Microsoft PowerPoint - SDN Security - Scott Hogg - 2017-06-22.pptx
black
(black)
#1
Hardening an SDN System (cont.)
- Harden the controller and the network elements (typical
host hardening)
- Closely monitor controllers for suspicious activity
- Secure coding practices for all northbound applications
requesting SDN resources
- Ability to validate flows in network device tables against
controller policy
- Use Data Center Interconnect (DCI) protocols that can
authenticate tunnel endpoints and secure tunneled
traffic