SlideShare a Scribd company logo
1 of 8
Download to read offline
-
-
-
-
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and power
efficiency meet or surpass corporate and industrial requirements, and research
companies announce the dawning of the Private 4G and 5G era. In fact, some
researchers point out that the market for private 5G shall be bigger than public 5G.
But this should be taken with caution, as networks are built and players evolve, there
are still no winners on this race.
Focusing on 5G, the first decision for Corporate Management is not a simple “Make
or Buy”, but rather how much responsibility I want on the network deployment and
management and how much segregation does my business require?
Enterprise migration to a much more flexible wireless network which may be built
and optimized for latency, low energy consumption or throughput (not the main
motivator) according to specific requirements is expected. Next step is planning
this migration.
PRIVATE 5G NETWORKS
(AND HOW TO SECURE
THOSE)
secgen.com
Main options so far are:
Procure a Private Network from a local MNO (which has several models on itself)
Procure a “NPN As a Service” from a Vendor/Hyperscaler and deploy only 5G NR
elements, possibly using public spectrum
Buy a full Private Network which will be deployed on premises and require 24x7
support with a good SLA.
Each one brings security challenges and, as a minimum, companies need to follow
their due diligence towards their supply chain, validating that service providers’
security measures are in place and any breaches must be reported to customer,
on contract.
Model
PNI-NPN
NPN as A Service
NPN
Enterprise Responsibilities Provider Responsibilities Security
Enterprise or industrial
endpoints, evaluating and
monitoring Security of
MNO
Enterprise or industrial
endpoints, evaluating and
monitoring Security of
Service Provider.
Also Management and
Operation of RAN elements
and some Core elements
(e.g.: UPF) depending on
the integration scenario.
Both IT/OT and Telco
solutions
All Mobile Network
Infrastructure, availability,
Security Lifecycle and
endpoint activation.
This is the only option
where spectrum is already
paid for. The others may
incur on additional costs
or use of shared frequen-
cy bands
Usually, 5G Core Functions
and RAN control.
This may not be the best
fit for big plants or
company campuses, but
rather useful for smaller
business.
Software/Hardware
Delivery and Support
100% on MNO
to provide the
Security but
Enterprise
must validate
and, when
applicable,
audit.
Shared,
according to
the integration
level.
100% on
Enterprise
MNO Private Network Offer (PNI-NPN)
secgen.com
This is for sure the fastest and low-touch option in case your site already has 5G
coverage. Used for both industry and logistics companies (warehouses and ports, for
instance), the level of delegation may vary from 100% as a Service to just the 5G radio
part, as shown in Ericsson’s value proposition reproduced below.
One company may just pay for a slice using dedicated resources from the MNO (T1),
might decide to build its own RAN (T2) and so on. Even on T6 model, the company may
buy project, operation and support from the Operator, which in some countries act as
the solution Integrator as well.
5G As a Service (or NPNaAS)
Hyperscalers proposals roam between T2 and T3 models, depending on the company
requirements, especially local data breakout for accessing internal systems and/or
Internet with low latency and high capacity.
In some cases, Hyperscalers might try also to host those systems as an additional
service.
On
Enterprise
premise
Ericsson
components
Reuse of MNO network assets
T1
Total slicing
T2
Local RAN +
Core slicing
T3
T2 + Local data
breakout
T4
T3 + PTT
T5
T4 + Unified
Communications
T6
Full network
on premise
(isolated)
Integrated Deployment Isolated
Deployment
RAN
Outdoor/indoor
EPC
RAN
Outdoor/indoor
RAN
Outdoor/indoor
RAN
Outdoor/indoor
RAN
Outdoor/indoor
EPC EPC EPC
Push to Talk Push to Talkj +
IMS
Push to Talkj +
IMS
HSS HSS
Only Local
management
Private 5G Network (NPN)
secgen.com
The case for T6 may be somewhat rare because just a few scenarios that really
require it:
Law enforcement communication networks for events: Available independent of
public network load, specific privacy requirements, etc.
Agricultural plants so big that are poorly covered or even not covered by public
networks. Although those might be surprised by some specific initiatives from
both MNOs and heavy machinery vendors
Mining plants which require kilometers of indoor coverage
Owning a network means Operational Costs that may be equivalent or bigger than
paying for it “as a service”.
Also, depending on the country, companies must pay for a spectrum license or use
shared spectrum subject to future interference as new networks and services are
implemented. When you consider the logistics use case, spectrum licensing across
many sites may become a burden as well.
Security of a Private 5G Network
There are many security features available from the specification. Enterprise and
industry must assure they are enabled on their environments. For a non-exhaustive
list:
SUPI concealing, meaning that the unique Id of a subscription and its keys are not
openly transmitted on the air interface.
IPSec enabled for Backhaul to assure no interception is possible between RAN and
Core. Even more relevant if your Core is hosted externally.
Encrypt both Control and User Plane on the Air Interface to assure confidentiality
and integrity of transmitted data.
Security Process
secgen.com
Possibly the hardest part on private networks is to keep those safe for the entire
lifecycle. This may become a relevant argument for PNI-NPN and NPNaAS, since the
technology keeper must assure the integrity and availability of assets from:
Our research has identified threats to the 5G Core not covered by the Standards and
