, : 23 - 28