WO2019228717A1 - Networked application orchestration - Google Patents
Networked application orchestration Download PDFInfo
- Publication number
- WO2019228717A1 WO2019228717A1 PCT/EP2019/060664 EP2019060664W WO2019228717A1 WO 2019228717 A1 WO2019228717 A1 WO 2019228717A1 EP 2019060664 W EP2019060664 W EP 2019060664W WO 2019228717 A1 WO2019228717 A1 WO 2019228717A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- service
- application
- security
- applications
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- This invention relates to automation of deployment of network based applications and Network Function Virtualisation (NFV) components based on the wider security analysis of deployment infrastructure.
- NFV Network Function Virtualisation
- Modern NFV and network-based applications are planned, deployed and operated as individual systems. When combined, such systems may have functional dependencies on one another i.e. a web server may depend on a switch, but these dependencies may only become apparent when a device fails and the service stops.
- This“stovepipe” approach to service delivery can result in security dependency issues whereby the omission of a security countermeasure in one upstream component can result in security attacks on other components downstream.
- the planning of such countermeasures is commonly performed only as an afterthought, once the functional design has been decided.
- the security overlay is performed by a limited number of very busy specialists that can lead to omission or unnecessary duplication of security countermeasures across a system.
- a method of deploying applications and virtualised network functions to meet a service specification in which a security profile is assigned, and a plurality of candidate configurations of network resources, devices, applications and functions are assessed for ability to meet the service specification in which a security analysis is performed of the candidate network configurations, devices and applications to be deployed to implement the service, a configuration is selected, and the network resources, devices, applications and functions adapted to meet the assigned security profile prior to deployment. After deployment, the selected configuration may be monitored to ensure that the system remains within requirements. On detection of a network attack or failure a new security profile is generated, the configuration can be re-analysed against the new security profile, and the network configurations, devices and applications are re-configured to meet the new security profile.
- Embodiments of the invention provide a way of deploying network-based applications and NFV components based on a wider security analysis of the deployment infrastructure.
- the user’s requirements can be defined in the form of a set of services, security expectations, and physical and economic constraints. In particular, users can request individual security scores both for elements of the service and for the complete service.
- the process decomposes such a service set and analyses the services (applications & NFV apps), and potential devices and network nodes used to deliver that service set, to determine what updates are required to make the service safe, and to satisfy any other requirements such as user preferences based on cost or whether the resources are under the control of external parties.
- a deployment designer can then create a new deployment specification of applications, services and networks that will satisfy, or come closest to satisfying, the customer specification.
- the invention may be embodied in software comprising computer program code for controlling a general-purpose computer to perform the steps of the process.
- the invention also extends to a computer system including a processor and a memory storing computer program code for performing the steps of the process of the invention, and to a computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform the steps of the process.
- Container technology allows multiple applications and their libraries to be run with a degree of isolation on a common operating system, but each operates inside its own isolated environment with only the software components and libraries it requires, packaged in a standardised way.
- Using containers results in smaller applications (a few tens of Megabytes), which are quicker to download and start up, and provides a much higher packing density of applications per physical server than virtualisation or indeed the traditional operating system and application model, thereby using less of the system's resources. This approach allows applications to be more efficient, lightweight, and portable between different operating systems.
- Embodiments of the present invention provide a computer-implemented process for controlling a containerisation orchestrator, comprising the steps of the method of the invention by:
- the orchestrator may not deploy the candidate application software, and instead the analysis steps can be repeated using a different candidate application.
- An Infrastructure Management system may be used to control one or more orchestration and network management systems to deploy services using respective deployment agents in the network resources and devices.
- a user s specification for end-to-end service can be input in the form of applications, network links, devices and security constraints, and the specification then analysed against available assets, so that a deployment design system can determine an optimal configuration of components, and the Infrastructure Management system can then control one or more orchestration and control systems to deploy and configure the selected network and operational components.
- Each candidate element of the service resolution can be analysed to determine whether sufficient resources are available to run the application on the specified device, and scanned for vulnerabilities, and if any vulnerabilities are identified that do not satisfy the specified security level but can be remedied by modifying the application, such modification is made to the application, which is re-assessed for suitability to meet the service application, and if the vulnerability is not capable of remedy the analysis process is suspended and an alternative configuration is analysed.
- a service design processor may be arranged to assemble the application elements into a proposed network, connected to the selected user device.
- a service level may also be specified to define protection required for the application when in service. Analysis of service applications, devices and network links to determine protection required may be based on data from one or more of vulnerability scans, authentication data, previous history of use, and performance statistics. After installation of a containerised application, the steps of the process can be repeated in response to predetermined device, data centre and network link status conditions to determine if the configuration still meets the deployment policies and, if it does not, to select and deploy an alternative configuration.
- Monitoring agents installed in the network resources and devices may provide status data on device, data centre and network link status.
- a deployed system may be continually monitored to ensure that the service operates within requirements. Should an incident such as a network attack or failure occur the system is re-analysed against the original requirements and re configured or repaired to restore it to again meet the specified requirements.
- Figure 1 is a high level diagram depicting the basic elements of a system to be deployed.
- Figure 2 depicts an example of a secure path between two applications
- Figure 3 depicts an architecture of a system for operating an application design process according to one embodiment of the invention
- Figure 4 is a flow diagram depicting a process operating according to the invention
- Figure 5 is a more detailed depiction of the architecture of a system for operating a process according to one embodiment of the invention.
- a number of components are used in this embodiment to enable the optimised orchestration of secure Network Function Virtualisation components and network-based applications.
- Virtual Network Function components and Network-based Applications are treated as“service applications”, each having one or more addressable endpoints, commonly implemented as Virtual Machines or as containers, each having one or more interfaces for managing their configuration.
- Virtual Network Function components typically include routers, deep packet analysis, firewalls, DFICP and DNS servers.
- Network-based applications tend to include web servers, video servers, analytics and actual applications.
- Customer edge devices include fixed or mobile user terminals, routers, switches and cloud- based components such as virtual machines, and provider edge devices. Complete cloud services can also be modelled as individual Virtual Machines.
- Device Attributes may be identified through both static inventory data (configuration) and from installed agents installed on devices.
- Networks are modelled on a link-by-link basis, each link being terminated with nodes, representing configurable devices hosting Network Function Virtualisation or application components.
