Identity-Defined Networking
Andrei Gurtov IDA, Linköping University Erik Giesa, Marc Kaplan TemperedNetworks
TDDD17, LiU
Identity-Defined Networking Andrei Gurtov IDA, Linkping University - - PowerPoint PPT Presentation
Identity-Defined Networking Andrei Gurtov IDA, Linkping University Erik Giesa, Marc Kaplan TemperedNetworks TDDD17, LiU Contents Traditional Networking: Challenging and Complex Identity-Defined Networking (IDN): A New
Andrei Gurtov IDA, Linköping University Erik Giesa, Marc Kaplan TemperedNetworks
TDDD17, LiU
Contents
A New Approach for Unified Secure Networking and Mobility
Traditional Networking is Complex, Costly and Fragile
IT Intranet Corporate Network Cellular Network
Users Remote Worker Site 1 Site 3 Remote Site 4 Network & Security Management Data Center Remote Vendor
IT Intranet
Data Center Data Center
And is Simply Not Sustainable
VPN access controls for each network Fragile DNS and routing updates for failover Policies tied to IP addresses Complex firewall and networking rule sets VLANs and access control lists (ACLS) overhead
… per device
WAN / LAN
Remote Unmanaged Network Remote Site Managed Network
Corporate Network & Resources Device 10 Device 11 Device 12 192.168.10.10 192.168.10.11 192.168.10.12 Device 20 Device 21 192.168.20.20 192.168.20.21 Device 30 Device 31 Device 32 192.168.30.30 192.168.30.31 192.168.30.32
Problem: The Singular Root Defect
that affects all IP security and networking
192.168.10.1 192.168.20.1 192.168.30.1
IP Addresses are used as Network and Device Identity
Large Attack Surface
Lack of Mobility and Instant Failover
Networking and Security Costs
The Ideal Solution
Integrates networking and identity from the start Provisions networks and resources rapidly Allows instant segment, revoke, or quarantine Can be easily managed from a centralized location
Identity-Defined Networking (IDN) – Unified Networking & Security
Securely connect any resource, anytime, anywhere.
C R Y P T O G R A P H I C I D E N T I T I E S A U T O MA T E D O R C H E ST R AT I ON S O F T W A R E -D E F I N E D S E G ME N T A T I O N H O S T I D E N T I T Y N A ME S P A C E E N C R Y P T ED F A B R I C D E V I C E - B A S E D T R U ST
Host Identity Protocol (HIP)
Task Force (IETF) from 2004
2015
Group at IRTF (2006-2010)
(RFC6538)
http://www.temperednetworks.com/resource s/host-identity-protocol-dr-andrei-gurtov/
architecture
Identity-Defined Networking (IDN) at a Glance
negligible
significant
10
Private Key Public Key 128 Bit 32 Bit
One-way Hash Last Digits
Host Identity Host Identity Tag Local Scope Identifier
IP HIP IPsec
IP
11
TCP / UDP HIP
HI IP Payload Control
Transport Layer Network Layer ... ...
How IDN Fabric Overlays Existing Infrastructure
HIPserver
Application Server
Device B
HIPswich Conductor
Serves as device identity authority where trust-based policies are distributed to all HIP (Host Identity Protocol) Services
Device A
Public / Shared Network (Untrusted) IDN-Fabric (Trusted)
Secure Networking Made Simple
IDN Endpoints
Global Orchestration and Network Provisioning Trust-Based Unique Cryptographic Identities (CID)
The Cure to IT Complexity
policy enforcement
Visual Orchestration Simplifies, Reduces Complexity & Errors Reduces OpEx as much as 90%
WAN / LAN
Device 10 Device 11 Device 12 192.168.10.10 192.168.10.11 192.168.10.12 Device 20 Device 21 192.168.20.20 192.168.20.21 Device 30 Device 31 Device 32 192.168.30.30 192.168.30.31 192.168.30.32 192.168.10.1 192.168.20.1 192.168.30.1
CLOAKED, SEGMENTED & MOBILE PROTECTED, SEGMENTED, ENCRYPTED, & MOBILE CLOAKED, SEGMENTED, & MOBILE
HIPswitch 192.168.10.100 192.168.30.100
HIPclient Lower Costs, Simpler Environment
complex policies, ACLs, VLAN complexity, cert mngt 10.0.9.2 Conductor
A New Identity Networking Paradigm Made Simple
Remote Site Networks & Resources
Corporate Network & Resources
Unique Host Identity Approach
Rapid Provisioning, Revocation, IP Mobility and Failover
Significantly Reduced Attack Surface
The New Identity Networking Paradigm Creates Tremendous Value
Increase in network and security team productivity
Reduce networking and resource provisioning time up to:
Decrease IT CapEx and OpEx costs up to:
Make 100% of your connected IP resources invisible
The New Identity Networking Paradigm Creates Tremendous Value
Improve time to mitigation, revocation, and quarantine up to:
Reduce attack surface up to:
Decrease failover and disaster recovery times to as little as:
Reduce Deployment Time
BEFORE TEMPERED
Ticket submitted to Network IT for new resources addition to corporate network. Design for Routing, Firewall, VPN, and Switching Policies Design Submitted to InfoSec for review and approval Approval of Design by InfoSec Implementation of Design by Network Ops Implementation Review and Sign-Off by InfoSec Go Live!
Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7
AFTER TEMPERED
Ticket submitted to Network IT for new resource.
Day 1
Resource added with explicit trust relationships, segmentation and
Deployment time reduced by
Increase Productivity
Increase in network and security team productivity
improve quality of service, monitoring and uptime.
through access logs, ACLs, and checking FW rules.
and verify/test disaster recovery and failover.
Decrease IT Expenditures
Decreased IT CapEx and OpEx costs
Server Firewall Switch VPN HIPswitch
BEFORE TEMPERED AFTER TEMPERED
BEFORE TEMPERED
IT Intranet Corporate Network Cellular Network Users Remote Worker Site 1 Site 3 Remote Site 4 Network & Security Management Data Center Remote Vendor
Make 100% of Connected IP Resources Invisible
technology based on the new identity networking paradigm enabled by the Host Identity Protocol (HIP).
cloak as effectively.
easily across physical, virtual, and cloud networks.
Reduce Attack Surface
Up to:
BEFORE TEMPERED AFTER TEMPERED
Improve Time to Mitigation, Revocation, and Quarantine
Time to mitigation, revocation, and quarantine is improved
By:
fabric is one click, or an automated API call, and happens instantly
rules, ACLs, and other policies to ensure that system is in fact quarantined or revoked
Decrease Failover and Disaster Recovery Time
Failover and Disaster Recovery times reduced to as little as
To as little as:
unique host identities, therefor failover can be applied from an entire datacenter (represented as a unique host identity), or to a server (represented as a unique host identity).
automated or manual update to the mesh telling all things that are communicating to it, to failover instantly to it’s backup in another pre-defined IDO
“SEGMENTED (QUARANTINED) VENDOR NET” “INSTANT DISASTER RECOVERY, REVOCATION & QUARANTINE” “EFFORTLESS SEGMENTATION, ENCRYPTION, AND IP MOBILITY” “NETWORK AND IP RESOURCE CLOAKING” “NETWORK VIRTUALIZATION & ORCHESTRATION - RAPID PROVISIONING”
Use Cases
“SECURE MACHINE TO MACHINE COMMUNICATION” “CLOAK AND PROTECT LEGACY SYSTEMS”