Professional Documents
Culture Documents
BLOCKCHAIN
the underlying principles of Blockchain. We at
Happiest Minds would like to provide a deep dive
into how Blockchain can be used to provide
ENABLED-CLOUD DELIVERED
cloud-based network security. We also have
showcased a list of use-cases that can be used in
NETWORK SECURITY
the context of Software Defined Networking and
proposed a solution that would be agnostic to
network automation frameworks.
INTEGRATION AVAILABILITY
We live in a world that is driven by collaboration and integration The definition of Availability has changed drastically in recent times
and the same holds true for ensuring network security as well. and the bar has been set higher with each iteration. Although
While this collaboration and integration allows for unparalleled availability in an absolute sense would entail 100% availability, a
efficiency of deploying and managing network security in a more popularly accepted yet difficult target is the five 9s or 99.999%
heterogeneous environment, it also poses a significant risk as the availability. There are mechanisms for High Availability which can
lack of a shared identity roster could allow a partner to tamper with ensure the five 9s, however, a lack of secure, reliable and
the sanctity of an entire networks configuration. instantaneous rollback from misconfigurations makes it an arduous
task to recover from outages and ensure business continuity.
SILVER BULLETS TO ADDRESS THE CHALLENGES OF MULTI-LAYER
NETWORK SECURITY
HOW IT WORKS?
Carrier-scale Software
Virtual Network Functions Higher-level services that
Defined Networks (SDNs)
(VNFs) combine VNFs and SDNs
that contain them
OpenECOMP
BSS OSS
INFRASTRUCTURE
PORTAL DESIGN STUDIO DISTRIBUTION Data Collection Security
Data Framework Framework
Resource Onboarding Orchestration Inventory Aggregation
IDENTITY
Design Stream
Agent
Active
Collector
Security
app
Security
app
Design Service Design
MANAGEMENT
Deploy Metadata
Certification
CONFIGURATION
View / Recipies
Report Testing Scheduler
Optimization Analytics SDN & App
MANIPULATION
PREVENTION
Framework Controller
Deploy, Operate, Diagnoze & Remediate Framework
Framework
Admin Service Path IP Address Homing Network
(SPaaS) Management
Analytics Analytics
app app Controller Controller
Placement License
Design Time Shared apps
CONSTANT
Framework
Execution Time
MONITORING
Onboard Framework Configure Collect Collect Collect Execute
SDKs VFs elements Faults Usage Telemetry tests
AND VERIFICATION
Analytics App
Stream Agent
Active
Collector
With Blockchain infrastructure, we can get immutable and independent proof of time and order of configuration events like policy change
configurations, topology change configurations, introduction of new services and changes in existing services. This property can be used to
prevent any tampering of the configuration across the components of the configuration work flow.
Consider the typical work flow of service configuration:
CONCLUSION
Undoubtedly, there are many solutions that can prevent
security breaches. However, none of them are powerful
enough to deter an insider from circumventing these
solutions and removing their trails. Further any incorrect
information of the events, logs and configuration changes
can result in unexpected system behavior with disastrous
consequences.
Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK,
Singapore, Australia and has secured $52.5 million Series-A funding. Its investors are
JPMorgan Private Equity Group, Intel Capital and Ashok Soota.
www.happiestminds.com