- nodes representing configurable devices hosting Network Function Virtualisation or application components.
- the terms“Node” and“Device” can therefore be used interchangeably.
- This approach allows users to request specific routes that may avoid certain locations, or for example, to include only links under the control of that user. Such an arrangement may be required to minimise costs paid to hosts of the external links, or to prevent interception by external parties of the network traffic itself, or of the address data relating to that traffic (which may itself be of value to an external party in discovering which network addresses are communicating with each other).
- FIG. 3 The high level architecture of a processor for operating the application design process is shown in Figure 3. All the components of the system can run on a processing facility that can be hosted in the cloud, or on a general-purpose computing device. It is then available to an individual user via a graphical user interface, to allow users to specify their requirements.
- a Business and Operational Support System 20 in which a user’s specification for end-to-end service is input in the form of applications, network links, devices and security constraints.
- an analysis engine 21 where the user’s requirements are analysed against existing and future assets.
- a deployment designer 22 determines the optimal location for components.
- an Infrastructure Management system 23 which is the entity with the task of controlling the deployment of the application by interaction with further orchestration and control systems to configure network and computing assets.
- BSS/OSS Business and Operational Support System
- the user selects applications from a catalogue 200 and a service designer 201 assembles them into a proposed network.
- the user can select the device on which the service is to be deployed.
- the uer can define the Security Level and other operational requirements, such as CPU usage or location constraints. Flowever, these policies could also be enforced on a user basis, as will be described later.
- the analysis engine 21 incorporates an analysis of the user’s requirements and the network, device and application, deployment design, and finally the actual control of the orchestration to deliver the service.
- Intent analysis (IA) 210 deals with coordinating the assessment of the user’s Service specification against non-functional requirements such as application security, network availability, and device location etc.
- Service specification will be specified (dependent upon capability of BSS/OSS tools) without security levels and non-functional specification.
- the Intent analysis can use a generic service level and non-functional specification or an earlier user-defined example. The general flow is depicted in Figure 4, which will be described later.
- Service Applications may exist as software libraries, virtual machines or containers. They are specified by name, unique identifier source, expected CPU usage, memory and storage. A service level is also specified that outlines what level of protection is required against potential security threats for the application when in service. Analysis of a service application, which may comprise one or more elements, is performed based on information such as vulnerability scans, provider of application, authentication by author, previous malware attack history, or provenance through prior use.
- Device analysis assesses devices such as virtual machines, computers, mobile devices, “Internet of Things” devices. Attributes are assessed such as network connections (or potential for such connections), CPU requirements, hardware countermeasures such as Trusted Platform Modules (TPM), memory, storage, operating systems, locations and physical security. Analysis of such devices is based on information such as vulnerability scans of OS and existing applications, provider of operating systems and hardware, physical security and provenance through prior use
- Network Link analysis describes the relationship between one service application and another.
- Network links have attributes such as mean, maximum, minimum, and current throughput, quality of service (best effort, guaranteed), availability (reliability), owner, route, location and physical security.
- the automated design analysis stage uses a rule-based system to determine the optimal design of the Service specification and update requirements. These rules can be defined based on industry best practice, or heuristic algorithms, and they can be updated as standard approaches and short cuts are developed. For example, an application with a number of components may require full design analysis the first time it is deployed, but a template design can be constructed for future instantiations using the same application.
- the Service specification is adapted by identifying how the update requirements can be applied. In some cases there may well be multiple ways to design a service based on availability of resources and security threats, as will be discussed later.
- the process can therefore be used to provide a specified security path and then enforce a requirement that all traffic relating to the application uses that path.
- a user may want a networked application to be deployed on an existing edge device to access a data sensitive application running on another device.
- the user specifies the requirements that the link between the edge device and the sensitive application must be secure.
- the edge device can be analysed to determine what vulnerabilities exist in the host operating system, what security countermeasures already exist (firewall, intrusion detection), and what network connectivity is in place.
- the application can be scanned for vulnerabilities, with any critical vulnerabilities that cannot be fixed result in the analysis process being suspended or cancelled and the user alerted to the need to modify the specified requirements.
- the existing network links are analysed to identify if they is secure enough based on the intended purpose. If no existing links are secure enough, it adds update requirements for each component that requires modification in order for a secure link to be created, either by adapting the route, or by adapting components on the originally-selected route. This will include setting up a secure route that traffic should take from the edge device to the location of the sensitive application.
- the design stage generates a service set and specification of actions, which becomes an Orchestration Specification.
- FIG. 1 A typical use case is illustrated in Figure 1 , and in this case the customer has a requirement to install a web-application server 8 connected to the Internet 2. In this use case the user already has assets such as an edge device 1 that will host the web server, and a connection 3 to the Internet via an ADSL.
- assets such as an edge device 1 that will host the web server, and a connection 3 to the Internet via an ADSL.
- FIG. 2 shows the edge device 1 with the new application 8 deployed and the secure link 3 that has been created.
- the link 3 comprises of a router 30, intrusion detection 31 and firewall capabilities 32 which the traffic between the two applications 8, 9 is forced to go over.
- the target device 1 is identified as capable of hosting a service application 8 but does not have vulnerability scanning or critical fixing, so this is added to the Orchestration Specification.
- the service application 8 is also added to the Orchestration specification. Given that vulnerability scanning and fixing is already marked for the device no further action is required in this respect. 3. As a firewall is required, the Orchestration specification is updated to include a firewall, if not already present, and a link to the firewall from the service application is made. A new interface is created on the firewall representing the new endpoint of the service application.
- a network link is added to the Orchestration specification.
- the link 3 to the Internet is through a VPN that satisfies the security score, so this can be reused. If this is not the case the Orchestration specification is updated to configure a new link.
- the Orchestration specification thus provides sufficient data for an orchestration system to set up the service.
- the design stage can be used to update an existing orchestration specification to maintain and enforce a recommended security path meeting the service specification, in response to changes in security levels.
- Step 400 The process for selecting and installing the application will be described with reference to Figure 4.
- the user specifies his requirements using a graphical or textual tool to create a description of a service or Service Speciation (Service specification). (Step 400) .
