Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture
During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances...
Saved in:
Published in | 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1; pp. 1255 - 1260 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2015
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/Trustcom.2015.514 |
Cover
Loading…
Abstract | During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture. |
---|---|
AbstractList | During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture. |
Author | Jaeger, Bernd |
Author_xml | – sequence: 1 givenname: Bernd surname: Jaeger fullname: Jaeger, Bernd email: bernd.jaeger@nokia.com organization: Security Res., Nokia Networks, Munich, Germany |
BookMark | eNptjN9KwzAcRiMoqLMPIN7kBVrzP413o2w6GA5c9XYk6a8u4NKRpuDeXlEvvfo4cM53jc7jEAGhW0oqSom5b9M0Zj8cKkaorCQVZ6gwuqZCaa6NZOoSFeMYHFHE1IZQc4WOW_BTCvmEN8nvYczJ5iE94FXMaegmH-I7tvhfCYeI8x5wM8QMnxkP_Q8u2u0KPy_f8Av0kCB6wPPvKmTweUpwgy56-zFC8bcz9LpctM1Tud48rpr5ugxM0FyymmvVU8UEI9YLz-tagLCuBtmDZ5pp57RWnSK2M8wJZ6TnnRKEGWcJSD5Dd7-_AQB2xxQONp12mgspGONfAidcyg |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/Trustcom.2015.514 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467379526 1467379522 |
EndPage | 1260 |
ExternalDocumentID | 7345422 |
Genre | orig-research |
GroupedDBID | 6IE 6IL ALMA_UNASSIGNED_HOLDINGS CBEJK RIB RIE RIL |
ID | FETCH-LOGICAL-i241t-28376f162420ac4c3884e4ab8e5fec2727bb776d60ad92b4b95c3d64029ba0e53 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:49:30 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i241t-28376f162420ac4c3884e4ab8e5fec2727bb776d60ad92b4b95c3d64029ba0e53 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7345422 |
PublicationCentury | 2000 |
PublicationDate | 2015-08 |
PublicationDateYYYYMMDD | 2015-08-01 |
PublicationDate_xml | – month: 08 year: 2015 text: 2015-08 |
PublicationDecade | 2010 |
PublicationTitle | 2015 IEEE Trustcom/BigDataSE/ISPA |
PublicationTitleAbbrev | TrustCom |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib060989019 ssib048751292 |
Score | 1.780239 |
Snippet | During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1255 |
SubjectTerms | Automation Cloud computing Context Firewalls (computing) Network Function Virtualization Network topology Security Orchestrator Telco Cloud Virtualization |
Title | Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture |
URI | https://ieeexplore.ieee.org/document/7345422 |
Volume | 1 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF2sp57aoqXf7KHHJuZjd5P0VoqiBW1BLd5kd7MBKUSRBKS_vjObmErx0FsS9rDMLPtmMvPeEPKYMT8yPNMOj1NIUJSKHJVpyFqNkVwnKAmFBOfxRAzn7G3BFy3y1HBhjDG2-cy4-Ghr-elal_irrBeFjLMALtwTSNwqrtb-7GDcDdDVQLXwkhigLqkLmb6X9GZIYsAWEcA87nLk7RwMVLF4Mjgj4_1OqjaSL7cslKu__4g0_ner56T7y9yjHw0mXZCWyTtkM62H1NH3rZ2PZUvrz3SEXeppqWEllfToIrrKKYSI1IpY7Qq6zuxrfzYd0cngkzY6tfTloCLRJfNBf_Y6dOpJC84KELxwUAJHZD5yRTypmQ7jmBkmVQxuNDqAGAecGIlUeDJNAsVUwnWYCsg9EyU9w8NL0s7XubkiFK4MkQaQohswAENiLoYZTMZMcU9y_5p00FrLTSWmsawNdXP88y05RW9VHXd3pF1sS3MPUUChHqz7fwDeYLLb |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1KPehJpRW_3YNHkybpbj68ibS02lahqfRWdjcbKEJaSgLir3dmk8YiPXhLwh6WmWXfTGbeG0LuU-YGmqfK4mECCYqUgSVTBVmr1oKrCCWhkOA8nviDGXuZ83mDPNRcGK21aT7TNj6aWn6yUgX-KusEXcaZBxfuAUcybsnW2p4ejLwBvGqw9p0oBLCLqlKm60SdGGkM2CQCqMdtjsydnZEqBlH6x2S83UvZSPJpF7m01fcfmcb_bvaEtH-5e_S9RqVT0tBZi6yn1Zg6-rYxE7JMcf2RDrFPPSkUrKSC7l1ElxmFIJEaGauvnK5S89qLp0M66X_QWqmWPu3UJNpk1u_FzwOrmrVgLQHDcwtFcPzURbaIIxRT3TBkmgkZgiO18iDKATcGfuI7Iok8yWTEVTfxIfuMpHA0756RZrbK9DmhcGn4iQdJugYDMKTmYqDBRMgkdwR3L0gLrbVYl3Iai8pQl_s_35HDQTweLUbDyesVOULPlf1316SZbwp9AzFBLm_NUfgBXyW2Iw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+Trustcom%2FBigDataSE%2FISPA&rft.atitle=Security+Orchestrator%3A+Introducing+a+Security+Orchestrator+in+the+Context+of+the+ETSI+NFV+Reference+Architecture&rft.au=Jaeger%2C+Bernd&rft.date=2015-08-01&rft.pub=IEEE&rft.volume=1&rft.spage=1255&rft.epage=1260&rft_id=info:doi/10.1109%2FTrustcom.2015.514&rft.externalDocID=7345422 |