SlideShare a Scribd company logo
Inherent Security Design
Patterns for SDN/NFV
Deployments
John McDowall
Palo Alto Networks
Drivers for Consumers and Providers of Cloud/NFV
Automa'on	
  
Minimize	
  
	
  OPEX	
  &	
  CAPEX	
  
Dynamic	
  
Resources	
  
Self-­‐Service	
  
Portals	
  
Scalability	
  
Agility	
  Producers Consumers
Make security easy-to-deploy
by consumers
No Bottlenecks
Need well-defined security posture
New	
  
Business	
  	
  
Models	
  
“….if	
  innova+on	
  doesn’t	
  get	
  ahead	
  of	
  the	
  
hackers,	
  we	
  will	
  likely	
  see	
  roadblocks	
  to	
  
rolling	
  out	
  new	
  SDx	
  applica+ons	
  ….	
  
	
  	
  
	
  ….	
  because	
  of	
  the	
  fear	
  that	
  SDx	
  
Infrastructure	
  cannot	
  protect	
  against	
  and	
  
contain	
  new	
  aAacks.	
  “	
  	
  
SDxCentral SDx Infrastructure Security Report 2015 Edition
Key Security Perspectives 
The security perimeter no longer exists.
Understanding the Cyber Attack Pattern Lifecycle
How do we prevent attacks with SDN/NFV ?
Preventing Across the Cyber Attack* Life Cycle
Unauthorized Access Unauthorized Use
Gather
Intelligence
Leverage
Exploit
Execute
Malware
Command
& Control
Actions on
the
objective
Reconnaissance Weaponization
& Delivery
Malware
Communicates
with Attacker
Exploitation Data Theft,
Sabotage,
Destruction
* Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. Lockheed Martin Corporation
Breach	
  the	
  Perimeter	
  1 Deliver	
  the	
  Malware	
  2 Exfiltrate	
  Data	
  4Lateral	
  Movement	
  3
Security Challenges with NFV
Manual	
  
Deployments	
  	
  
Slow	
  and	
  error-­‐
prone	
  processes	
  to	
  
enable	
  security	
  
Transient	
  
Workloads	
  	
  
Workload	
  lifespan	
  
is	
  in	
  hours,	
  days	
  or	
  
weeks	
  
Sta'c	
  
Remedia'on	
  	
  
Lack	
  of	
  dynamic	
  
remediaCon	
  
measures	
  
Malware	
  	
  
30,000	
  	
  
new	
  malware	
  /day	
  
Security Design Patterns for
NFV
Applying Zero Trust* to NFV
FoundationalSecurity
DesignPattern
* No More Chewy Centers: The Zero Trust Model of Information Security John Kindervag, Forester Research, 2014
Verify	
  and	
  
Never	
  Trust	
  
Inspect	
  and	
  
Log	
  all	
  Traffic	
  
Design	
  
Network	
  
Inside-­‐Out	
  
Predefine:
•  User-Access Controls
•  Layer-7 Interactions
Build:
•  Security Compliance
•  Auditable Entities
Enable:
•  Fine grained kill switch
•  Real-time Security Updates
Foundation Security Blueprint
FoundationalSecurity
DesignPattern
•  Define	
  allowable	
  
interacCons	
  
•  Add	
  applicaCon	
  
security	
  paOern	
  
•  Sign-­‐off	
  by	
  security	
  
team	
  
•  Deploy	
  zero-­‐trust	
  
applicaCon	
  security	
  
paOern.	
  
•  Merge	
  
parameterized	
  
paOern	
  with	
  tenant	
  
instance	
  
•  Deny-­‐All	
  to	
  Only-­‐
Allowed	
  
•  Real-­‐Cme	
  InspecCon	
  
•  Update	
  threat	
  
paOerns,	
  sigs	
  et	
  al	
  
•  Disrupt	
  and/or	
  
block	
  cyber	
  
aOacks	
  
•  Archive	
  logs	
  &	
  
policies	
  
•  Perform	
  forensics	
  
•  Generate	
  report	
  
Prepare	
   Deploy	
   Update	
   Remove	
  
1 2 3 4
Virtual Function Security Model Virtual Function
Implementation of Foundation Security Pattern
SecureEncapsulation
DesignPattern
Enforce zero-trust
model – block all
traffic until policy is
applied.
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
Security	
  