- the service is specified in terms that include:
- Devices e.g the user device 1 - machines that can be programmed and configured remotely
- Network-Links e.g the internet connection 3
- virtual or real connections between devices that can be programmed and configured remotely, such as the virtual private network client 5 and server 6 managing that link
- Endpoints for example the interface 4 between the device 1 and the link 3 - the port or other point of attachment of a network link to a device
- Service Applications 7, 8, 9- single or multiple applications that may be deployed on one or more devices.
- the user additionally specifies a non-functional constraints for each component that includes capacity, version, CPU, network throughput, preferred device and security measures (step 401 )
- a typical Service specification could include: a target-Security-Score, a Service Description (e.g. Web server running on a host connected to the Internet), and specifications for the Service Applications, network links and devices to be used to provide the service, including memory, and security scoring, any intrusion detection features, CPU capacity etc. Shown in table 1 below is an example of a Security Matrix that can be used to determine the countermeasures required and upgrades infrastructure to support a service.
- the system would work at a high level as follows. Firstly the service application 8 which is to be installed is analysed to determine whether sufficient resources are available on the target device 1 to run the application. Dependent on the security level required, the application is scanned for vulnerabilities. Different elements can have different target scores, dependent on their perceived risk of exposure to threats. (Figure 4 step 402)
- any critical vulnerabilities that do not satisfy the specified security level are fixed (step 404) or, if they cannot be fixed, the analysis process is suspended or cancelled.
- the target device 1 is also analysed to determine what vulnerabilities exist in the host operating system, what security countermeasures already exist (firewall 7, intrusion detection), and what network connectivity 3 is in place. Other static/inventory data about the locale, physical security of the device ownership and operation can also be analysed. The analysis is made by consulting a security matrix. A firewall, and vulnerability fixing features, can be added if necessary. For the sake of illustration, if the device is running with no critical vulnerabilities, operated by a trusted partner in a secure location then the device would be given a score of 2. A number of update requirements can be specified for vulnerability scanning and fixing of critical vulnerabilities (step 405).
- the process is repeated for other elements of the system. If the application requires the device to be connected to a network, the network links 3 are also analysed. This is obviously not necessary in a standalone system. However, the existence of external links to the device 1 , even if not used by the application to be installed, may affect its security score.
- Each link and node in the network 3, 4, 5, 6 is analysed in turn.
- the source 1 and destination 2 has connection in place (such as an existing VPN or MPLS service) it can be analysed as a single link.
- the connection has links that can be influenced by updating intermediary nodes (routes or virtual network functions) the individual network links in the connection are assessed separately.
- a link is already in place and there is provision to extend it to the destination then it is marked as a candidate link.
- factors such as encryption, routing, and ownership of network links are identified.
- an ADSL link is identified but without any encryption or VPN, so a mandatory update requirement is added.
- a link meets the above criteria and can be fixed then it is marked as a candidate link whilst any shortfalls are identified in mandatory update requirements.
- MAR Mandatory Update Requirements
- the overall service has a target security score, which in this example is set at 3.
- the most appropriate service application has been identified and its security score analysed (at 2, for example).
- update requirements are set, for example Vulnerability-Scanning, Critical-Vulnerability-Fixing, and an NAT-Firewall.
- the service application is identified as the Internet, and an Analysed-Security-Score is identified for it. In this example we shall assume this meets the target security score so there are no security update requirements. Flowever, a static-1 P-Address has to be allocated.
- the network links to be used are analysed to have a security score of 2, against a target of 4 (as previously noted, different elements can have different target scores, dependent on their perceived risk of exposure to threats).
- updates may require that the network routing uses a specified route (e.g no links not under the control of the service provider, or all traffic to be within a virtual private network).
- the device 1 on which the application to run is assessed, and any update requirements identified such as Vulnerability Scanning and Critical Vulnerability Fixing.
- the resulting service application is then re-assessed (step 402, 403) to determine whether it meets the service specification. This may not be the case if, for example, the modifications to the network routing result in an incompatibility with the modifications previously made to the target device. For example, a combination of configuration adaptations made to meet a network security requirement may result in a latency value which is outside specified limits. If this is the case the process is repeated (step 404, 405) until the specification meets all the requirements.
- the resulting service application is then stored (step 406) ready for delivery to the customer in the form depicted in Figure 1 , with the virtual private network client 5 installed on the device and a corresponding VPN server 6 selected in the internet, together with a suitable firewall 7.
- a deployment designer 22 analyses the specified service application and retrieves data to create an Orchestration specification document from that specification.
- the Orchestration specification document is used by the Infrastructure Management system 23 to orchestrate the actual creation and deployment of application and network assets.
- An orchestration specification document can be created using a rule engine as depicted in Table 2. For instance when a server is requested, then based on the conditions (suitability of the target device) a firewall can be installed on either the Target Device or the Upstream Device. Likewise once the application is deployed a static IP address can be created within the network.
- the Orchestration specification document could take several forms, for example:
- An orchestration specification flag allows the actual multiple decision logic to be replicated in the Orchestration specification to offer more flexibility at deployment time.
- the Infrastructure Management system 23 comprises three main components.
- the first component is a controller 230 responsible for executing orchestration specifications against underlying technology specific management and orchestration platforms.
- the controller can be implemented in many ways, for example a scripting approach, in which the orchestration specification is based on a scripting language that can be simply run against a suitable shell, or node interpreter.
- An alternative implementation uses an interpretation engine, in which the controller is arranged to interpret the orchestration specification and to interact with lower management and orchestration systems.
- the second component is an asset inventory 231 , used to store basic information about devices, existing network links and service applications that are in place prior to the ordering phase.
- This registry includes management endpoints for controlling the assets.
- the third component is a deployment inventory 232, used to record service specifications, Mandatory Update Requirement (MUR) and orchestration specification documents.
- the deployment inventory is also used to store the actual configuration that is created to satisfy the demand, and which entities and management systems were responsible for setting it up.
- FIG. 5 shows the complete system.
- the Infrastructure Management system 23 interacts with a number of existing orchestration and network management systems 24, 25, 26, 27 to deploy services, using respective deployment agents 18, 28, 38 in the various devices and systems 1 , 2, 3.
