SlideShare a Scribd company logo
2020 became the year of 5G proliferation (as per Qualcomm study), while 2021 is
about a rapid 5G rollout, vertical expansion, and advancing 5G systems with new
capabilities. The same gets reflected in an August 2021 Gartner forecast that
estimates 5G coverage in tier-1 cities across the US by 2024 will be 60%, besides
predicting a revenue growth from $794 million to $1.6 billion in western Europe, by
the year-end.
Spike in remote working due to the pandemic is a significant factor in this growth,
with individual consumer and business demand for connectivity rising significantly.
The situation demands CSPs to look into hardware acceleration for boosting
performance, considering scalability and reliability while maintaining a low latency
level. Network Function Virtualisation (NFV) and cloud-based 5G rollout are the
answers they resort to, transitioning from legacy network infrastructures. However,
with increased bandwidth and unprotected IoT devices comes the risk of
advanced threats and vulnerabilities. The critical question remains - “Is 5G secure
under the NFV environment?”. To answer this, let’s dive deeper to understand legacy
architecture and the transition from legacy networks to NVF.
Securing The Global
5G Growth Story with Network
Functions Virtualisation
Infrastructure (NFVi)
secgen.com
From Legacy Vendor to the ‘Ecosystems’
The Telecom industry has learned from several pitfalls across its almost 150 years of
operational history, all valuable but few at high costs. Initially, one operator would likely
produce most of its equipment, cables, tools, and shoulder responsibilities of training
the technical personnel on its activities. Over time, the model evolved to a hierarchical
supply chain - usually based on a single vendor providing all the necessary tools,
solutions, and (proprietary technology) training. Even today, many Mobile Network
Operators (MNOs) are still dependent on their primary vendor and have never left this
model. Nevertheless, after many years of 3GPP’s hard work on standardisation, some
operators managed to evolve to an Open Market approach - a significant advance for
the 4G environment. MNOs could finally get best-in-class solutions, despite their
primary or legacy vendor providing a similar one. LTE-Advanced (aka 4G+) and 5G
present a different challenge, proven as manageable by an even newer kind of
business infrastructure: The Ecosystems.
Ecosystems – Why do They Need a Virtualization
Ecosystem - a term borrowed from Biology generally refers to a group of interacting
firms that depend on each other’s activities. Rakuten, the many times studied
Japanese MNO, has built its own based on about ten different vendors and over 100
different functions. Their model may now be used as a Cloud-based service for other
MNOs. Whether the MNOs use third-party ecosystems or build their own, the supply
chain complexity has increased, and its risk must be analysed and assessed after
deployment. No single provider makes a complete 5G Network, mainly due to the
Low Need for coordination High
Open market
Hierarchical supply
chain
Vertically
integrated
organization
Business
ecosystem
Low
Level
of
Modularity
High
Source: Jacobided et al (2018)
secgen.com
Cloud Native architecture, so the goal moves from best-in-class to best-in-breed.
Telecom is finally embracing the de facto IT standard and not reinventing all hardware,
data centre switching, virtualisation, virtual switching, orchestration, and performance
components. The MNOs need to procure these from top performance vendors. MNOs
have to manage components using VNF or CNF architectures over a shared
infrastructure for the first time. Considering that the usual endpoint security tools such
as EDRs and antivirus are not accepted for performance reasons, the architecture
plays a huge role in the overall security level.
How To Keep The 5G Cloud Safe in This Ecosystem?
The truth is much of the recommendations are the basic ones, although the
challenges are more significant:
Inventory management: In addition to knowing every application and
information asset that exists, you must keep a consistent naming, classification,
and categorisation policy also for the assets that may be created dynamically
by an orchestrator.
• Use knowledge from inventory to keep resources, including containers, from
being shared between functions with different security classifications or require-
ments
• For instance, the UDM contains centralised data on subscribers and private
information such as their physical location and should not share resources or
have connectivity at any level with a less secure third-party application such as
a connection speed tester
Identity & Access management: Authorising human users using Multifactor
Authentication is mandatory, but all entities - Functions, VMs, O&M Services,
etc. – that access any resourc must also be authenticated and have its authori-
sation verified.
• Use Certificates for authentication of functions, especially in the 5G Core
• Segregate the Certification Authority from the virtual environment
• Certification infrastructure, deployment and lifecycle require special attention
secgen.com
Above all, one must consider the complexity of the
new supply chain and make sure to have clear and
accurate:
2. Aggressive Security Patching Process
3. The onboarding process for new Functions and Updates
4. Vulnerability Management Process
5. Solution and Service Providers Risk Management Process
Application validation: At least the NFVI software stack boot process must have
a transparent chain of trust and assurance to avoid compromising the
entire environment
1.
Log Monitoring: Automated logging, monitoring, and analysis are vital. Telecom
is all about availability, and usually, MNOs are focused on recovering service
rather than keeping track of possible abuses or compromise of assets.
Stakeholders must consider that cloud is here to provide additional availability
and efficiently managing its security is a significant investment.
Segmentation: Segment networks as far as possible (including virtual ones).
Everyone hates filling forms to request connectivity, and firewall rules must be
created. Nevertheless, the same needs to be designed and well classified for
each function or service, no matter how extensive or distributed the network.
Cloud is about scaling, integrating different sites and domains seamlessly,
which eventually will include shared and public clouds. ‘First time right’ should
be the motto when designing Telco Clouds.
Monitoring: Monitoring for lateral movement attempts and any traffic that
doesn’t fit the baseline or is characteristic of adversarial techniques execution
is a must. That’s a good practice and even more necessary if operators fail to
keep up with the previous ones.
secgen.com
Reference:
Towards a theory of ecosystems - London Business School 2018 - Michael
G. Jacobides | Carmelo Cennamo | Annabelle Gawer
1.
ENISA Documentation https://www.enisa.europa.eu/publications/enisa-
threatlandscape-report-for-5g-networks/
CISA Documentation https://www.cisa.gov/publication/5g-strategy
3GPP on virtualization impacts: 3GPP TR 33.848
2.
3.
4.
UK | Italy | Czech Republic | Brazil | Mexico
India | South Korea | Japan | Malaysia
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global
start-up focused on telecom security.
We deliver a solid security foundation to
drive secure telecom digital
transformations and ensure next-gen
enterprise intelligent connectivity.
About SecurityGen Connect With Us

