SlideShare a Scribd company logo
Paul Bradley, Head of 5G Strategy & Partnerships
May 15th 2018
A New Trust Model for 5G Networks
A complex ecosystem emerges
A new trust model for the 5G era2
5G system security and data protection
A new trust model for the 5G era3
The greatest risks to enterprise data:
CONFIDENTIALITY, INTEGRITY,
AVAILABILITY
What at
A new trust model for the 5G era4
A new trust model for the 5G era5
CENTRAL
CLOUD
Fixed or
Mobile/
Backhaul Wide Area
Network
METRO
EDGES
LOCAL
EDGES UE
Local Access
Network
A new trust model for the 5G era6
What virtualization & 5G mean for security
RESOURCE
SHARING BETWEEN
THE TELECOM OPERATOR
AND
THE ENTERPRISE
ZERO-TOUCH
AUTOMATION
Softwarization
of the network Integration of existing
and new local access
networksMoving the intelligence
towards the edge
A new trust model for the 5G era7
Customer controlled encryption
of the VMs
or containers running
in the network
Encryption management
for centralized lifecycle
management leveraging
the most reliable root of trust
Stored database encryption
Secure enclaves at the edge
Ultra-low latency encryption
of ‘anyhaul’ transport
Key capabilities to create trustworthy 5G virtualized
networks
Softwarization
of the network
CENTRAL
CLOUD
Moving the intelligence
towards the edge
Integration of existing
and new local
access networks
Fixed or
Mobile/
Backhaul Wide
Area Network
METRO
EDGES
LOCAL
EDGES UE
Local Access
Network
Secure enclaves
A new trust model for the 5G era8
A local trusted execution environment is needed to protect keys thus preventing
unauthorized access to, and manipulation of VNFs, apps or sensitive data.
Secure enclave solutions are hardware encrypted zones created at the chip level
that give developers the means of leveraging the CPU to create
isolated, trusted, memory regions.
5G / NFV INFRASTRUCTURE
HARDWARE RESOURCES (CPU, STORAGE, NETWORK)
HYPERVISOR
A hypervisor provides a first level of isolation between co-located functions,
based on logical separation secured by firewalls.
Multi
Access
EDGE
5G / NFV INFRASTRUCTURE
HARDWARE RESOURCES (CPU, STORAGE, NETWORK)
HYPERVISOR
Malicious code could leak data through the walls as functions are co-located
on the same machine. Data-centric protection is required.
Multi
Access
EDGE
5G CORE / EDGE COMPUTE INFRASTRUCTURE
5G Network
Manager &
Orchestrator
(MANO)
ATTESTATION
SERVER
Intel® Software
Guard Extensions
(Intel® SGX)
The NFV and enterprise app security is provided by a Gemalto Protection Agent on each machine,
propagated into the Intel® SGX secure enclave and certified by an attestation server.
Gemalto Protection Agent
Simple Provisioning
eases OEM integration and
logistics
Dynamic, Seamless & Secure
migration of VNFs/apps from
one machine to another
Confidentiality and Integrity
protection of VNFs and apps is
assured at runtime
Agnostic
VM or Container-level protection
for VNFs and enterprise apps
High performance, secure
credential storage and key
management assured by a
Hardware Root of Trust
Protects NFVs and apps at the
core and at the edge of the
network
Download our whitepaper on 5G Network Security here
gemalto.com/5g
A new trust model for the 5G era14
Thank you
You can find me on
15 A new trust model for the 5G era

More Related Content

What's hot

5G Fundamentals
5G Fundamentals5G Fundamentals
5G Fundamentals
Damien Magoni
 
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected EraWhite Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
Charo Sanchez
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5G
Rumana Afrose
 
Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)
Ari Zoldan
 
5G positioning for the connected intelligent edge
5G positioning for the connected intelligent edge5G positioning for the connected intelligent edge
5G positioning for the connected intelligent edge
Qualcomm Research
 