- monitoring agents 19, 29, 39 are installed in the various devices and systems 1 , 2, 3 to provide a live view of device, data centre and network link status.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Network-based applications and virtualized components are deployed according to a security analysis of the infrastructure to be used and applications to be run on it. A specification of requirements (201) is analysed (211), together with potential devices (212) and network nodes (213), to determine an appropriate level of security to be applied, and a deployment specification of applications, services, security countermeasures, and networks is prepared that will satisfy the customer requirement and with known characteristics and vulnerabilities of the services. This analysis is used to generate a deployment specification (22), and finally the actual control of an orchestrator (23) to deliver the service. The deployed system can be continually monitored to ensure that the service continues to operate within requirements. Should an incident such as a network attack or failure occur the system is re-analysed against the original requirements and re-configured or repaired. This invention helps defend against opportunities for attack from malevolent forces presented by increasingly complex services and especially micro-services, by building in security to their design.
Description
Networked Application Orchestration
This invention relates to automation of deployment of network based applications and Network Function Virtualisation (NFV) components based on the wider security analysis of deployment infrastructure.
The delivery of network operations and services is becoming more automated. More complex services present new opportunities for attack from malevolent forces. It is therefore important that security be at the core of how these services are composed.
Modern NFV and network-based applications are planned, deployed and operated as individual systems. When combined, such systems may have functional dependencies on one another i.e. a web server may depend on a switch, but these dependencies may only become apparent when a device fails and the service stops. This“stovepipe” approach to service delivery can result in security dependency issues whereby the omission of a security countermeasure in one upstream component can result in security attacks on other components downstream. The planning of such countermeasures is commonly performed only as an afterthought, once the functional design has been decided. Commonly, the security overlay is performed by a limited number of very busy specialists that can lead to omission or unnecessary duplication of security countermeasures across a system. It may also result in modification of the initial functional design in a way which is detrimental to its performance or user interface. Other methods design systems around a predetermined security profile, without determining whether that security profile is appropriate for the required combination of networks, devices and applications. Security profiles are commonly specified for worst-case situations, but may be over-cautiously specified for a particular application, resulting in less-than-optimal performance in other respects. The converse may also occur, in which the predetermined security profile has to be relaxed or over-ridden in a specific respect, for example because a secure network connection is not available, or because the application is intended to identify security threats, or to test new and uncertified devices, or has to run non-standard software, in which case it is desirable that other aspects of the security profile be enhanced to compensate.
According to the invention, there is provided a method of deploying applications and virtualised network functions to meet a service specification in which a security profile is assigned, and a plurality of candidate configurations of network resources, devices, applications and functions are assessed for ability to meet the service specification, in which a security analysis is
performed of the candidate network configurations, devices and applications to be deployed to implement the service, a configuration is selected, and the network resources, devices, applications and functions adapted to meet the assigned security profile prior to deployment. After deployment, the selected configuration may be monitored to ensure that the system remains within requirements. On detection of a network attack or failure a new security profile is generated, the configuration can be re-analysed against the new security profile, and the network configurations, devices and applications are re-configured to meet the new security profile.
Embodiments of the invention provide a way of deploying network-based applications and NFV components based on a wider security analysis of the deployment infrastructure. The user’s requirements can be defined in the form of a set of services, security expectations, and physical and economic constraints. In particular, users can request individual security scores both for elements of the service and for the complete service. The process decomposes such a service set and analyses the services (applications & NFV apps), and potential devices and network nodes used to deliver that service set, to determine what updates are required to make the service safe, and to satisfy any other requirements such as user preferences based on cost or whether the resources are under the control of external parties. A deployment designer can then create a new deployment specification of applications, services and networks that will satisfy, or come closest to satisfying, the customer specification.
The invention may be embodied in software comprising computer program code for controlling a general-purpose computer to perform the steps of the process.
The invention also extends to a computer system including a processor and a memory storing computer program code for performing the steps of the process of the invention, and to a computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform the steps of the process.
The use of “Container” technology to run services and applications is becoming increasingly common due to its flexibility, packing density, portability across systems, and ease of deployment and configuration. Container technology allows multiple applications and their libraries to be run with a degree of isolation on a common operating system, but each operates
inside its own isolated environment with only the software components and libraries it requires, packaged in a standardised way. Using containers results in smaller applications (a few tens of Megabytes), which are quicker to download and start up, and provides a much higher packing density of applications per physical server than virtualisation or indeed the traditional operating system and application model, thereby using less of the system's resources. This approach allows applications to be more efficient, lightweight, and portable between different operating systems.
Embodiments of the present invention provide a computer-implemented process for controlling a containerisation orchestrator, comprising the steps of the method of the invention by:
a) selecting a candidate application for containerised deployment to a device b) retrieving application software for running the application
c) analysing the application software for vulnerabilities
d) analysing the selected container deployment configuration
e) assessing operational parameters of the device
f) comparing the operational parameters of the device and the container deployment configuration with vulnerabilities identified in the candidate application software, to determine if they are compatible with a predetermined risk score
g) if it is determined that the candidate application is not compatible with the risk score, re-assessing the candidate application for compatibility if adapted with an enhanced security provision
h) if such compatibility is identified, controlling the orchestrator to containerise and deploy the candidate application software on the device.
If compatibility is not identified, the orchestrator may not deploy the candidate application software, and instead the analysis steps can be repeated using a different candidate application.
An Infrastructure Management system may be used to control one or more orchestration and network management systems to deploy services using respective deployment agents in the network resources and devices. A user’s specification for end-to-end service can be input in the form of applications, network links, devices and security constraints, and the specification then analysed against available assets, so that a deployment design system can determine an optimal configuration of components, and the Infrastructure Management system can then
control one or more orchestration and control systems to deploy and configure the selected network and operational components.
Each candidate element of the service resolution can be analysed to determine whether sufficient resources are available to run the application on the specified device, and scanned for vulnerabilities, and if any vulnerabilities are identified that do not satisfy the specified security level but can be remedied by modifying the application, such modification is made to the application, which is re-assessed for suitability to meet the service application, and if the vulnerability is not capable of remedy the analysis process is suspended and an alternative configuration is analysed.
In response to user inputs specifying application elements, user devices on which the applications are to be deployed, and a user-defined security levels, a service design processor may be arranged to assemble the application elements into a proposed network, connected to the selected user device. A service level may also be specified to define protection required for the application when in service. Analysis of service applications, devices and network links to determine protection required may be based on data from one or more of vulnerability scans, authentication data, previous history of use, and performance statistics. After installation of a containerised application, the steps of the process can be repeated in response to predetermined device, data centre and network link status conditions to determine if the configuration still meets the deployment policies and, if it does not, to select and deploy an alternative configuration.