More Related Content

Similar to Securing the 5G growth story with NFVi.pdf

5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and Opportunities
AliMohamedAhmed2
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
SecurityGen1
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
SecurityGen1
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
SecurityGen1
 
Address 5G Vulnerabilities with SecurityGen's Expert Solution
Address 5G Vulnerabilities with SecurityGen's Expert SolutionAddress 5G Vulnerabilities with SecurityGen's Expert Solution
Address 5G Vulnerabilities with SecurityGen's Expert Solution
Security Gen
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
Charles "Chuck" Speicher Jr.
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
Charles "Chuck" Speicher Jr.
 
5G vision-brochure-v1
5G vision-brochure-v15G vision-brochure-v1
5G vision-brochure-v1
Sitha Sok
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Juniper Networks
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
Ericsson Latin America
 
Telco Global Connect 4
Telco Global Connect 4Telco Global Connect 4
Telco Global Connect 4
Sadiq Malik
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
Valiente Veera
 
Fourth Dimension RAN white paper - ThinkSmallCell
Fourth Dimension RAN white paper - ThinkSmallCellFourth Dimension RAN white paper - ThinkSmallCell
Fourth Dimension RAN white paper - ThinkSmallCell
Parallel Wireless, Inc.
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Ciaran Roche
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
Security Gen
 

Similar to Securing the 5G growth story with NFVi.pdf (20)

5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and Opportunities
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
 
Address 5G Vulnerabilities with SecurityGen's Expert Solution
Address 5G Vulnerabilities with SecurityGen's Expert SolutionAddress 5G Vulnerabilities with SecurityGen's Expert Solution
Address 5G Vulnerabilities with SecurityGen's Expert Solution
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
5G vision-brochure-v1
5G vision-brochure-v15G vision-brochure-v1
5G vision-brochure-v1
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
Telco Global Connect 4
Telco Global Connect 4Telco Global Connect 4
Telco Global Connect 4
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
 
Fourth Dimension RAN white paper - ThinkSmallCell
Fourth Dimension RAN white paper - ThinkSmallCellFourth Dimension RAN white paper - ThinkSmallCell
Fourth Dimension RAN white paper - ThinkSmallCell
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 

More from Security Gen

Protect Your Network_ Invest in Telco Security Solutions Today
Protect Your Network_ Invest in Telco Security Solutions TodayProtect Your Network_ Invest in Telco Security Solutions Today
Protect Your Network_ Invest in Telco Security Solutions Today
Security Gen
 
