Factory

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

DEVSECO PS TOOLS

C.D.G. - 1
DEVSECO PS TOOLS

1.- Transition to DevSecOps. 3


1.1.- Why DevSecOps? 3
1.2.- Requirements: To Renew the Entire Data-Center Network. 4
2.- Cibersecurity: Controlling the Applications Supply Chain. 5
2.1.- Responsibilities in the Supply Chain. 5
2.2.- Tools for Each Responsibility. 6
3.- Operator: The Enterprise Cloud. 7
3.1.- A Secure Execution Environment. 7
3.2.- Architecture of an Enterprise Cloud. 7
3.3.- Architecture of a Data-Center. 9
3.3.1.- Operation Layers: Application Deployment 9
3.3.2.- Articulation Layers: Logical Resources Monitoring and Control. 10
4.- Factory: Automating the Applications Development. 11
4.1.- Architecture of Processes In Application Development. 11
4.2.- Tools for Each Process: RedHat Code Ready Portfolio. 12
4.3.- Releasing Applications: Centralized Artifacts Repository. 13
5.- Supplying Means for Production. 14
5.1.- Continuous Delivery Platform. 14
5.2.- Value Chain Structure. 15
5.3.- Risk Mitigation. 16
6.- Bibliography. 17

C.D.G. - 2
DEVSECO PS TOOLS

1.- TRANSITION TO DEVSECOPS.


1.1.- WHY DEVSECOPS?
our pillars are the backbone of motivations that led the United States
Defense Air Forces to carry out a radical modernization of its entire application
production system, which we are trying to identify here:
Shielding the world's largest weapons system within the context of the
imminent Internet of Things by adopting the following principles :
a. USER – Eliminate spoofing, by using a credential system based in SIM
cards instead of passwords (the very same way to be used in the
imminent Internet of Things), similar to a phone line nominal
assignment, evolving towards an electronic ID... with regulations in
constant evolution.
b. USER – Without ease of use, security is not possible: using SIM card
makes many cumbersome measures used to prevent spoofing
unnecessary (memorization of many and complex passwords, frequent
renewal of those passwords, an associated device to authorize
transactions, etc.).
c. PLATAFORM - Closed application execution environment: DevSecOps
platforms are much more controllable systems as they are fully managed
Cibersecurity via software.
d. PLATAFORM – Micro-segmentation greatly reduces the surface area and
exposure time of the data plane. Whitelist policies per service control
visibility between services, minimizing the exposed data surface. In
addition, each front gives access to a fragment of that data surface, and
each refresh of those fronts renews authentication properties, reducing
data exposure time.
e. FACTORY - Continuous analysis of applications behavior: thanks to
security specialists who constantly monitor and correct the behavior of
applications produced by factories.
Software Defined Datacenter (Software Defined {Network & Storage &
Compute}): software-controlled data centers reduce machinery
maintenance costs by up to 60%. It is also called “Data-Center Operating
System” such OpenStack, CloudStack or Network Operating System
(Juniper Apstra, Cisco ACI, Arista CloudVision, Nokia NOS, ONOS,
Cost Reduction
OpenDaylight, Tungsten Fabric).
Release Speed: integrating and automating all factory processes provides
the ability to quickly adapt to all challenges that this new information
society brings.
Continuous
Delivery
a. Guarantees a future evolution in each component across the anatomy of
the platform, being able to evolve at the pace of these cloud
technologies.
b. Discard obsolete systems, reducing maintenance costs of all the legacy
that is piling up in data centers (ie: abandoning virtual machines whose
management complexity means high maintenance costs to the point of
Future Evolution preventing applications to scale; replacing them with containers).