Monitoring agents installed in the network resources and devices may provide status data on device, data centre and network link status.
In embodiments of the present invention, a deployed system may be continually monitored to ensure that the service operates within requirements. Should an incident such as a network attack or failure occur the system is re-analysed against the original requirements and re configured or repaired to restore it to again meet the specified requirements.
An embodiment of the invention will be described by way of example, with reference to the drawings, in which:
Figure 1 is a high level diagram depicting the basic elements of a system to be deployed. Figure 2 depicts an example of a secure path between two applications
Figure 3 depicts an architecture of a system for operating an application design process according to one embodiment of the invention
Figure 4 is a flow diagram depicting a process operating according to the invention
Figure 5 is a more detailed depiction of the architecture of a system for operating a process according to one embodiment of the invention.
A number of components are used in this embodiment to enable the optimised orchestration of secure Network Function Virtualisation components and network-based applications.
Virtual Network Function components and Network-based Applications are treated as“service applications”, each having one or more addressable endpoints, commonly implemented as Virtual Machines or as containers, each having one or more interfaces for managing their configuration. Virtual Network Function components typically include routers, deep packet analysis, firewalls, DFICP and DNS servers. Network-based applications tend to include web servers, video servers, analytics and actual applications.
Customer edge devices include fixed or mobile user terminals, routers, switches and cloud- based components such as virtual machines, and provider edge devices. Complete cloud services can also be modelled as individual Virtual Machines.
Device Attributes may be identified through both static inventory data (configuration) and from installed agents installed on devices.
Networks are modelled on a link-by-link basis, each link being terminated with nodes, representing configurable devices hosting Network Function Virtualisation or application components. The terms“Node” and“Device” can therefore be used interchangeably. This approach allows users to request specific routes that may avoid certain locations, or for example, to include only links under the control of that user. Such an arrangement may be required to minimise costs paid to hosts of the external links, or to prevent interception by external parties of the network traffic itself, or of the address data relating to that traffic (which may itself be of value to an external party in discovering which network addresses are communicating with each other).
The high level architecture of a processor for operating the application design process is shown in Figure 3. All the components of the system can run on a processing facility that can be hosted
in the cloud, or on a general-purpose computing device. It is then available to an individual user via a graphical user interface, to allow users to specify their requirements.
There are three main components 20, 21 , 22, 23. Firstly there is a Business and Operational Support System 20, in which a user’s specification for end-to-end service is input in the form of applications, network links, devices and security constraints. Secondly, there is an analysis engine 21 , where the user’s requirements are analysed against existing and future assets. A deployment designer 22 determines the optimal location for components. Finally there is an Infrastructure Management system 23, which is the entity with the task of controlling the deployment of the application by interaction with further orchestration and control systems to configure network and computing assets.
In the Business and Operational Support System (BSS/OSS), the user selects applications from a catalogue 200 and a service designer 201 assembles them into a proposed network. The user can select the device on which the service is to be deployed. At this point the uer can define the Security Level and other operational requirements, such as CPU usage or location constraints. Flowever, these policies could also be enforced on a user basis, as will be described later.
The analysis engine 21 incorporates an analysis of the user’s requirements and the network, device and application, deployment design, and finally the actual control of the orchestration to deliver the service.
Intent analysis (IA) 210 deals with coordinating the assessment of the user’s Service specification against non-functional requirements such as application security, network availability, and device location etc. In certain cases the service specification will be specified (dependent upon capability of BSS/OSS tools) without security levels and non-functional specification. In this case the Intent analysis can use a generic service level and non-functional specification or an earlier user-defined example. The general flow is depicted in Figure 4, which will be described later.
Individual elements of the analysis engine 21 cover service application analysis 21 1 , device analysis 212 and network -link analysis 213, will now be discussed in turn. Each analysis results in a score, for example between 0 and 5.
Service Applications may exist as software libraries, virtual machines or containers. They are specified by name, unique identifier source, expected CPU usage, memory and storage. A service level is also specified that outlines what level of protection is required against potential security threats for the application when in service. Analysis of a service application, which may comprise one or more elements, is performed based on information such as vulnerability scans, provider of application, authentication by author, previous malware attack history, or provenance through prior use.
Device analysis assesses devices such as virtual machines, computers, mobile devices, “Internet of Things” devices. Attributes are assessed such as network connections (or potential for such connections), CPU requirements, hardware countermeasures such as Trusted Platform Modules (TPM), memory, storage, operating systems, locations and physical security. Analysis of such devices is based on information such as vulnerability scans of OS and existing applications, provider of operating systems and hardware, physical security and provenance through prior use
Network Link analysis describes the relationship between one service application and another. Network links have attributes such as mean, maximum, minimum, and current throughput, quality of service (best effort, guaranteed), availability (reliability), owner, route, location and physical security.
The automated design analysis stage uses a rule-based system to determine the optimal design of the Service specification and update requirements. These rules can be defined based on industry best practice, or heuristic algorithms, and they can be updated as standard approaches and short cuts are developed. For example, an application with a number of components may require full design analysis the first time it is deployed, but a template design can be constructed for future instantiations using the same application.
In the design stage the Service specification is adapted by identifying how the update requirements can be applied. In some cases there may well be multiple ways to design a service based on availability of resources and security threats, as will be discussed later.
The process can therefore be used to provide a specified security path and then enforce a requirement that all traffic relating to the application uses that path. For example, a user may want a networked application to be deployed on an existing edge device to access a data
sensitive application running on another device. The user specifies the requirements that the link between the edge device and the sensitive application must be secure. As part of the Service Specification Analysis, the edge device can be analysed to determine what vulnerabilities exist in the host operating system, what security countermeasures already exist (firewall, intrusion detection), and what network connectivity is in place. The application can be scanned for vulnerabilities, with any critical vulnerabilities that cannot be fixed result in the analysis process being suspended or cancelled and the user alerted to the need to modify the specified requirements. Next, the existing network links are analysed to identify if they is secure enough based on the intended purpose. If no existing links are secure enough, it adds update requirements for each component that requires modification in order for a secure link to be created, either by adapting the route, or by adapting components on the originally-selected route. This will include setting up a secure route that traffic should take from the edge device to the location of the sensitive application.
