The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
CSA Knowledge Sharing Event provides an excellent opportunity for cybersecurity professionals to discuss the latest trends and developments in IT and in the process build a close-knitted cybersecurity community in Hong Kong and Macau. This month we have invited Mr Jack Lau of Dimension Data, to deliver a talk entitled “Software Defined Network and how it can help enhancing Cloud Security”.
In this talk, Mr Lau will help answer these three questions on SDN:
Please do not miss this opportunity to learn from the expert and get connected with your peers.
SDN as defined by the Open Networking Foundation (ONF), is the physical separation of the network control plane from the forwarding plane and where the control plane controls several devices. In traditional, a SDN architecture departs from legacy solutions by building networks from three abstractions or layers. First, the infrastructure layer acts as the foundation for a SDN architecture. The infrastructure consists of both physical and virtual network devices such as switches and routers. These devices implement the OpenFlow protocol as a standards-based method of implementing traffic forwarding rules.
Second, the control layer consists of a centralized control plane for the entire network. The control plane is decoupled from the underlying infrastructure to provide a single centralized view of the entire network. The SDN controller provides this control layer and utilizes OpenFlow southbound to communicate with the infrastructure layer.
Third, the application layer consists of network services, orchestration tools, and business applications that interact with the control layer. These applications leverage open interfaces to communicate with the control layer and the network state. In particular, security vendors can put their effort on this layer to protect and defend the attacks from inside or outside of the network.