C.D.G. - 3
DEVSECO PS TOOLS

1.2.- REQUIREMENTS: TO RENEW THE ENTIRE DATA-


CENTER NETWORK.
ransition to a DevSecOps methodology mandates to renew data
centers, for three main reasons:

1. Central Control of the Network of Datacenters1: increasing


security criteria and adapting to the imminent internet of things... lead
to centralized application distribution systems and user authentication
across the enterprise cloud, just as mobile phone operators do with
their network resources nationwide.
2. Specific design of each Data-Center to get an actual ‘Software
Defined Datacenter’2 that guarantees future evolution: the
transition to software-controlled computing cannot be done without
specific data center design (either using a data center operating system
over existing machines or replacing old machinery)… eventually
integrating, in the process, the mobile phone authentication systems
into the infrastructure interface (as automobile industry is currently
adopting3). Mobile phone operators expose their user base to network
service providers through an interface (OSA=Open Services Access),
eventually this mechanism can be used in the L0 layer of data centers,
and thus maintain a single centralized SIM-based credential system for
the entire computing ecosystem.
3. Certification of each Data-Center4 before putting into
operations: since it is a compact structure (a platform with all parts
integrated into a coherent whole), the required synergies are essential
to achieve an effective integration testing scaffold capable of evaluating
and versioning the evolution of the platform.

btaining return to such investment implies diversifying the results. In


other words, certify platforms for all possible scenarios (real time in Telco
Clouds, persistence for
Banking, etc.). Therefore, it is
vital to standardize the
interfaces of each layer of the
platform in order to admit any
internal implementation... for
being able to build the same
architecture with different
technological combinations,
according to the strategy to be
followed in each scenario.

1
Lt. Gen. Jack Shanahan (director of Defense Department's Joint AI Center), “the lack
of Enterprise cloud” https://fcw.com/it-modernization/2020/05/pentagons-ai-chief-lack-of-
enterprise-cloud-has-slowed-us-down/196057/
2 ETSI, OSM Hackfest 9, “OSM Architecture and Installation, the Software Defined Datacenter”:
https://osm.etsi.org/wikipub/index.php/OSM9_Hackfest
3 Cibersecurity, “iSIM, eSIM, XDR”: https://www.nokia.com/networks/cyber-
security/cybersecurity-tech-talk/
4 OPNFV, “Certification Testing for Telco Clouds”: https://www.opnfv.org/

C.D.G. - 4
DEVSECO PS TOOLS

2.- CIBERSECURITY: CONTROLLING THE


APPLICATIONS SUPPLY CHAIN.
2.1.- RESPONSIBILITIES IN THE SUPPLY CHAIN.
ecurity in Information Technologies cannot be addressed
without a holistic approach that involves all agents in the application
supply chain. This chapter aims to define the responsibilities of each agent
in this chain. In the next chapter, some proposals for tools to meet these
responsibilities:

• Access, application deployment: network of datacenters, the services


run-time platform and identity system to access the application
ecosystem, involving end to end network automation with associated
access policies.
• Distribution, services homologation: guarantee the deployment
conditions of each service that, like lego pieces, are combined in the
creation of final applications... being supplied and updated, continuously,
through a system of repositories.
• Production, application factories: applications manufacture under
DevSecOps methodology that guarantees standards of stability and
security in end products supplied, which means:
o Data: Data Surface Exposure Design – access policies to the data
associated to each API call.
o Logic: Interfaces Design - visualize the system of dependencies
between services, to keep stable contracts of functionalities offered by
each service.
o Communications: Microsegmentation - whitelisting policies between
services from which each application is made of.
o Container: Encapsulation Design - manage the correct encapsulation
of services in containers for their subsequent distribution.
o Artifacts Certification: Delivery - a system of authorization gates
through the supply chain to speed up the delivery time to production.

C.D.G. - 5
DEVSECO PS TOOLS

2.2.- TOOLS FOR EACH RESPONSIBILITY.