Enforcement	
  
Point	
  
VM-­‐A	
  
1
Security
Controller
Get signed “security pattern”
from VM deployment
Descriptor and deploy with
application.
2
Get VNI/Tenant ID for
instance mapping
bridge
vxlan nic
Apply policy/tenant
based on tenant ID
and application
security pattern
retrieved from
deployment.
4
3
v-­‐wire	
  v-wire NFV deployed
security enforcement
point.
1
Data	
  link	
  
Control	
  link	
  
v-­‐wire	
  
Summary
•  Security was one on the biggest impediments to
deployment of NFV. 
•  Leveraging NFV to define a foundational pattern to
protect application workloads. 
•  Application Security patterns can now be applied to the
foundational pattern to implement security from the
inside out
•  Security is now a resource that scales with your NFV
infra-structure.
11

More Related Content

What's hot (20)

PDF
Mod Security
Abhishek Singh
 
PDF
Cisco amp for meraki
Cisco Canada
 
PDF
Cisco umbrella overview
Cisco Canada
 
ODP
Web Application Firewall
Chandrapal Badshah
 
PPTX
Equifax cyber attack contained by containers
Aqua Security
 
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
 
PDF
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
PPTX
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
 
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld
 
PDF
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Marco Balduzzi
 
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
PDF
Хакеро-машинный интерфейс
Positive Hack Days
 
PDF
Introduction to Mod security session April 2016
Rahul
 
PDF
VMworld 2013: Security Automation Workflows with NSX
VMworld
 
PDF
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Alert Logic
 
PDF
Hacking IoT with EXPLIoT Framework
Priyanka Aash
 
PPTX
Preventing Today's Malware
David Perkins
 
PPTX
How to Test High-Performance Next-Generation Firewalls
Ixia
 
PPTX
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 
Mod Security
Abhishek Singh
 
Cisco amp for meraki
Cisco Canada
 
Cisco umbrella overview
Cisco Canada
 
Web Application Firewall
Chandrapal Badshah
 
Equifax cyber attack contained by containers
Aqua Security
 
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
 
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Marco Balduzzi
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
Хакеро-машинный интерфейс
Positive Hack Days
 
Introduction to Mod security session April 2016
Rahul
 
VMworld 2013: Security Automation Workflows with NSX
VMworld
 
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Alert Logic
 
Hacking IoT with EXPLIoT Framework
Priyanka Aash
 
Preventing Today's Malware
David Perkins
 
How to Test High-Performance Next-Generation Firewalls
Ixia
 
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 

Viewers also liked (12)

PPTX
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
PLUMgrid
 
PDF
Open Source Means Upstream First
OPNFV
 
PDF
Nuts & Bolts of the Dynamic Attack Chain
IBM Security
 
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
 
PPTX
Crack the Code
InnoTech
 
PPTX
InduSoft System security webinar 2012
AVEVA
 
PPTX
Amien Harisen - APT1 Attack
Indonesia Honeynet Chapter
 
PPTX
Security best practices
AVEVA
 
PDF
The Anatomy of a Data Breach
David Hunt
 
PDF
Openstack meetup: NFV and Openstack
Marie-Paule Odini
 
PPTX
Nfv
Ahmad Hijazi
 
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
PLUMgrid
 
Open Source Means Upstream First
OPNFV
 
Nuts & Bolts of the Dynamic Attack Chain
IBM Security
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
 
Crack the Code
InnoTech
 
InduSoft System security webinar 2012
AVEVA
 
Amien Harisen - APT1 Attack
Indonesia Honeynet Chapter
 
Security best practices
AVEVA
 
The Anatomy of a Data Breach
David Hunt
 
Openstack meetup: NFV and Openstack
Marie-Paule Odini
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Ad

Similar to Inherent Security Design Patterns for SDN/NFV Deployments (20)

PDF
Zero Trust Networks Evan Gilman Doug Barth
buracakerina41
 
PDF
Zero Trust Networks Evan Gilman Doug Barth
xovaniparpov15
 
PPTX
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
PPSX
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
 
PPTX
Architecting trust in the digital landscape, or lack thereof
Jonathan Sinclair
 
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
PPTX
SDN and NFV integrated OpenStack Cloud - Birds eye view on Security
Trinath Somanchi
 
PPTX
Security Components Across OSI Layers (1-4).pptx
MarcKhoury5
 
PDF
Security in the cloud planning guide
Yury Chemerkin
 
PPTX
Protecting endpoints from targeted attacks
AppSense
 
PPTX
Steve Porter : cloud Computing Security
Gurbir Singh
 
PPT
Cloud Security_Module2.ppt
ArunKumbi1
 
PDF
The Zero Trust Security Model for Modern Businesses!
Caroline Johnson
 
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
PPTX
CISSP Domain 03 Security Architecture and Engineering.pptx
gealehegn
 
PDF
Forrester zero trust_dna
Cristian Garcia G.
 