that must be taken in consideration. We may support MNOs for a safer 5G Service
Telco Cloud Security recommendations also apply since 5G is Cloud Native.
In a nutshell, Telco Cloud is the base virtualization infrastructure that makes 5G viable.
It supports all Core Functions and recently a huge part of the RAN, in case Open RAN
is implemented. Nevertheless, technologies were not re-created but instead
absorbed from IT Virtualization vendors, as well as COTS x86 servers and Data
Switches.
All those parts and its Management and Orchestration layers add complexity to the
5G ecosystem as well as further domains for Vulnerability Management.
For details and additional insights, specific articles we have written on the subject are
available.
Onboarding of new Functions or releases
Hardening of OS, Hypervisors, Management Systems and VNFs
Assuring the designed Network Architecture is kept and evolve according to new
requirements
SOC integration and active monitoring
Robust Change Management and Vulnerability Management processes
secgen.com
All those tasks are complex, and even more because several vendors are used on the
building of a 5G Network. Not all companies might want to build a new team or
specialize a current one in Telecom Networks and Telecom Security. The latter is so rare
that we are usually requested to recommend or support on the hiring of new
professionals even for MNOs.
The usage of Private 4G/5G in Industry includes new elements and borders to be
Assessed for Security:
Industrial risks
IT environment
security assessment
Pentesters
Team 2
External pentest
Internal pentest
Social engineering
4g/5g security assessmet
Wireless
Local users
OT environment
Local network
point
of access
point
of access
point
of access
Pentesters
Team 1
OT environmenmt
security assessment
Internet
The usual temprary glimpse on service or traffic speed noticed sometimes in heavily
loaded Public Networks are a nuisance for subscriber during special events such as
New Year’s Eve or huge concerts. While serving an industrial plant, the lack of availability
or capacity for Real-time transmission could impact on profits and create physical
hazards for the plant itself and its workers.
Security Assessment on the RAN and its redundancy comes as a minimum set of
actions to be considered to mitigate attacks on that layer. Constant monitoring of RAN
exceptions is also recommended.
secgen.com
Additional Assessments such as pentesting through the external connections (5GaAS,
for instance) and internal testing must be performed to ensure the network was built
securely and mitigate attack risks.
Any external access must be performed through VPNs and authenticated for both
users and endpoints.
Whenever MQTT is used, MQTTS is advised and a MQTT firewall may prevent an attacker
of introducing harming conditions into the environment, bad data into controlling
application and cause damages.
And as it cannot be stressed enough: ICS should not have a straight unfiltered
connection to Corporate Datacenter. No matter the costs or use cases.
IoT devices are numerous and must be cost-effective according to each application.
That being said, they are unlikely to support EDRs or other IT-positioned solutions. Each
device must be secured on design phase and assessed before usage on an industrial
network.
Known threats for OT/ICS:
Management and Control Plane Attack
Management and Control Plane Attack
Zero day and DdoS attacks
Lateral Movement and Malware attack
Usage of unsecure protocols
Network Hardware vulnerabilities
Network Perimeter vulnerabilities
Equipment pivoting
Transmission Poisoning / altering
Mngt networks are exposed to the same advanced threats and
attacks as business system
Plethora of devices are subject to unknown threats
Compromise host by host, typical from malware
Non secured sessions i.e. DNP3, Modbus, IEC 1xx are non secure by
design.
Plenty of devices with non mitigated / patched vulnerabilities
Inadequate physical protection of network equipment
Plenty of devices with non mitigated / patched vulnerabilities
Industrial devices used as tele command to control other
processes / devices
secgen.com
To achieve those, besides following the best practices and 5G standards, a relevant
font of information is NESAS (Network Equipment Security Assurance Scheme) from
GSMA. According to it, some key Network Functions must be verified against previously
undealt threats.
Authentication and key agreement procedure (Synchronization handling, RES*
verification failure)
Security mode command procedure (Replay protection of NAS, NAS integrity
algorithm selection)
5G-GUTI allocation
Invalid or unacceptable UE security capabilities handling
Validation of S-NSSAIs in PDU session establishment request
AMF
UPF
Confidentiality, integrity, replay protection of user data transported over N3 interface
NRF
NF discovery authorization for specific slice
The eUICC/eSIM enrollment procedure and physical cards procedures for Private
Networks must be monitored and controlled. Preferably using different provisioning
chains and with much more limited access control. SIM Swapping on enterprise or an
industrial plant may turn into huge losses for customers.
MNOs must perform periodic security assessments related to elements that serve the
NPN slices and provide evidence for customers’ due diligence.
UK | Italy | Czech Republic | Brazil | Mexico
India | South Korea | Japan | Malaysia
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global
start-up focused on telecom security.
We deliver a solid security foundation to
drive secure telecom digital
transformations and ensure next-gen
enterprise intelligent connectivity.
About SecurityGen Connect With Us
Recommendations for MNOs
The base for Private Networks in PNI-NPN model is about slicing, isolation, and secure
integration to enterprise customers.