PRODUCTION – Application Factory

Interfaces
Data Container Certification before
Design
Exposure Construction Production
(Dependencies)

Data
Access Continuous
Services NSA & CISA
Policies Authorization
Phylogenetics Methodology
( Visibility to Operate
FE -> BE)

DEPLOYMENT – Data-Center Operator

SIM Card Connection Conditions µSegmentation

Secure Access
eXtended Service Edge
(SASE) Service Mesh Whitelisting
IP Detection Manifest Language per
Multimedia and (End-to-End Network
(Sidecar Service
Subsystem Response Automation for
Container, (Handling
(AAA for SIM (XDR) centrally control and
Platform Exposed data
Cards) (Constant access authorize access to
monitorization) Surface)
scanning) each resource across
the enterprise cloud)

NSA &CISA Methodology, “Kubernetes Hardening Guide” https://www.nsa.gov/Press-


Room/News-Highlights/Article/Article/2716980/nsa-cisa-release-kubernetes-hardening-
guidance/
United States Department of Defense cATO, “Continuous Authorization to Operate”,
https://media.defense.gov/2022/Feb/03/2002932852/-1/-1/0/CONTINUOUS-AUTHORIZATION-
TO-OPERATE.PDF

C.D.G. - 6
DEVSECO PS TOOLS

3.- OPERATOR: THE ENTERPRISE CLOUD.


3.1.- A SECURE EXECUTION ENVIRONMENT.
s shown in last page, cybersecurity relies on two factors: applications
secured by design and a secured execution environment:

• Factory – Application Secured by Design, four elements should be


handled:
o Design of the Logic Plane: APIs and dependencies.
o Design f the Data Plane: access policies.
o Design of application internal communications: whitelisting
policies between services
o Artifacts Encapsulation, instantiation conditions and delivery
mechanisms.
• Data-Center Operator – Application Execution Environment,
operators should deploy an Enterprise Cloud, meaning, the ability to
centrally control all assets (logical and physical) across the network of
data-centers, with associated access policies.

3.2.- ARCHITECTURE OF AN ENTERPRISE CLOUD.


n the picture how telecom operators simulate a centrally controlled
network of five data-centers5 for smoke testing of network services in a single
computer. An enterprise cloud is the required organizational scheme (or
architecture) to have a secure execution environment able to evolve adding
new cybersecurity features, such as SIM authentication or extended detection
and response as well as moving towards federations of applications that
creates distributed applications to reduce data fragmentation, since content
based routing required meta-data design for visibility and data growth.

he architecture of the picture is as follows:

5Enterprise Cloud Simulation :


https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-019-1493-2
C.D.G. - 7
DEVSECO PS TOOLS

• Emulation Layer: Operation infrastructure of the data center


network. Two totally decoupled layers appear:
o Layer L0: NetOps - Software Defined Data-Center... in Telco
Cloud this layer is called VIM (Virtual Infrastructure Manager),
each data center of the network is simulated as OpenStack
inside a virtual machine. In a computing environment, each
data center would consist of a network of kubernetes clusters,
which admits three possible mounting schemes: on physical
machines, on OpenStack or on a Network Operating System
(Arista CloudVision, Juniper Apstra, Cisco ACI, Nokia NOS,
ONOS, OpenDaylight, Tungsten Fabric, etc.).
o Layer L1-L2-L3-L4: GitOps – Continuous Delivery Platform...
the simulation just deploys the virtualized network functions
directly on Docker, without any platform involved. In a
compute environment, this would consist of cluster
configurations, a continuous delivery system (such as
Jenkins), and a service mesh system (such as Istio)
• MANO layer: Articulation of the data center network. Two main
elements:
o MANO Layer: controller that distributes virtualized network
functions throughout the data center network. In computing,
there is no equivalent, each application factory must design a
manager that allows the distribution of its applications to all
the nodes of its business cloud from a single control center.
o VIM Interface: API used by MANO to deploy applications on
each data center (represented by a white dot on each VIM). In
a computing environment, this is a service area controller
capable of managing the network of clusters on each data
center. These service areas are federated and controlled from
a main header: the Universal Networking Fabric 6 (UNF).

n the
picture Nokia
Nuage Networks 7
UNF where the
federation of
service area
controllers can be
clearly appreciated
as well as the main
control header 8
from which access
policies to each
resource of the
network is
centrally setup.