Understanding 5G Guide
Understanding 5G GuideUnderstanding 5G Guide
Understanding 5G Guide
Mark Wallace
 
Intelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraIntelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G era
Qualcomm Research
 
PhD Projects in Telecommunication Research Help
PhD Projects in Telecommunication Research HelpPhD Projects in Telecommunication Research Help
PhD Projects in Telecommunication Research Help
PhD Services
 
What's in the future of 5G millimeter wave?
What's in the future of 5G millimeter wave? What's in the future of 5G millimeter wave?
What's in the future of 5G millimeter wave?
Qualcomm Research
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
Carrier As A Service15102009
Carrier As A Service15102009Carrier As A Service15102009
Carrier As A Service15102009
vnandlall
 
Presentación Qualcomm evento Movilidad en la empresa española
Presentación Qualcomm evento Movilidad en la empresa españolaPresentación Qualcomm evento Movilidad en la empresa española
Presentación Qualcomm evento Movilidad en la empresa española
videos
 
Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor NetworksWireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks
Nestor Michael Tiglao
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
Satish Chavan
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
Mohamed Tharwat Waheed
 
5G + AI: The Ingredients For Next Generation Wireless Innovation
5G + AI: The Ingredients For Next Generation Wireless Innovation5G + AI: The Ingredients For Next Generation Wireless Innovation
5G + AI: The Ingredients For Next Generation Wireless Innovation
Qualcomm Research
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
Duncan Purves
 
ECI-Revolutionizing Services with Cloud Native
ECI-Revolutionizing Services with Cloud NativeECI-Revolutionizing Services with Cloud Native
ECI-Revolutionizing Services with Cloud Native
ECI – THE ELASTIC NETWORK™
 
5G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev202005055G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev20200505
Agustin Francisco Melian
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
Qualcomm Research
 

What's hot (20)

5G Fundamentals
5G Fundamentals5G Fundamentals
5G Fundamentals
 
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected EraWhite Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5G
 
Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)
 
5G positioning for the connected intelligent edge
5G positioning for the connected intelligent edge5G positioning for the connected intelligent edge
5G positioning for the connected intelligent edge
 
Understanding 5G Guide
Understanding 5G GuideUnderstanding 5G Guide
Understanding 5G Guide
 
Intelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraIntelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G era
 
PhD Projects in Telecommunication Research Help
PhD Projects in Telecommunication Research HelpPhD Projects in Telecommunication Research Help
PhD Projects in Telecommunication Research Help
 
What's in the future of 5G millimeter wave?
What's in the future of 5G millimeter wave? What's in the future of 5G millimeter wave?
What's in the future of 5G millimeter wave?
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
Carrier As A Service15102009
Carrier As A Service15102009Carrier As A Service15102009
Carrier As A Service15102009
 
Presentación Qualcomm evento Movilidad en la empresa española
Presentación Qualcomm evento Movilidad en la empresa españolaPresentación Qualcomm evento Movilidad en la empresa española
Presentación Qualcomm evento Movilidad en la empresa española
 
Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor NetworksWireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
5G + AI: The Ingredients For Next Generation Wireless Innovation
5G + AI: The Ingredients For Next Generation Wireless Innovation5G + AI: The Ingredients For Next Generation Wireless Innovation
5G + AI: The Ingredients For Next Generation Wireless Innovation
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
ECI-Revolutionizing Services with Cloud Native
ECI-Revolutionizing Services with Cloud NativeECI-Revolutionizing Services with Cloud Native
ECI-Revolutionizing Services with Cloud Native
 
5G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev202005055G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev20200505
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 

Similar to A New Trust Model for 5G Networks

Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
Paul Stevens
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
Baqar kazmi
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
bakar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
ADVA
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
Sunardi Fatan
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
Michelle Holley
 
Demystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern NetworkingDemystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern Networking
Infyiot Solutions
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
Sylvain Maret
 