The design stage generates a service set and specification of actions, which becomes an Orchestration Specification.
A typical use case is illustrated in Figure 1 , and in this case the customer has a requirement to install a web-application server 8 connected to the Internet 2. In this use case the user already has assets such as an edge device 1 that will host the web server, and a connection 3 to the Internet via an ADSL.
Figure 2 shows the edge device 1 with the new application 8 deployed and the secure link 3 that has been created. The link 3 comprises of a router 30, intrusion detection 31 and firewall capabilities 32 which the traffic between the two applications 8, 9 is forced to go over.
Taking the example depicted in Figure 1 and Figure 2 for illustrative purposes, the design can be developed as follows.
1 . The target device 1 is identified as capable of hosting a service application 8 but does not have vulnerability scanning or critical fixing, so this is added to the Orchestration Specification.
2. The service application 8 is also added to the Orchestration specification. Given that vulnerability scanning and fixing is already marked for the device no further action is required in this respect.
3. As a firewall is required, the Orchestration specification is updated to include a firewall, if not already present, and a link to the firewall from the service application is made. A new interface is created on the firewall representing the new endpoint of the service application.
4. If it is determined that there are insufficient resources, no existing firewall, or a firewall exists elsewhere, then the previous step may be applied at a later stage. Rules can be applied based on mapping an appropriate port for the firewall.
5. A network link is added to the Orchestration specification. In this example it is assumed the link 3 to the Internet is through a VPN that satisfies the security score, so this can be reused. If this is not the case the Orchestration specification is updated to configure a new link.
6. It may be necessary to instantiate a virtual firewall 32 in the edge device 1 , along with the associated setting up of a route to the Internet from the device.
The Orchestration specification thus provides sufficient data for an orchestration system to set up the service. Using the same model the design stage can be used to update an existing orchestration specification to maintain and enforce a recommended security path meeting the service specification, in response to changes in security levels.
The process for selecting and installing the application will be described with reference to Figure 4. The user specifies his requirements using a graphical or textual tool to create a description of a service or Service Speciation (Service specification). (Step 400) .
The service is specified in terms that include:
Devices (e.g the user device 1 ) - machines that can be programmed and configured remotely
Network-Links (e.g the internet connection 3) - virtual or real connections between devices, that can be programmed and configured remotely, such as the virtual private network client 5 and server 6 managing that link
Endpoints (for example the interface 4 between the device 1 and the link 3) - the port or other point of attachment of a network link to a device
Service Applications 7, 8, 9- single or multiple applications that may be deployed on one or more devices.
The user additionally specifies a non-functional constraints for each component that includes capacity, version, CPU, network throughput, preferred device and security measures (step 401 )
A typical Service specification could include: a target-Security-Score, a Service Description (e.g. Web server running on a host connected to the Internet), and specifications for the Service Applications, network links and devices to be used to provide the service, including memory, and security scoring, any intrusion detection features, CPU capacity etc. Shown in table 1 below is an example of a Security Matrix that can be used to determine the countermeasures required and upgrades infrastructure to support a service.
Table 1 - Security Matrix
Using this service specification as an example, the system would work at a high level as follows. Firstly the service application 8 which is to be installed is analysed to determine whether sufficient resources are available on the target device 1 to run the application. Dependent on the security level required, the application is scanned for vulnerabilities. Different elements can have different target scores, dependent on their perceived risk of exposure to threats. (Figure 4 step 402)
Any critical vulnerabilities that do not satisfy the specified security level (step 403) are fixed (step 404) or, if they cannot be fixed, the analysis process is suspended or cancelled.
The target device 1 is also analysed to determine what vulnerabilities exist in the host operating system, what security countermeasures already exist (firewall 7, intrusion detection), and what network connectivity 3 is in place. Other static/inventory data about the locale, physical security of the device ownership and operation can also be analysed. The analysis is made by consulting a security matrix. A firewall, and vulnerability fixing features, can be added if necessary. For the sake of illustration, if the device is running with no critical vulnerabilities, operated by a trusted partner in a secure location then the device would be given a score of 2. A number of update requirements can be specified for vulnerability scanning and fixing of critical vulnerabilities (step 405).
The process is repeated for other elements of the system. If the application requires the device to be connected to a network, the network links 3 are also analysed. This is obviously not necessary in a standalone system. However, the existence of external links to the device 1 , even if not used by the application to be installed, may affect its security score.
Each link and node in the network 3, 4, 5, 6 is analysed in turn. When the source 1 and destination 2 has connection in place (such as an existing VPN or MPLS service) it can be analysed as a single link. However, if the connection has links that can be influenced by updating intermediary nodes (routes or virtual network functions) the individual network links in the connection are assessed separately. Where a link is already in place and there is provision to extend it to the destination then it is marked as a candidate link. At the same time, factors such as encryption, routing, and ownership of network links are identified. In this example an ADSL link is identified but without any encryption or VPN, so a mandatory update requirement is added. Finally, if a link meets the above criteria and can be fixed then it is marked as a candidate link whilst any shortfalls are identified in mandatory update requirements.
Other assets or requested assets, such as an Internet Service Application 9 or the Internet itself 2 can be analysed and modified in the same way.
We now have a modified Service specification with Mandatory Update Requirements (MAR), and a number of candidate assets that can be used have been identified. Some assets, such as network connectivity or a suitable device, may not have been identified at this point.
The overall service has a target security score, which in this example is set at 3. The most appropriate service application has been identified and its security score analysed (at 2, for
example). In order to raise its score to the target value, update requirements are set, for example Vulnerability-Scanning, Critical-Vulnerability-Fixing, and an NAT-Firewall.
Similarly, the service application is identified as the Internet, and an Analysed-Security-Score is identified for it. In this example we shall assume this meets the target security score so there are no security update requirements. Flowever, a static-1 P-Address has to be allocated.
In this example the network links to be used are analysed to have a security score of 2, against a target of 4 (as previously noted, different elements can have different target scores, dependent on their perceived risk of exposure to threats). In order to meet this requirement, updates may require that the network routing uses a specified route (e.g no links not under the control of the service provider, or all traffic to be within a virtual private network). Finally, the device 1 on which the application to run is assessed, and any update requirements identified such as Vulnerability Scanning and Critical Vulnerability Fixing.