Unlock the Future: SecurityGen's 5G Standalone Solutions
Unlock the Future: SecurityGen's 5G Standalone SolutionsUnlock the Future: SecurityGen's 5G Standalone Solutions
Unlock the Future: SecurityGen's 5G Standalone Solutions
Security Gen
 
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen-IDS-enhance-your-signalling-security (1).pdfSecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
Security Gen
 
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom SecuritySecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
Security Gen
 
SecurityGen - Your Shield Against Cyber Threats
SecurityGen - Your Shield Against Cyber ThreatsSecurityGen - Your Shield Against Cyber Threats
SecurityGen - Your Shield Against Cyber Threats
Security Gen
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
Security Gen
 
Why the VoLTE Rush?
Why the VoLTE Rush?Why the VoLTE Rush?
Why the VoLTE Rush?
Security Gen
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
Security Gen
 
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGenShield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Security Gen
 
Fake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network Vulnerabilities
Security Gen
 
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
Security Gen
 
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
Security Gen
 
ACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERT
Security Gen
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
Security Gen
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
Security Gen
 
IDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORMIDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORM
Security Gen
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
Security Gen
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
Security Gen
 
SecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdfSecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdf
Security Gen
 
SecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdfSecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdf
Security Gen
 

More from Security Gen (20)

Protect Your Network_ Invest in Telco Security Solutions Today
Protect Your Network_ Invest in Telco Security Solutions TodayProtect Your Network_ Invest in Telco Security Solutions Today
Protect Your Network_ Invest in Telco Security Solutions Today
 
Unlock the Future: SecurityGen's 5G Standalone Solutions
Unlock the Future: SecurityGen's 5G Standalone SolutionsUnlock the Future: SecurityGen's 5G Standalone Solutions
Unlock the Future: SecurityGen's 5G Standalone Solutions
 
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen-IDS-enhance-your-signalling-security (1).pdfSecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
 
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom SecuritySecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
 
SecurityGen - Your Shield Against Cyber Threats
SecurityGen - Your Shield Against Cyber ThreatsSecurityGen - Your Shield Against Cyber Threats
SecurityGen - Your Shield Against Cyber Threats
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
 
Why the VoLTE Rush?
Why the VoLTE Rush?Why the VoLTE Rush?
Why the VoLTE Rush?
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGenShield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGen
 
Fake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network Vulnerabilities
 
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
 
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
 
ACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERT
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
IDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORMIDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORM
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
SecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdfSecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdf
 
SecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdfSecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdf
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Securing the 5G growth story with NFVi.pdf