More Related Content

Similar to Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Prevention

Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfPrivate-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfJason Lee
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20PositiveTechnologies
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesSecurityGen1
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesSecurityGen1
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallSecurityGen1
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-corewarchitect
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurity Gen
 

Similar to Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Prevention (20)

Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfPrivate-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdf
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
En35793797
En35793797En35793797
En35793797
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 

More from SecurityGen1

Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecurityGen1
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenSecurityGen1
 
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen1
 
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen1
 
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfUnleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfSecurityGen1
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenSecurityGen1
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen1
 
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...SecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfEmpowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfSecurityGen1
 
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurity Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurityGen1
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecuritySecurityGen1
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurityGen1
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessSecurityGen1
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenSecurityGen1
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SecurityGen1
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen1
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfSecurityGen1
 
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecurityFortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecuritySecurityGen1
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsSecurityGen1
 

More from SecurityGen1 (20)

Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
 
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
 
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfUnleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGen
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security Services
 
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfEmpowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
 
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurity Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to Success
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGen
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecurityFortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 Security
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Prevention

  • 1. - - - - Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution a great promise in fact made some MNOs and Fixed Service Providers to build their own “complementary” Wi-Fi networks, especially due to the high costs on 3G deployment. During the 4G rollout, technology evolution has tilted the scale back for MNOs, but Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now challenging this reality. The specifications for reliability, high speed, low latency, high density, and power efficiency meet or surpass corporate and industrial requirements, and research companies announce the dawning of the Private 4G and 5G era. In fact, some researchers point out that the market for private 5G shall be bigger than public 5G. But this should be taken with caution, as networks are built and players evolve, there are still no winners on this race. Focusing on 5G, the first decision for Corporate Management is not a simple “Make or Buy”, but rather how much responsibility I want on the network deployment and management and how much segregation does my business require? Enterprise migration to a much more flexible wireless network which may be built and optimized for latency, low energy consumption or throughput (not the main motivator) according to specific requirements is expected. Next step is planning this migration. PRIVATE 5G NETWORKS (AND HOW TO SECURE THOSE)