Security for 5G presentation.pptx
Security for 5G presentation.pptxSecurity for 5G presentation.pptx
Security for 5G presentation.pptx
Amr Said
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
Advantec Distribution
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
SecurityGen1
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
Julian Ernesto Martinez Oliva
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
PositiveTechnologies
 

Similar to A New Trust Model for 5G Networks (20)

Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Demystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern NetworkingDemystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern Networking
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
Security for 5G presentation.pptx
Security for 5G presentation.pptxSecurity for 5G presentation.pptx
Security for 5G presentation.pptx
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

A New Trust Model for 5G Networks

  • 1. Paul Bradley, Head of 5G Strategy & Partnerships May 15th 2018 A New Trust Model for 5G Networks
  • 2. A complex ecosystem emerges A new trust model for the 5G era2
  • 3. 5G system security and data protection A new trust model for the 5G era3 The greatest risks to enterprise data: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
  • 4. What at A new trust model for the 5G era4
  • 5. A new trust model for the 5G era5
  • 6. CENTRAL CLOUD Fixed or Mobile/ Backhaul Wide Area Network METRO EDGES LOCAL EDGES UE Local Access Network A new trust model for the 5G era6 What virtualization & 5G mean for security RESOURCE SHARING BETWEEN THE TELECOM OPERATOR AND THE ENTERPRISE ZERO-TOUCH AUTOMATION Softwarization of the network Integration of existing and new local access networksMoving the intelligence towards the edge
  • 7. A new trust model for the 5G era7 Customer controlled encryption of the VMs or containers running in the network Encryption management for centralized lifecycle management leveraging the most reliable root of trust Stored database encryption Secure enclaves at the edge Ultra-low latency encryption of ‘anyhaul’ transport Key capabilities to create trustworthy 5G virtualized networks Softwarization of the network CENTRAL CLOUD Moving the intelligence towards the edge Integration of existing and new local access networks Fixed or Mobile/ Backhaul Wide Area Network METRO EDGES LOCAL EDGES UE Local Access Network
  • 8. Secure enclaves A new trust model for the 5G era8 A local trusted execution environment is needed to protect keys thus preventing unauthorized access to, and manipulation of VNFs, apps or sensitive data. Secure enclave solutions are hardware encrypted zones created at the chip level that give developers the means of leveraging the CPU to create isolated, trusted, memory regions.
  • 9.
  • 10. 5G / NFV INFRASTRUCTURE HARDWARE RESOURCES (CPU, STORAGE, NETWORK) HYPERVISOR A hypervisor provides a first level of isolation between co-located functions, based on logical separation secured by firewalls. Multi Access EDGE
  • 11. 5G / NFV INFRASTRUCTURE HARDWARE RESOURCES (CPU, STORAGE, NETWORK) HYPERVISOR Malicious code could leak data through the walls as functions are co-located on the same machine. Data-centric protection is required. Multi Access EDGE
  • 12. 5G CORE / EDGE COMPUTE INFRASTRUCTURE 5G Network Manager & Orchestrator (MANO) ATTESTATION SERVER Intel® Software Guard Extensions (Intel® SGX) The NFV and enterprise app security is provided by a Gemalto Protection Agent on each machine, propagated into the Intel® SGX secure enclave and certified by an attestation server. Gemalto Protection Agent
  • 13. Simple Provisioning eases OEM integration and logistics Dynamic, Seamless & Secure migration of VNFs/apps from one machine to another Confidentiality and Integrity protection of VNFs and apps is assured at runtime Agnostic VM or Container-level protection for VNFs and enterprise apps High performance, secure credential storage and key management assured by a Hardware Root of Trust Protects NFVs and apps at the core and at the edge of the network
  • 14. Download our whitepaper on 5G Network Security here gemalto.com/5g A new trust model for the 5G era14
  • 15. Thank you You can find me on 15 A new trust model for the 5G era