PDF
Zero Trust Best Practices for Kubernetes
NGINX, Inc.
 
DOCX
What is zero trust model of information security?
Ahmed Banafa
 
PDF
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Zero Trust Networks Evan Gilman Doug Barth
buracakerina41
 
Zero Trust Networks Evan Gilman Doug Barth
xovaniparpov15
 
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
 
Architecting trust in the digital landscape, or lack thereof
Jonathan Sinclair
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
SDN and NFV integrated OpenStack Cloud - Birds eye view on Security
Trinath Somanchi
 
Security Components Across OSI Layers (1-4).pptx
MarcKhoury5
 
Security in the cloud planning guide
Yury Chemerkin
 
Protecting endpoints from targeted attacks
AppSense
 
Steve Porter : cloud Computing Security
Gurbir Singh
 
Cloud Security_Module2.ppt
ArunKumbi1
 
The Zero Trust Security Model for Modern Businesses!
Caroline Johnson
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
CISSP Domain 03 Security Architecture and Engineering.pptx
gealehegn
 
Forrester zero trust_dna
Cristian Garcia G.
 
Zero Trust Best Practices for Kubernetes
NGINX, Inc.
 
What is zero trust model of information security?
Ahmed Banafa
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Ad

More from OPNFV (20)

PPTX
How to Reuse OPNFV Testing Components in Telco Validation Chain
OPNFV
 
PPTX
Energy Audit aaS with OPNFV
OPNFV
 
PPTX
Hands-On Testing: How to Integrate Tests in OPNFV
OPNFV
 
PDF
Storage Performance Indicators - Powered by StorPerf and QTIP
OPNFV
 
PDF
Big Data for Testing - Heading for Post Process and Analytics
OPNFV
 
PPTX
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
OPNFV
 
ODP
How Many Ohs? (An Integration Guide to Apex & Triple-o)
OPNFV
 
PPTX
Being Brave: Deploying OpenStack from Master
OPNFV
 
PPTX
Upstream Testing Collaboration
OPNFV
 
PDF
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
OPNFV
 
PDF
Learnings From the First Year of the OPNFV Internship Program
OPNFV
 
PDF
OPNFV and OCP: Perfect Together
OPNFV
 
PDF
The Return of QTIP, from Brahmaputra to Danube
OPNFV
 
PDF
Improving POD Usage in Labs, CI and Testing
OPNFV
 
PDF
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
OPNFV
 
PDF
Distributed vnf management architecture and use-cases
OPNFV
 
PDF
Software-defined migration how to migrate bunch of v-ms and volumes within a...
OPNFV
 
PDF
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
OPNFV
 
PDF
My network functions are virtualized, but are they cloud-ready
OPNFV
 
PDF
Challenge in asia region connecting each testbed and poc of distributed nfv ...
OPNFV
 
How to Reuse OPNFV Testing Components in Telco Validation Chain
OPNFV
 
Energy Audit aaS with OPNFV
OPNFV
 
Hands-On Testing: How to Integrate Tests in OPNFV
OPNFV
 
Storage Performance Indicators - Powered by StorPerf and QTIP
OPNFV
 
Big Data for Testing - Heading for Post Process and Analytics
OPNFV
 
Testing, CI Gating & Community Fast Feedback: The Challenge of Integration Pr...
OPNFV
 
How Many Ohs? (An Integration Guide to Apex & Triple-o)
OPNFV
 
Being Brave: Deploying OpenStack from Master
OPNFV
 
Upstream Testing Collaboration
OPNFV
 
Enabling Carrier-Grade Availability Within a Cloud Infrastructure
OPNFV
 
Learnings From the First Year of the OPNFV Internship Program
OPNFV
 
OPNFV and OCP: Perfect Together
OPNFV
 
The Return of QTIP, from Brahmaputra to Danube
OPNFV
 
Improving POD Usage in Labs, CI and Testing
OPNFV
 
Run OPNFV Danube on ODCC Scorpio Multi-node Server - Open Software on Open Ha...
OPNFV
 