6 UNF, SDN Controllers: https://en.wikipedia.org/wiki/List_of_SDN_controller_software


7 Nokia, The Universal Networking Fabric: https://onestore.nokia.com/asset/212701
8 OVH Installs Nuage SDN for OpenStack as a Service, https://convergedigest.com/ovh-installs-

nuage-sdn-for-openstack-as/
C.D.G. - 8
DEVSECO PS TOOLS

3.3.- ARCHITECTURE OF A DATA-CENTER.


3.3.1.- OPERATION LAYERS: APPLICATION D EPLOYMENT

Continuous
Delivery Platform

https://p1.dso.mil

Software Defined
Data-Center (UNF)

https://www.cloud.mil/

C.D.G. - 9
DEVSECO PS TOOLS

LAYER GOAL TECHNOLOGIES


L0 • Physical Hosts: deploy and control of • Cisco Application Centric
Infrastructure federations of clusters of computers from a Infrastructure (ACI)
(IaaS) central header. L0 methodologies usually • Juniper Apstra
called NetOps that produce “Infrastructure • Arista CloudVision
as Code”. • Nokia Data-Center Fabric
• ONOS, OpenDaylight
• Tungsten Fabric
• OpenStack, CloudStack
L1 • Logical End Points: instantiate pods (with • RedHat OpenShift
Plataform associated containers) of a service over a • Novell Rancher
(PaaS) cluster provided by L0 infrastructure layer. • Canonical Charmed
Kubernetes
• VM Ware Tanzu
L2 • Services: continuous provisioning and • Helm Chart
CI/CD update of services deployed over logical end • RedHat OpenShift Pipelines
points (usually several front-ends and one • Tekton
back-end) provided by L1 platform. • Jenkins, Jenkins X
• ArgoCD, GitLab
L3 • Application: automate the deployment of • RedHat OpenShift Service
Service Mesh all services that compose an application Mesh
(with his six main strategies: recreate, • Istio
ramped, blue/green, shadow, canary, a/b • Traffik
testing) with monitoring and log handling, in
other words, to assemble all services
provided by L2 continuous delivery system.
L4 • Applications Ecosystem: system of • RedHat OpenShift
Serverless contexts to create integration models for Serverless
(FaaS) application design, meaning, create the • Knative
environment to easily create ecosystems of
applications, just as application servers
does.

3.3.2.- ARTICULATION LAYERS: L OGICAL RESOURCES MONITORING AND


CONTROL.

rticulation layers centrally monitor and control the ecosystem of


services-oriented applications. In latter page picture, it is represented by a
double blue arrow labelled as “Continuous Monitoring”, meaning that these
layers are transversals across operation layers, in other words, they
coordinate operations across all layers of the structure to easily manage the
ecosystem of services. While the physical resources are handled by SDN
controllers on each data-center, the logical ones are controlled by an
application controller on each data-center with following responsibilities:
LAYERS GOAL TECNOLOGIES
A0 • CMP – Continuous Monitoring Platform: central • Kiali
Coreography control of a federation of services meshes across the • Sidecar Container
Ecosystem of data-center. Monitoring is based on side-car Security Stack
Services container, which integrates logs information with • D2IQ
(Outband) HTTP monitoring tools (such Jaeger).
A1 • SDP – Service Deployment Platform: bootstrap • RedHat Advanced
Orchestration sequencing of the continuous delivery platform and Cluster Manager
Service Life centrally control deployments: 1) creation • Open Cluster
Cycle and 2) initialization of the network of clusters, Management
(Inband) 3) assign pipelines for artifacts deployment to • D2IQ
different clusters across the network; 4) start the
continuous monitoring platform.
C.D.G. - 10
DEVSECO PS TOOLS

4.- FACTORY: AUTOMATING THE APPLICATIONS


DEVELOPMENT.
4.1.- ARCHITECTURE OF PROCESSES IN APPLICATION
DEVELOPMENT.
he starting point would be to standardize the structure of
processes involved in a DevSecOps factory9 through European
institutions such ETSI.
rom a well-defined structure of responsibilities, the tools 10 that each
process needs to perform its duties successfully emerge. Depending on the
type of applications produced by each factory, a different toolbox would be
required.
n the picture, a summary of the most common tools in each stage of
the application production lifecycle.

ecurity11 must be present in every stage of the DevOps life cycle


applied by software factories, however, since an holistic approach involving
the entire software supply chain is required; both decision-making on
measures to be applied at each stage by the different factories, and
performance evaluation of these security measures with the associated
corrective tasks, are carried out by a process in parallel to the production
one... specialized in improving the computer security of each application
independently, as well as together within the ecosystem of applications where
it will be integrated.

