Microsoft PowerPoint - SDN Security - Scott Hogg - 2017-06-22.pptx

(black) #1

Hardening an SDN System (cont.)



  • Harden the controller and the network elements (typical
    host hardening)

  • Closely monitor controllers for suspicious activity

  • Secure coding practices for all northbound applications
    requesting SDN resources

  • Ability to validate flows in network device tables against
    controller policy

  • Use Data Center Interconnect (DCI) protocols that can
    authenticate tunnel endpoints and secure tunneled
    traffic

Free download pdf