Distributed vnf management architecture and use-cases
OPNFV
 
Software-defined migration how to migrate bunch of v-ms and volumes within a...
OPNFV
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
OPNFV
 
My network functions are virtualized, but are they cloud-ready
OPNFV
 
Challenge in asia region connecting each testbed and poc of distributed nfv ...
OPNFV
 

Recently uploaded (20)

PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 

Inherent Security Design Patterns for SDN/NFV Deployments

  • 1. Inherent Security Design Patterns for SDN/NFV Deployments John McDowall Palo Alto Networks
  • 2. Drivers for Consumers and Providers of Cloud/NFV Automa'on   Minimize    OPEX  &  CAPEX   Dynamic   Resources   Self-­‐Service   Portals   Scalability   Agility  Producers Consumers Make security easy-to-deploy by consumers No Bottlenecks Need well-defined security posture New   Business     Models  
  • 3. “….if  innova+on  doesn’t  get  ahead  of  the   hackers,  we  will  likely  see  roadblocks  to   rolling  out  new  SDx  applica+ons  ….        ….  because  of  the  fear  that  SDx   Infrastructure  cannot  protect  against  and   contain  new  aAacks.  “     SDxCentral SDx Infrastructure Security Report 2015 Edition
  • 4. Key Security Perspectives The security perimeter no longer exists. Understanding the Cyber Attack Pattern Lifecycle How do we prevent attacks with SDN/NFV ?
  • 5. Preventing Across the Cyber Attack* Life Cycle Unauthorized Access Unauthorized Use Gather Intelligence Leverage Exploit Execute Malware Command & Control Actions on the objective Reconnaissance Weaponization & Delivery Malware Communicates with Attacker Exploitation Data Theft, Sabotage, Destruction * Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. Lockheed Martin Corporation Breach  the  Perimeter  1 Deliver  the  Malware  2 Exfiltrate  Data  4Lateral  Movement  3
  • 6. Security Challenges with NFV Manual   Deployments     Slow  and  error-­‐ prone  processes  to   enable  security   Transient   Workloads     Workload  lifespan   is  in  hours,  days  or   weeks   Sta'c   Remedia'on     Lack  of  dynamic   remediaCon   measures   Malware     30,000     new  malware  /day  
  • 8. Applying Zero Trust* to NFV FoundationalSecurity DesignPattern * No More Chewy Centers: The Zero Trust Model of Information Security John Kindervag, Forester Research, 2014 Verify  and   Never  Trust   Inspect  and   Log  all  Traffic   Design   Network   Inside-­‐Out   Predefine: •  User-Access Controls •  Layer-7 Interactions Build: •  Security Compliance •  Auditable Entities Enable: •  Fine grained kill switch •  Real-time Security Updates
  • 9. Foundation Security Blueprint FoundationalSecurity DesignPattern •  Define  allowable   interacCons   •  Add  applicaCon   security  paOern   •  Sign-­‐off  by  security   team   •  Deploy  zero-­‐trust   applicaCon  security   paOern.   •  Merge   parameterized   paOern  with  tenant   instance   •  Deny-­‐All  to  Only-­‐ Allowed   •  Real-­‐Cme  InspecCon   •  Update  threat   paOerns,  sigs  et  al   •  Disrupt  and/or   block  cyber   aOacks   •  Archive  logs  &   policies   •  Perform  forensics   •  Generate  report   Prepare   Deploy   Update   Remove   1 2 3 4 Virtual Function Security Model Virtual Function
  • 10. Implementation of Foundation Security Pattern SecureEncapsulation DesignPattern Enforce zero-trust model – block all traffic until policy is applied. Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   Security   Enforcement   Point   VM-­‐A   1 Security Controller Get signed “security pattern” from VM deployment Descriptor and deploy with application. 2 Get VNI/Tenant ID for instance mapping bridge vxlan nic Apply policy/tenant based on tenant ID and application security pattern retrieved from deployment. 4 3 v-­‐wire  v-wire NFV deployed security enforcement point. 1 Data  link   Control  link   v-­‐wire  
  • 11. Summary •  Security was one on the biggest impediments to deployment of NFV. •  Leveraging NFV to define a foundational pattern to protect application workloads. •  Application Security patterns can now be applied to the foundational pattern to implement security from the inside out •  Security is now a resource that scales with your NFV infra-structure. 11