Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture

During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1; pp. 1255 - 1260
Main Author Jaeger, Bernd
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2015
Subjects
Online AccessGet full text
DOI10.1109/Trustcom.2015.514

Cover

Loading…
Abstract During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture.
AbstractList During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture.
Author Jaeger, Bernd
Author_xml – sequence: 1
  givenname: Bernd
  surname: Jaeger
  fullname: Jaeger, Bernd
  email: bernd.jaeger@nokia.com
  organization: Security Res., Nokia Networks, Munich, Germany
BookMark eNptjN9KwzAcRiMoqLMPIN7kBVrzP413o2w6GA5c9XYk6a8u4NKRpuDeXlEvvfo4cM53jc7jEAGhW0oqSom5b9M0Zj8cKkaorCQVZ6gwuqZCaa6NZOoSFeMYHFHE1IZQc4WOW_BTCvmEN8nvYczJ5iE94FXMaegmH-I7tvhfCYeI8x5wM8QMnxkP_Q8u2u0KPy_f8Av0kCB6wPPvKmTweUpwgy56-zFC8bcz9LpctM1Tud48rpr5ugxM0FyymmvVU8UEI9YLz-tagLCuBtmDZ5pp57RWnSK2M8wJZ6TnnRKEGWcJSD5Dd7-_AQB2xxQONp12mgspGONfAidcyg
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/Trustcom.2015.514
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467379526
1467379522
EndPage 1260
ExternalDocumentID 7345422
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIE
RIL
ID FETCH-LOGICAL-i241t-28376f162420ac4c3884e4ab8e5fec2727bb776d60ad92b4b95c3d64029ba0e53
IEDL.DBID RIE
IngestDate Wed Aug 27 02:49:30 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-28376f162420ac4c3884e4ab8e5fec2727bb776d60ad92b4b95c3d64029ba0e53
PageCount 6
ParticipantIDs ieee_primary_7345422
PublicationCentury 2000
PublicationDate 2015-08
PublicationDateYYYYMMDD 2015-08-01
PublicationDate_xml – month: 08
  year: 2015
  text: 2015-08
PublicationDecade 2010
PublicationTitle 2015 IEEE Trustcom/BigDataSE/ISPA
PublicationTitleAbbrev TrustCom
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib060989019
ssib048751292
Score 1.780239
Snippet During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function...
SourceID ieee
SourceType Publisher
StartPage 1255
SubjectTerms Automation
Cloud computing
Context
Firewalls (computing)
Network Function Virtualization
Network topology
Security Orchestrator
Telco Cloud
Virtualization
Title Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture
URI https://ieeexplore.ieee.org/document/7345422
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF2sp57aoqXf7KHHJuZjd5P0VoqiBW1BLd5kd7MBKUSRBKS_vjObmErx0FsS9rDMLPtmMvPeEPKYMT8yPNMOj1NIUJSKHJVpyFqNkVwnKAmFBOfxRAzn7G3BFy3y1HBhjDG2-cy4-Ghr-elal_irrBeFjLMALtwTSNwqrtb-7GDcDdDVQLXwkhigLqkLmb6X9GZIYsAWEcA87nLk7RwMVLF4Mjgj4_1OqjaSL7cslKu__4g0_ner56T7y9yjHw0mXZCWyTtkM62H1NH3rZ2PZUvrz3SEXeppqWEllfToIrrKKYSI1IpY7Qq6zuxrfzYd0cngkzY6tfTloCLRJfNBf_Y6dOpJC84KELxwUAJHZD5yRTypmQ7jmBkmVQxuNDqAGAecGIlUeDJNAsVUwnWYCsg9EyU9w8NL0s7XubkiFK4MkQaQohswAENiLoYZTMZMcU9y_5p00FrLTSWmsawNdXP88y05RW9VHXd3pF1sS3MPUUChHqz7fwDeYLLb
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1KPehJpRW_3YNHkybpbj68ibS02lahqfRWdjcbKEJaSgLir3dmk8YiPXhLwh6WmWXfTGbeG0LuU-YGmqfK4mECCYqUgSVTBVmr1oKrCCWhkOA8nviDGXuZ83mDPNRcGK21aT7TNj6aWn6yUgX-KusEXcaZBxfuAUcybsnW2p4ejLwBvGqw9p0oBLCLqlKm60SdGGkM2CQCqMdtjsydnZEqBlH6x2S83UvZSPJpF7m01fcfmcb_bvaEtH-5e_S9RqVT0tBZi6yn1Zg6-rYxE7JMcf2RDrFPPSkUrKSC7l1ElxmFIJEaGauvnK5S89qLp0M66X_QWqmWPu3UJNpk1u_FzwOrmrVgLQHDcwtFcPzURbaIIxRT3TBkmgkZgiO18iDKATcGfuI7Iok8yWTEVTfxIfuMpHA0756RZrbK9DmhcGn4iQdJugYDMKTmYqDBRMgkdwR3L0gLrbVYl3Iai8pQl_s_35HDQTweLUbDyesVOULPlf1316SZbwp9AzFBLm_NUfgBXyW2Iw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+Trustcom%2FBigDataSE%2FISPA&rft.atitle=Security+Orchestrator%3A+Introducing+a+Security+Orchestrator+in+the+Context+of+the+ETSI+NFV+Reference+Architecture&rft.au=Jaeger%2C+Bernd&rft.date=2015-08-01&rft.pub=IEEE&rft.volume=1&rft.spage=1255&rft.epage=1260&rft_id=info:doi/10.1109%2FTrustcom.2015.514&rft.externalDocID=7345422