5GSEC / nimbus

Intent driven security automation framework
Apache License 2.0
19 stars 9 forks source link

Network Segmentation: Addresses Multiple intents #85

Open nandhued opened 3 months ago

nandhued commented 3 months ago

Generate zero-trust policies generated by the discovery engine based on application behaviour

The attacks that can be mitigated are:

Techniques:

  1. Radio control manipulation via rogue xApps
  2. Trusted Relationship
  3. Registration of malicious network functions
  4. Software Deployment Tools
  5. gNodeB Component Manipulation
  6. Network Sniffing [Tactic: Credential Access]
  7. Adversary-in-the-Middle [Tactic: Credential Access]
  8. Network Sniffing [Tactic: Resource Development]
  9. Adversary-in-the-Middle [Tactic: Resource Development]

Parameters need to be provided such which container is to be isolated

The adapters that are involved are:

KubeArmor, Network Policy, Service Mesh

Design doc

nandhued commented 5 days ago

Document WIP