The resulting service application is then re-assessed (step 402, 403) to determine whether it meets the service specification. This may not be the case if, for example, the modifications to the network routing result in an incompatibility with the modifications previously made to the target device. For example, a combination of configuration adaptations made to meet a network security requirement may result in a latency value which is outside specified limits. If this is the case the process is repeated (step 404, 405) until the specification meets all the requirements. The resulting service application is then stored (step 406) ready for delivery to the customer in the form depicted in Figure 1 , with the virtual private network client 5 installed on the device and a corresponding VPN server 6 selected in the internet, together with a suitable firewall 7.
A deployment designer 22 analyses the specified service application and retrieves data to create an Orchestration specification document from that specification. The Orchestration specification document is used by the Infrastructure Management system 23 to orchestrate the actual creation and deployment of application and network assets.
An orchestration specification document can be created using a rule engine as depicted in Table 2. For instance when a server is requested, then based on the conditions (suitability of the target device) a firewall can be installed on either the Target Device or the Upstream Device. Likewise once the application is deployed a static IP address can be created within the network.
Table 2 Orchestration Specification
The Orchestration specification document could take several forms, for example:
i) a pure high level design specification, leading to further interpretation by the Infrastructure Management system later.
ii) a single orchestration technology specification for a standard proprietary orchestrator.
iii) a composite form, whereby orchestration technology specific code elements may be included within a generic orchestration specification.
An orchestration specification flag allows the actual multiple decision logic to be replicated in the Orchestration specification to offer more flexibility at deployment time.
The Infrastructure Management system 23 comprises three main components. The first component is a controller 230 responsible for executing orchestration specifications against underlying technology specific management and orchestration platforms. The controller can be implemented in many ways, for example a scripting approach, in which the orchestration specification is based on a scripting language that can be simply run against a suitable shell,
or node interpreter. An alternative implementation uses an interpretation engine, in which the controller is arranged to interpret the orchestration specification and to interact with lower management and orchestration systems.
The second component is an asset inventory 231 , used to store basic information about devices, existing network links and service applications that are in place prior to the ordering phase. This registry includes management endpoints for controlling the assets.
The third component is a deployment inventory 232, used to record service specifications, Mandatory Update Requirement (MUR) and orchestration specification documents. The deployment inventory is also used to store the actual configuration that is created to satisfy the demand, and which entities and management systems were responsible for setting it up.
Figure 5 shows the complete system. The Infrastructure Management system 23 interacts with a number of existing orchestration and network management systems 24, 25, 26, 27 to deploy services, using respective deployment agents 18, 28, 38 in the various devices and systems 1 , 2, 3. At the same time monitoring agents 19, 29, 39 are installed in the various devices and systems 1 , 2, 3 to provide a live view of device, data centre and network link status.
Claims
1 . A method of deploying applications and virtualised network functions to meet a service specification having a specified security profile, and a plurality of candidate configurations of network resources, devices, applications and functions are assessed for ability to meet the service specification, in which a security analysis is performed of the candidate network configurations, devices and applications to be deployed to implement the service, a configuration of network, devices, applications and functions are selected, and the network resources, devices, applications and functions are adapted to meet the specified security profile prior to deployment.
2. A method according to claim 1 , in which after deployment the selected configuration is monitored to ensure that the system remains compliant with the service specification.
3 A method according to Claim 2, wherein on detection of a network attack or failure a new security profile is generated, the configuration is re-analysed against the new security profile, and the configuration of network, devices and applications is modified to meet the new security profile.
4. A computer-implemented process for controlling a containerisation orchestrator to perform the steps of claim 1 , Claim 2 or Claim 3 by:
a. selecting a candidate application for containerised deployment to a device b. retrieving application software for running the application
c. analysing the application software for vulnerabilities
d. analysing the selected container deployment configuration
e. assessing operational parameters of the device
f. comparing the operational parameters of the device and the container deployment configuration with vulnerabilities identified in the candidate application software, to determine if they are compatible with a predetermined risk score
g. if it is determined that the candidate application is not compatible with the risk score, re-assessing the candidate application for compatibility if adapted with an enhanced security provision, and
h. if such compatibility is identified, controlling the orchestrator to containerise and deploy the candidate application software on the device.
5. A process according to Claim 4, wherein if compatibility is not identified, the orchestrator does not deploy the candidate application software and the analysis steps are repeated using a different candidate application.
6. A process according to any preceding claim, in which an Infrastructure Management system controls one or more orchestration and network management systems to deploy services using respective deployment agents in the network resources and devices.
7. A process according to any preceding claim, in which a user’s specification for end-to- end service is input in the form of applications, network links, devices and security constraints, the specification is analysed against available assets, a deployment design system determines an optimal configuration the optimal configuration of components, and an Infrastructure Management system controls one or more orchestration and control systems to deploy and configure the selected network and operational components.
8. A method according to Claim 7, in which each candidate element of the service resolution is analysed to determine whether sufficient resources are available to run the application on the selected device, and scanned for vulnerabilities, and if any vulnerabilities are identified that do not satisfy the specified security level but can be remedied by modifying the application, such modification is made to the application which is re-assessed for suitability to meet the service application, and if the vulnerability is not capable of remedy the analysis process is suspended and an alternative configuration is analysed.
9. A process according to Claim 7 or Claim 8, in which, in response to user inputs specifying application elements, user devices on which the applications are to be deployed, and a user- defined security levels, a service design processor assembles the application elements into a proposed network, connected to the selected user device
10. A process according to Claim 9, wherein a service level is also specified to define protection required for the application when in service.
1 1 . A process according to Claim 10, wherein analysis of service applications, devices and network links to determine protection required is based on data from one or more of vulnerability scans, authentication data, previous history of use, and performance statistics.
12. A process according to Claim 4, Claim 5, Claim 6, Claim 7 or Claim 8 wherein, after installation of a containerised application, the steps of the process are repeated in response to predetermined device, data centre and network link status conditions to determine if the configuration still meets the deployment policies and, if it does not, to select and deploy an alternative configuration.
13. A process according to Claim 8, in which monitoring agents installed in the network resources and devices provide status data on device, data centre and network link status.
14. A computer system including a processor and a memory storing computer program code for performing the steps of the process of any preceding claim.
