VOLTHA Security

Proposed User Stories 5/3/2018 Tom Moore [email protected]

© 2017 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.

VOLTHA Security – Approach for User Stories Questions about security such as Least Privilege in VOLTHA – see https://jira.opencord.org/browse/VOL-278 (Validate Least Privilege Permissions) – lead to a need to address security at a more comprehensive level for VOLTHA As a managed virtualized environment, VOLTHA should derive and leverage security requirements, security architecture, security best practices and open source security solutions from other open communities

• •



ONF is a member of Linux Foundation



In the ONAP project in Linux Foundation, the ONAP requirements for Security, and ONAP architecture and work in progress do provide much of these elements



Some service providers plan to integrate VOLTHA with ONAP. Although a service provider may not deploy VOLTHA under ONAP, the maturity of the ONAP security requirements, and ONAP security solutions being developed in open source provide a good foundation for security requirements and user stories for VOLTHA

References



Amsterdam ONAP Release - VNF Requirements –

• •

specifically VNF Security Requirements (140+)



Beijing ONAP Release - ONAP Application Logging Guidelines



Amsterdam ONAP Release - APPC Logging Guide



ONAP projects for Security, including direction on Open Source – several, see ONAP wiki

• Question at ONF Level – • Should we raise this proposal to a CORD level and/or R-CORD for ONOS, Tenant Apps, XOS?

VOLTHA Security – Proposed EPICs All VNFs within the VOLTHA architecture shall comply with VNF General Security requirements, as identified and aligned to the current ONAP release All VNFs within the VOLTHA architecture shall comply with VNF Identity and Access Management (IDAM) requirements, as identified in the current ONAP release All VNFs within the VOLTHA architecture shall comply with VNF API Security requirements, as identified in the current ONAP release All VNFs within the VOLTHA architecture shall comply with VNF Security Analytics requirements, as identified in the current ONAP release All VNFs within the VOLTHA architecture shall comply with VNF Data Protection requirements, as identified in the current ONAP release VOLTHA transactions that change any configurations or perform any operator actions from any operator or automated interface (CLI, Northbound API, control loop action) should use a Transaction ID (as in ONAP) as a best practice to be able to perform effective security Audit Logging & other Logging Align to the Logging direction requested by Ciena for Log Management –

• • • • • • • •

https://wiki.opencord.org/display/CORD/Application+Logging+Requirements+and+Best+Practices

Note: The ONAP requirements do refer to Network Cloud Service Provider (NCSP) and “Network Cloud” functions, such as the NCSP’s IDAM API. For such requirements, we need to discuss whether and how VOLTHA should provide a reference implementation, such as for IDAM.





In general, users stories should define the delineation or interface to the NCSP implementation from a “core” or reference implementation



For example, the reference implementation of configuration of access levels exists, but allows an NCSP to define and configure up to a certain number of access levels and the definitions of the access levels

BACKUP Analysis of existing Security user stories in VOLTHA 2Q VOLTHA TST 4/10/18

VOLTHA Security - Least Privilege Permissions Purpose – Verify User Story https://jira.opencord.org/browse/VOL-278 (Validate Least Privilege Permissions)

• • •

As an Operator.... I need to validate least privilege access on vOLTHA instances so that centralized NFV cloud resources maintain security compliance.



I need to ensure privilege access for vOLTHA maintenance can not be elevated, so that NFV cloud resources in a multi-tenant environment maintain security compliance

References for addressing concept of Least Privilege (limitation of Access Rights to a minimum level)

• •

https://wiki.opencord.org/display/CORD/Security+in+CORD



"voltha-discuss" group



Thoughts to Verify -



What is the Role-based access definition for VOLTHA? What roles are applicable in VOLTHA from CORD security? Including global (root) operators, infrastructure-specific operators, service-specific operators, service developers, and service tenants (including both end-users and other services)?



vOLTHA instance deployment process



"voltha-discuss" includes discussion of privilege escalation policy used by the installer scripts to setup the cluster



Per the discussion, the installation process includes Ansible playbooks and uses escalation to ‘sudo’



Sergio Slobodrian from Ciena responded that this would eventually change

• •

Should involve a role-based security mechanism from an Ansible controller (for vOLTHA instance)? And/or from the Kubernetes orchestrator (for vOLTHA containers)?

VOLTHA Security – Open in JIRA Audit JIRA for other security functions - Searched “Security”, open items VOL-60 (Execute a nessus scan on a running voltha cluster) VOL-73 (All servers in a voltha cluster must be secured) VOL-262 (SB Communication with the volha suite must be secure)

• • •

VOL-266 , VOL-278, VOL-279



• Questions for other areas of Security (including but not limited to) – •

Should we create a User Story companion to VOL-60 to analyze security perimeter of VOLTHA architecture?



Does VOLTHA need Identity and Access Management (IDAM) requirements?



For example - “audit trail logging” – do we need a User Story?





Is there a concept of a “transaction ID” (passed in API or from operator GUI/CLI) for tracking create/update/delete management actions in VOLTHA? The purpose of “transaction ID” is to support Logging for a historical view of “who did what and when”



Audit trail log only available to administrators



The transaction ID enables an operator to trace and correlate in a Northbound system

Are there other security functions we should capture in User Stories?

VOLTHA Security – Completed in JIRA Audit JIRA for other security functions - Searched “Security”, closed items • • • • • • • • • • • •

VOL-45 (Secure East-west Inter Container communications between all voltha components/containers) VOL-46 (Secure East-west Inter Container communications between all voltha components/containers) VOL-154 (Consul Container comes up with Self-Signed Certificate/Key and SSL Config Files) VOL-155 (Registrator Container comes up with Self-Signed Certificate/Key) VOL-209 (Build Voltha/Consul Container with its own file system) VOL-210 (Build Voltha/Registrator Container with its own file system) VOL-218 (Secure Communication between Chameleon and vOLTHA Core) VOL-219 (Secure Communication between OF-Agent to vOLTHA Core) VOL-264 (REST Channel ( External REST Client <==> Chameleon) needs to be Secured) VOL-265 (NETCONF Channel to vOLTHA in its North Bound needs to be Secured) VOL-267 (Calix Adapter to Calix OLT Communication needs to be Secured) VOL-274 (PONSIM Adapter to PONSIM OLT Communication needs to be Secured)

2018 Agile Teams -

May 3, 2018 - Questions about security such as Least Privilege in VOLTHA – see .... to VOL-60 to analyze security perimeter of VOLTHA architecture?

147KB Sizes 0 Downloads 167 Views

Recommend Documents

Coaching Agile Teams
Wesley Signature Series (Cohn)) - [PDF EBOOK ... Managers in Transition (Addison-Wesley Signature Series (Cohn)) E-Books, Online Coaching ... (Addison-Wesley Signature Series (Cohn)) Online , Read Best Book Coaching Agile Teams: A ...

Read PDF Coaching Agile Teams
Online PDF Coaching Agile Teams: A Companion for ScrumMasters, Agile Coaches, and Project Managers in Transition (Addison-Wesley Signature Series ...