9 IBM RedHat Secure Software Factory: http://redhatgov.io/workshops/secure_software_factory/


10 Michael Bryzek, Design Microservices the Right Way: https://youtu.be/j6ow-UemzBc
11 Nokia Berlin Security Centre, application security analysis and continuous improvement:

https://youtu.be/JIEoRChIus8
C.D.G. - 11
DEVSECO PS TOOLS

4.2.- TOOLS FOR EACH PROCESS: REDHAT CODE READY


PORTFOLIO.
n the picture the integrated Application Development Suite for a
DevOps methodology being developed by RedHat, whose trade name is
RedHat Code Ready12.

he suite is not complete, and needs to be extended with other tools,


especially API validation13, dependency analysis14 and micro-segmentation.
This implies a complex evaluation process until all these tools are successfully
integrated into a final solution from which to create a single working
methodology for the entire factory (similar to Metric v315 in Spanish State
administrations)

• Red Hat CodeReady Workspaces & Eclipse Che: Eclipse


based IDE to work with Kubernetes.
• Red Hat CodeReady Containers: laptop OpenShift cluster
deployment.
• Odo: CLI to automate deployments abstracting all the technical
aspects of Kubernetes. It can be integrated into Eclipse
• Red Hat OpenShift developer console.
• OpenShift Pipelines and Tekton for CI/CD.
• OpenShift Serverless and Knative.
• VS Code / IntelliJ: alternative IDEs.
• Red Hat CodeReady analytics: dependencies check.
• Red Hat CodeReady toolchain.

12 Developer Tools, RedHat Code Ready Roadmap:


https://developers.redhat.com/summit/2020/developer-tools-codeready-roadmap
13 API Builder: https://www.apibuilder.io/
14 Endor Labs, dependencies monitoring: https://www.endorlabs.com/
15 Metrics v3:

https://administracionelectronica.gob.es/pae_Home/pae_Documentacion/pae_Metodolog/pae_Metrica_v3
.html
C.D.G. - 12
DEVSECO PS TOOLS

4.3.- RELEASING APPLICATIONS: CENTRALIZED


ARTIFACTS REPOSITORY.
n the picture how US Department of Defense distribute services across
his ecosystem of software factories through the repositories RepoOne16 source
code repository and IronBank17 artifacts repository.

actories release a source code verified by a continuous authorization


system. Then, a certification process (image below) builds, using the source
code, the artifacts to be distributed and deployed in clusters. In development
environments, there is no certification, instead the process is automated: a
build CI/CD pipeline (which transforms the source code into artifacts) is linked
to a deploy GitOps pipeline (that automatically instantiate artifacts throughout
different clusters). In order to automate the process, the possible artifacts
used by deploy pipelines is limited and standardized.
RELEASE… SOURCE CODE BUILD… ARTIFACTS

16 Repo One, DoD Centralized Source Code Repository (DCCSCR):


https://repo1.dso.mil/dsop/dccscr
17 Iron Bank, DoD Centralized Artifacts Repository (DCAR): https://docs-
ironbank.dso.mil/overview/
C.D.G. - 13
DEVSECO PS TOOLS

5.- SUPPLYING MEANS FOR PRODUCTION.