  • 2. secgen.com Main options so far are: Procure a Private Network from a local MNO (which has several models on itself) Procure a “NPN As a Service” from a Vendor/Hyperscaler and deploy only 5G NR elements, possibly using public spectrum Buy a full Private Network which will be deployed on premises and require 24x7 support with a good SLA. Each one brings security challenges and, as a minimum, companies need to follow their due diligence towards their supply chain, validating that service providers’ security measures are in place and any breaches must be reported to customer, on contract. Model PNI-NPN NPN as A Service NPN Enterprise Responsibilities Provider Responsibilities Security Enterprise or industrial endpoints, evaluating and monitoring Security of MNO Enterprise or industrial endpoints, evaluating and monitoring Security of Service Provider. Also Management and Operation of RAN elements and some Core elements (e.g.: UPF) depending on the integration scenario. Both IT/OT and Telco solutions All Mobile Network Infrastructure, availability, Security Lifecycle and endpoint activation. This is the only option where spectrum is already paid for. The others may incur on additional costs or use of shared frequen- cy bands Usually, 5G Core Functions and RAN control. This may not be the best fit for big plants or company campuses, but rather useful for smaller business. Software/Hardware Delivery and Support 100% on MNO to provide the Security but Enterprise must validate and, when applicable, audit. Shared, according to the integration level. 100% on Enterprise
  • 3. MNO Private Network Offer (PNI-NPN) secgen.com This is for sure the fastest and low-touch option in case your site already has 5G coverage. Used for both industry and logistics companies (warehouses and ports, for instance), the level of delegation may vary from 100% as a Service to just the 5G radio part, as shown in Ericsson’s value proposition reproduced below. One company may just pay for a slice using dedicated resources from the MNO (T1), might decide to build its own RAN (T2) and so on. Even on T6 model, the company may buy project, operation and support from the Operator, which in some countries act as the solution Integrator as well. 5G As a Service (or NPNaAS) Hyperscalers proposals roam between T2 and T3 models, depending on the company requirements, especially local data breakout for accessing internal systems and/or Internet with low latency and high capacity. In some cases, Hyperscalers might try also to host those systems as an additional service. On Enterprise premise Ericsson components Reuse of MNO network assets T1 Total slicing T2 Local RAN + Core slicing T3 T2 + Local data breakout T4 T3 + PTT T5 T4 + Unified Communications T6 Full network on premise (isolated) Integrated Deployment Isolated Deployment RAN Outdoor/indoor EPC RAN Outdoor/indoor RAN Outdoor/indoor RAN Outdoor/indoor RAN Outdoor/indoor EPC EPC EPC Push to Talk Push to Talkj + IMS Push to Talkj + IMS HSS HSS Only Local management
  • 4. Private 5G Network (NPN) secgen.com The case for T6 may be somewhat rare because just a few scenarios that really require it: Law enforcement communication networks for events: Available independent of public network load, specific privacy requirements, etc. Agricultural plants so big that are poorly covered or even not covered by public networks. Although those might be surprised by some specific initiatives from both MNOs and heavy machinery vendors Mining plants which require kilometers of indoor coverage Owning a network means Operational Costs that may be equivalent or bigger than paying for it “as a service”. Also, depending on the country, companies must pay for a spectrum license or use shared spectrum subject to future interference as new networks and services are implemented. When you consider the logistics use case, spectrum licensing across many sites may become a burden as well. Security of a Private 5G Network There are many security features available from the specification. Enterprise and industry must assure they are enabled on their environments. For a non-exhaustive list: SUPI concealing, meaning that the unique Id of a subscription and its keys are not openly transmitted on the air interface. IPSec enabled for Backhaul to assure no interception is possible between RAN and Core. Even more relevant if your Core is hosted externally. Encrypt both Control and User Plane on the Air Interface to assure confidentiality and integrity of transmitted data.
  • 5. Security Process secgen.com Possibly the hardest part on private networks is to keep those safe for the entire lifecycle. This may become a relevant argument for PNI-NPN and NPNaAS, since the technology keeper must assure the integrity and availability of assets from: Our research has identified threats to the 5G Core not covered by the Standards and that must be taken in consideration. We may support MNOs for a safer 5G Service Telco Cloud Security recommendations also apply since 5G is Cloud Native. In a nutshell, Telco Cloud is the base virtualization infrastructure that makes 5G viable. It supports all Core Functions and recently a huge part of the RAN, in case Open RAN is implemented. Nevertheless, technologies were not re-created but instead absorbed from IT Virtualization vendors, as well as COTS x86 servers and Data Switches. All those parts and its Management and Orchestration layers add complexity to the 5G ecosystem as well as further domains for Vulnerability Management. For details and additional insights, specific articles we have written on the subject are available. Onboarding of new Functions or releases Hardening of OS, Hypervisors, Management Systems and VNFs Assuring the designed Network Architecture is kept and evolve according to new requirements SOC integration and active monitoring Robust Change Management and Vulnerability Management processes