15. A computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform the steps of a process as claimed in any of Claims 1 to 13.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/059,356 US20210157927A1 (en) | 2018-05-31 | 2019-04-25 | Networked application orchestration |
EP19718764.4A EP3804261A1 (en) | 2018-05-31 | 2019-04-25 | Networked application orchestration |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18175413 | 2018-05-31 | ||
EP18175413.6 | 2018-05-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019228717A1 true WO2019228717A1 (en) | 2019-12-05 |
Family
ID=62554983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2019/060664 WO2019228717A1 (en) | 2018-05-31 | 2019-04-25 | Networked application orchestration |
Country Status (3)
Country | Link |
---|---|
US (1) | US20210157927A1 (en) |
EP (1) | EP3804261A1 (en) |
WO (1) | WO2019228717A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112040014A (en) * | 2020-11-05 | 2020-12-04 | 武汉慧联无限科技有限公司 | Internet of things system determination method and device, electronic equipment and storage medium |
WO2022033699A1 (en) * | 2020-08-14 | 2022-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Generation of a security configuration profile for a network entity |
US11539735B2 (en) | 2020-08-05 | 2022-12-27 | Cisco Technology, Inc. | Systems and methods for application placement in a network based on host security posture |
US11921885B2 (en) | 2021-06-07 | 2024-03-05 | International Business Machines Corporation | Security risk-aware scheduling on container-based clouds |
CN117850868A (en) * | 2024-01-10 | 2024-04-09 | 中国电子科技集团公司第三十研究所 | Automatic arrangement method of safety protection assembly and safety protection system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11875167B2 (en) | 2020-03-23 | 2024-01-16 | Nubix, Inc. | Method for deploying containerized protocols on very small devices |
US11874692B2 (en) * | 2019-08-16 | 2024-01-16 | Nubix, Inc. | Method for deploying containerized security technologies on embedded devices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3016016A1 (en) * | 2014-10-28 | 2016-05-04 | BRITISH TELECOMMUNICATIONS public limited company | Automated deployment and securitization of model-based composite applications |
US20160156661A1 (en) * | 2014-11-28 | 2016-06-02 | International Business Machines Corporation | Context-based cloud security assurance system |
US20180046457A1 (en) * | 2017-10-26 | 2018-02-15 | Iomaxis, Llc | Method and system for enhancing application container and host operating system security in a multi-tenant computing environment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9503475B2 (en) * | 2012-08-14 | 2016-11-22 | Ca, Inc. | Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment |
US10142204B2 (en) * | 2015-07-27 | 2018-11-27 | Datagrid Systems, Inc. | Techniques for evaluating server system reliability, vulnerability and component compatibility using crowdsourced server and vulnerability data |
WO2017152178A1 (en) * | 2016-03-04 | 2017-09-08 | Bladelogic, Inc. | Provisioning of containers for virtualized applications |
-
2019
- 2019-04-25 WO PCT/EP2019/060664 patent/WO2019228717A1/en unknown
- 2019-04-25 EP EP19718764.4A patent/EP3804261A1/en not_active Withdrawn
- 2019-04-25 US US17/059,356 patent/US20210157927A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3016016A1 (en) * | 2014-10-28 | 2016-05-04 | BRITISH TELECOMMUNICATIONS public limited company | Automated deployment and securitization of model-based composite applications |
US20160156661A1 (en) * | 2014-11-28 | 2016-06-02 | International Business Machines Corporation | Context-based cloud security assurance system |
US20180046457A1 (en) * | 2017-10-26 | 2018-02-15 | Iomaxis, Llc | Method and system for enhancing application container and host operating system security in a multi-tenant computing environment |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11539735B2 (en) | 2020-08-05 | 2022-12-27 | Cisco Technology, Inc. | Systems and methods for application placement in a network based on host security posture |
WO2022033699A1 (en) * | 2020-08-14 | 2022-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Generation of a security configuration profile for a network entity |
CN112040014A (en) * | 2020-11-05 | 2020-12-04 | 武汉慧联无限科技有限公司 | Internet of things system determination method and device, electronic equipment and storage medium |
CN112040014B (en) * | 2020-11-05 | 2021-01-29 | 武汉慧联无限科技有限公司 | Internet of things system determination method and device, electronic equipment and storage medium |
US11921885B2 (en) | 2021-06-07 | 2024-03-05 | International Business Machines Corporation | Security risk-aware scheduling on container-based clouds |
CN117850868A (en) * | 2024-01-10 | 2024-04-09 | 中国电子科技集团公司第三十研究所 | Automatic arrangement method of safety protection assembly and safety protection system |
Also Published As
Publication number | Publication date |
---|---|
EP3804261A1 (en) | 2021-04-14 |
US20210157927A1 (en) | 2021-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210157927A1 (en) | Networked application orchestration | |
US10819590B2 (en) | End-to-end policy enforcement in the presence of a traffic midpoint device | |
US10785252B2 (en) | Apparatus for enhancing network security and method for the same | |
CN109716729B (en) | Dynamic load-based automatic scaling network security microservice method and device | |
US9923928B2 (en) | Automated generation of access control rules for use in a distributed network management system that uses a label-based policy model | |
US9609023B2 (en) | System and method for software defined deployment of security appliances using policy templates | |
US9596251B2 (en) | Method and system for providing security aware applications | |
US9298927B2 (en) | Method and system for providing an efficient vulnerability management and verification service | |
EP3635543B1 (en) | Containerised programming | |
EP3654582A1 (en) | Method and system for secure delivery of information to computing environments | |
US9386048B2 (en) | Method of managing connectivity between resources in a computer network and system thereof | |
US20150128130A1 (en) | Method and system for providing and dynamically deploying hardened task specific virtual hosts | |
Tudosi et al. | Design and implementation of a distributed firewall management system for improved security | |
TW201531880A (en) | Distributed network security using a logical multi-dimensional label-based policy model | |
EP4154144B1 (en) | Cyber attack coverage | |
GB2574241A (en) | Networked application orchestration | |
US7792930B1 (en) | Network device configuration using separate logic and version-based configuration files | |
US20220255901A1 (en) | Devices, methods, and computer-readable media for deploying modular network architecture | |
CN115080180A (en) | Policy management in a target environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19718764 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019718764 Country of ref document: EP Effective date: 20210111 |