5.1.- CONTINUOUS DELIVERY PLATFORM.
he factories of all industries require sophisticated machinery for being
able to produce what they must supply to society. In case of application
factories, these are continuous delivery platforms that allow service-oriented
applications to be deployed.
n computing, there is an anomaly consisting on application factories
having the daunting task of assembling their own DevSecOps platforms, in
other words, they need to manufacture, not only the application, but also the
platforms in which these applications run. A task that they tackle without any
guidance and based on millions of different pieces provided by open source.
Both data center operators and application factories have two possibilities:
either subscribe to large capacity platforms (such as Amazon); or build their
own proprietary platforms with low performance and doubtful future viability.
enting computing shared by millions of users (such Amazon) to host
critical business logic is not a safe practice. Therefore, to reduce costs,
operators shuffle complex balances between what part is hosted on external
servers (such as Amazon), and what part on a more secure private platform,
but with few capabilities and high cost.
he end result of these hybrid structures, made up of scraps not
designed to be integrated into a final structure (and often incompatible with
each other and/or unfeasible in the long term) are platforms difficult to
operate and maintain, with serious safety problems and exorbitant costs.
he need arises to establish a value chain capable of supplying
this type of platforms, both to application factories and data center
operators, avoiding all the security risks involved in renting shared
computing capacity, in addition to simplifying the management of these
platforms with specialized designs, greatly reducing operating and
maintenance costs.
n the aeronautics sector, there is the exceptional condition of designing
together both the factory as well as data center operator environments, which
makes it privileged for the integration of an end solution capable of solving all
cybersecurity
issues at once;
thus serving as a
reference for a
new software
applications
industrial fabric,
the only way to
address the
dilemma of
European digital
sovereignty

C.D.G. - 14
DEVSECO PS TOOLS

5.2.- VALUE CHAIN STRUCTURE.

STAGE GOAL DESCRIPTION


• Architecture – System Model: Standardization

1 institutions, such as ETSI, coordinate the entire productive


ecosystem thanks to a single system model for the platform,
taking as a starting point the manufacturing specifications of
the Cloud One and Platform One platforms of the United
States Department of Defense, available online for the public.
Architecture
• Design – Platform and Components Factories: two

2 decoupled pieces:
o L0 – NetOps - Software Defined Data-Center: the physical
infrastructure of these platforms. There are several
solutions on the market, including Nokia Datacenter
Fabric, the advantage is not having vendor lock-in
(telecom operators must use a mix of manufactures in
their Telco Clouds, including OpenStack).
Design o L1-L2-L3-L4 – GitOps - Continuous Delivery Platform:
there is only one solution on the market that contemplates
the four layers of continuous delivery (Kubernetes, CI/CD,
Service Mesh y Serverless): RedHat OpenShift.
• Testing – Platform Homologation: certification testing

3 scaffolds to evaluate the different technological options,


establishing infrastructure models for the different use cases,
allowing versioning of each evolution path. OPNFV certifies
5G core networks over Telco Clouds, being Fraunhofer
Certification Institute its most prominent representative.
• Customer – System of Needs: The evolution depends on

4
the guidelines coming from the system of needs: the
application factories and the data center operators of the
different economic activities. The collaboration of strategic
sectors is required, such as banking, telecommunications or
Deployment aeronautics.

C.D.G. - 15
DEVSECO PS TOOLS

5.3.- RISK MITIGATION.