  • 6. secgen.com All those tasks are complex, and even more because several vendors are used on the building of a 5G Network. Not all companies might want to build a new team or specialize a current one in Telecom Networks and Telecom Security. The latter is so rare that we are usually requested to recommend or support on the hiring of new professionals even for MNOs. The usage of Private 4G/5G in Industry includes new elements and borders to be Assessed for Security: Industrial risks IT environment security assessment Pentesters Team 2 External pentest Internal pentest Social engineering 4g/5g security assessmet Wireless Local users OT environment Local network point of access point of access point of access Pentesters Team 1 OT environmenmt security assessment Internet The usual temprary glimpse on service or traffic speed noticed sometimes in heavily loaded Public Networks are a nuisance for subscriber during special events such as New Year’s Eve or huge concerts. While serving an industrial plant, the lack of availability or capacity for Real-time transmission could impact on profits and create physical hazards for the plant itself and its workers. Security Assessment on the RAN and its redundancy comes as a minimum set of actions to be considered to mitigate attacks on that layer. Constant monitoring of RAN exceptions is also recommended.
  • 7. secgen.com Additional Assessments such as pentesting through the external connections (5GaAS, for instance) and internal testing must be performed to ensure the network was built securely and mitigate attack risks. Any external access must be performed through VPNs and authenticated for both users and endpoints. Whenever MQTT is used, MQTTS is advised and a MQTT firewall may prevent an attacker of introducing harming conditions into the environment, bad data into controlling application and cause damages. And as it cannot be stressed enough: ICS should not have a straight unfiltered connection to Corporate Datacenter. No matter the costs or use cases. IoT devices are numerous and must be cost-effective according to each application. That being said, they are unlikely to support EDRs or other IT-positioned solutions. Each device must be secured on design phase and assessed before usage on an industrial network. Known threats for OT/ICS: Management and Control Plane Attack Management and Control Plane Attack Zero day and DdoS attacks Lateral Movement and Malware attack Usage of unsecure protocols Network Hardware vulnerabilities Network Perimeter vulnerabilities Equipment pivoting Transmission Poisoning / altering Mngt networks are exposed to the same advanced threats and attacks as business system Plethora of devices are subject to unknown threats Compromise host by host, typical from malware Non secured sessions i.e. DNP3, Modbus, IEC 1xx are non secure by design. Plenty of devices with non mitigated / patched vulnerabilities Inadequate physical protection of network equipment Plenty of devices with non mitigated / patched vulnerabilities Industrial devices used as tele command to control other processes / devices
  • 8. secgen.com To achieve those, besides following the best practices and 5G standards, a relevant font of information is NESAS (Network Equipment Security Assurance Scheme) from GSMA. According to it, some key Network Functions must be verified against previously undealt threats. Authentication and key agreement procedure (Synchronization handling, RES* verification failure) Security mode command procedure (Replay protection of NAS, NAS integrity algorithm selection) 5G-GUTI allocation Invalid or unacceptable UE security capabilities handling Validation of S-NSSAIs in PDU session establishment request AMF UPF Confidentiality, integrity, replay protection of user data transported over N3 interface NRF NF discovery authorization for specific slice The eUICC/eSIM enrollment procedure and physical cards procedures for Private Networks must be monitored and controlled. Preferably using different provisioning chains and with much more limited access control. SIM Swapping on enterprise or an industrial plant may turn into huge losses for customers. MNOs must perform periodic security assessments related to elements that serve the NPN slices and provide evidence for customers’ due diligence. UK | Italy | Czech Republic | Brazil | Mexico India | South Korea | Japan | Malaysia Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure next-gen enterprise intelligent connectivity. About SecurityGen Connect With Us Recommendations for MNOs The base for Private Networks in PNI-NPN model is about slicing, isolation, and secure integration to enterprise customers.