  • 1. 2020 became the year of 5G proliferation (as per Qualcomm study), while 2021 is about a rapid 5G rollout, vertical expansion, and advancing 5G systems with new capabilities. The same gets reflected in an August 2021 Gartner forecast that estimates 5G coverage in tier-1 cities across the US by 2024 will be 60%, besides predicting a revenue growth from $794 million to $1.6 billion in western Europe, by the year-end. Spike in remote working due to the pandemic is a significant factor in this growth, with individual consumer and business demand for connectivity rising significantly. The situation demands CSPs to look into hardware acceleration for boosting performance, considering scalability and reliability while maintaining a low latency level. Network Function Virtualisation (NFV) and cloud-based 5G rollout are the answers they resort to, transitioning from legacy network infrastructures. However, with increased bandwidth and unprotected IoT devices comes the risk of advanced threats and vulnerabilities. The critical question remains - “Is 5G secure under the NFV environment?”. To answer this, let’s dive deeper to understand legacy architecture and the transition from legacy networks to NVF. Securing The Global 5G Growth Story with Network Functions Virtualisation Infrastructure (NFVi)
  • 2. secgen.com From Legacy Vendor to the ‘Ecosystems’ The Telecom industry has learned from several pitfalls across its almost 150 years of operational history, all valuable but few at high costs. Initially, one operator would likely produce most of its equipment, cables, tools, and shoulder responsibilities of training the technical personnel on its activities. Over time, the model evolved to a hierarchical supply chain - usually based on a single vendor providing all the necessary tools, solutions, and (proprietary technology) training. Even today, many Mobile Network Operators (MNOs) are still dependent on their primary vendor and have never left this model. Nevertheless, after many years of 3GPP’s hard work on standardisation, some operators managed to evolve to an Open Market approach - a significant advance for the 4G environment. MNOs could finally get best-in-class solutions, despite their primary or legacy vendor providing a similar one. LTE-Advanced (aka 4G+) and 5G present a different challenge, proven as manageable by an even newer kind of business infrastructure: The Ecosystems. Ecosystems – Why do They Need a Virtualization Ecosystem - a term borrowed from Biology generally refers to a group of interacting firms that depend on each other’s activities. Rakuten, the many times studied Japanese MNO, has built its own based on about ten different vendors and over 100 different functions. Their model may now be used as a Cloud-based service for other MNOs. Whether the MNOs use third-party ecosystems or build their own, the supply chain complexity has increased, and its risk must be analysed and assessed after deployment. No single provider makes a complete 5G Network, mainly due to the Low Need for coordination High Open market Hierarchical supply chain Vertically integrated organization Business ecosystem Low Level of Modularity High Source: Jacobided et al (2018)
  • 3. secgen.com Cloud Native architecture, so the goal moves from best-in-class to best-in-breed. Telecom is finally embracing the de facto IT standard and not reinventing all hardware, data centre switching, virtualisation, virtual switching, orchestration, and performance components. The MNOs need to procure these from top performance vendors. MNOs have to manage components using VNF or CNF architectures over a shared infrastructure for the first time. Considering that the usual endpoint security tools such as EDRs and antivirus are not accepted for performance reasons, the architecture plays a huge role in the overall security level. How To Keep The 5G Cloud Safe in This Ecosystem? The truth is much of the recommendations are the basic ones, although the challenges are more significant: Inventory management: In addition to knowing every application and information asset that exists, you must keep a consistent naming, classification, and categorisation policy also for the assets that may be created dynamically by an orchestrator. • Use knowledge from inventory to keep resources, including containers, from being shared between functions with different security classifications or require- ments • For instance, the UDM contains centralised data on subscribers and private information such as their physical location and should not share resources or have connectivity at any level with a less secure third-party application such as a connection speed tester Identity & Access management: Authorising human users using Multifactor Authentication is mandatory, but all entities - Functions, VMs, O&M Services, etc. – that access any resourc must also be authenticated and have its authori- sation verified. • Use Certificates for authentication of functions, especially in the 5G Core • Segregate the Certification Authority from the virtual environment • Certification infrastructure, deployment and lifecycle require special attention
  • 4. secgen.com Above all, one must consider the complexity of the new supply chain and make sure to have clear and accurate: 2. Aggressive Security Patching Process 3. The onboarding process for new Functions and Updates 4. Vulnerability Management Process 5. Solution and Service Providers Risk Management Process Application validation: At least the NFVI software stack boot process must have a transparent chain of trust and assurance to avoid compromising the entire environment 1. Log Monitoring: Automated logging, monitoring, and analysis are vital. Telecom is all about availability, and usually, MNOs are focused on recovering service rather than keeping track of possible abuses or compromise of assets. Stakeholders must consider that cloud is here to provide additional availability and efficiently managing its security is a significant investment. Segmentation: Segment networks as far as possible (including virtual ones). Everyone hates filling forms to request connectivity, and firewall rules must be created. Nevertheless, the same needs to be designed and well classified for each function or service, no matter how extensive or distributed the network. Cloud is about scaling, integrating different sites and domains seamlessly, which eventually will include shared and public clouds. ‘First time right’ should be the motto when designing Telco Clouds. Monitoring: Monitoring for lateral movement attempts and any traffic that doesn’t fit the baseline or is characteristic of adversarial techniques execution is a must. That’s a good practice and even more necessary if operators fail to keep up with the previous ones.
  • 5. secgen.com Reference: Towards a theory of ecosystems - London Business School 2018 - Michael G. Jacobides | Carmelo Cennamo | Annabelle Gawer 1. ENISA Documentation https://www.enisa.europa.eu/publications/enisa- threatlandscape-report-for-5g-networks/ CISA Documentation https://www.cisa.gov/publication/5g-strategy 3GPP on virtualization impacts: 3GPP TR 33.848 2. 3. 4. UK | Italy | Czech Republic | Brazil | Mexico India | South Korea | Japan | Malaysia Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure next-gen enterprise intelligent connectivity. About SecurityGen Connect With Us