ndividual companies that already tried to solve this challenge, such as
Sun Microsystems, disappeared because of the high risk involved in such
investment: the threshold for a commercially viable product is too high, it is
easy to get stuck. Critical business data has a natural inertia to change.
ventually, the reason why current investment is focus on establishing
different Theme Parks where massive advertising provides quick return on
investment, to the detriment of investments in the legitimate use of
computing, which is nothing more than alleviating the administrative tasks.
t becomes vital, then, to locate a methodology that overcomes all the
difficulties involved in the production of this vital machinery. A risk similar to
that assumed by IBM when it miniaturizes first computers, but resulting in a
90% market shared.
n this case, research starts from an already established base: the
standards developed by the United States Department of Defense for all its
application factories (Cloud One and Platform One). The research area is much
smaller compared to the case of IBM and with some economic sectors forced
to follow the very same path of Defense Air Force of United States for national
security reasons.
ocating a methodology that mitigates risks means analyzing the point
of view of each agent involved in this production process:
➢ Data-Center Operators – The Needs: as responsible for critical
business data they will only invest in adopting new systems if they
present very compelling advantages that worth the effort of adoption.
Eventually an open process (similar to the Java Community Process) on
a testing infrastructure, where the operators can evaluate the
prototypes in addition to expressing their needs for their improvement,
can speed up product acceptance times.
➢ Manufacturing Ecosystem – The Interests: computing is a recent
sector, unconsolidated, compared to telecommunications or
aeronautics. In other words, there is no tradition of coordination, there
is no business model that guarantees greater benefits than working in
competition. Just the economic sector that must update their
application production environments can be the starting point for an
ecosystem that will grow and diversify for a future miniaturization of
these data centers, the only effective way for their democratization.
➢ Standardization Institutions – The Costs: data center operators
suffer from certain symptoms. However, only an understanding of the
entire production system is capable of accurately diagnosing the causes
of these symptoms, which translates into minimizing the costs of
resolving the needs raised, guaranteeing future viability of the entire
production process. Public financing gives the necessary stability to this
process of normalization of the structure, reducing the risks of a lack of
government model.

C.D.G. - 16
DEVSECO PS TOOLS

6.- BIBLIOGRAPHY.

STATE OF ART
IBM Secure Software Factory http://redhatgov.io/workshops/secure_software_factory/
Thomal Erl, SOA: Analysis and Design https://www.arcitura.com/books/
for Services and Microservices
MuleSoft Microservices https://youtu.be/SouNISAnXlo
Universal Networking Fabric, List of https://en.wikipedia.org/wiki/List_of_SDN_controller_software
SDN Controllers
Cloud Landscape https://landscape.cncf.io/
IDC, Cloud Centric Infrastructures https://info.idc.com/cloud-centric-digital-infrastructure-
infographic.html
David Cheriton: Arista/Apstra OS https://youtu.be/LA_LEdV8Cq4
Nokia, The Universal Networking https://onestore.nokia.com/asset/212701
Fabric
Dimitri Stiliadis, Nokia Nuage https://youtu.be/O7UrGrjnYV4?t=88
Networks architect
Microservices Architecture https://youtu.be/j6ow-UemzBc
CHALLENGES
Stanford, Cloud Strategies http://web.stanford.edu/class/cs349d/
Stanford, Zero Trust https://youtu.be/ooAPzzYkyaE?t=3593
Discussion
Rawlinson Ribera, VM Ware, https://youtu.be/dFySwm2bKTg?t=220
Data Fragmentation
EUROPE, DIGITAL SOVEREIGNTY
GAIA-X https://www.data-infrastructure.eu/GAIAX/Navigation/EN/Home/home.html
Oliver Wyman https://www.expansion.com/economia-
digital/2020/11/22/5fba2e48e5fdea66688b458c.html

PROJETS OF REFERENCE
Data-Center OS https://cs.stanford.edu/~matei/papers/2011/hotcloud_datacenter_os.pdf
Platform One, Air Force https://p1.dso.mil/#/
Karl Isenberg, D2IQ https://www.youtube.com/watch?v=qku6ilFG5RM
Java Community Process https://www.jcp.org/en/home/index

FRAGMENTED PRODUCTION ECOSYSTEM


Giuseppe Carella, FOKUS https://youtu.be/nybxtzYY0NU?t=2271

TELCO CLOUD
OSM ETSI https://osm.etsi.org
OPNFV Pharos Lab https://www.opnfv.org/community/projects/pharos
Enterprise Cloud https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-019-1493-2
Simulation
RESEARCH LINES
Single Unix Specification https://es.wikipedia.org/wiki/Single_Unix_Specification
Constellation System https://en.wikipedia.org/wiki/Sun_Constellation_System
INCOSE, International Council https://www.incose.org/
for Systems Engineering

C.D.G. - 17

You might also like