SlideShare a Scribd company logo
1 of 7
Download to read offline
As telecom networks get more sophisticated, digital access and new technologies
(5G) emerge, and cyberattacks continue to increase and evolve, posing a threat to
telecommunications. Acknowledging this threat is the first step in your efforts to
neutralizing it. Identifying, evaluating and managing the overall security posture of
telecom supply chains must be an imperative goal not only for security teams, but
also for the engineering and operation teams who work together to make
seamless mobile communications possible.
Today, however, ensuring telecom supply chain security is becoming more and
more challenging. Those who have worked long enough in the telecom engineering
space will understand the many reasons why a traditional IT approach to security
does not offer enough protection to telecom. Among the many important reasons,
some “telecom truths” perdured for years, like the following:
MITIGATING RISKS IN
TELECOM SUPPLY CHAIN
SECURITY - A LONG OVERDUE
DISCUSSION
Traditional telecom security solutions redundant
secgen.com
Traditional IT tools work with standard apps that cannot assess new and evolving
risks
Many functions are isolated from internet access (as if this covered all risks)
Mobile networks are not data centers – they have their own vulnerabilities
The general public is unaware of critical telecom security protocols and
standards
Most of the above claims did not age well. You still need specialized tools and
knowledge to assess Telecom security but with the convergence of Telecom and IT
technologies, network devices that used to run on proprietary hardware with limited
external connectivity have become a set of virtual machines connected by a
collection of message buses that extend across countries. Roaming
interconnectivity also connects these core elements to other mobile network
operators (MNOs) with equivalent risks. In this scenario, an exposure of assets could
result from a single badly typed command or a “temporary configuration” which
later becomes part of the network and cannot be touched anymore.
NPN
Telecom Supply Chain Regulations
The Cybersecurity & Infrastructure Security Agency (CISA) is a branch of the U.S.
government that is focused on improving cybersecurity for the nation’s critical
infrastructure, which includes telecom, utilities, public health, and logistics. According
to CISA, ICT supply chain risks must be evaluated and measured keeping in mind not
just the hardware and software but also the services managed by third-party
vendors.
This means that telecom companies who play the role of both critical infrastructure
owners and service providers must, as part of their safety protocols, actively assess
the security of their mobile networks and provide reasonable information and
assurance of security standards to their customers.
Similarly, the European Union Agency for Cybersecurity (ENISA) regularly develops and
updates its regulations and standards for 5G security. Its stringent risk management
guidelines list telecom supply chains as part of critical infrastructure for European
countries.
secgen.com
Apart from the US and European Union, numerous other countries and regions have
also created regulations and best practices – influenced by CISA and ENISA - to ensure
the highest levels of security for telecom supply chains.
Service Providers in Telecom
EU ENISA Progress
Threat focus
Risk
Identification
Threat Focus
Risk
Management
Guideline
Standards
Certification
Compatability
Risk Management
Compatability
Standards
Virtualization (NVF)
ICT Products
Cloud Details
Operating
Networks
Threat
intelligence
sharing
ENISA threat
landscape for
5G Networks
Update of ENISA
threat landscape for
5G Networks
Cybersecurity of 5G
networks EU Toolbox
of risk migrating
measures
Guideline on Security
Measures under the
EECC
5G Supplement
Security in 5G
Specifications -
Controls in 5GPP
Methodology of
Sectoral
Cybersecurity
Assessments
Interoperable EU RISK
Management Frame-
work
NVF Security in 5G
5G Cyber Security
Standards
Risk Management
Standards
EU ICT Products
Common Criteria
(draft)
EU Cloud Services
(ongoing)
EU 5G Networks
(ongoing)
EU 5G Threat
Intelligence
Sharing (ongoing)
2019 2020 2021 1H/2022 2H/2022+
While recent supply chain attacks such as Solarwinds, Okta, Log4J gained notoriety
within the global cyber-security community after they affected a wide range of ICT
Companies, telecom-specific security incidents are not publicized much or investigated.
secgen.com
LightBasin, which we addressed earlier in our article, has already proved the point
that roaming interconnection is not as safe as earlier believed. This cluster was able
to emulate telecommunication protocols and used packet-capture and scanning
tools to gather information by traversing roaming IPX interconnections and taking
advantage of the weakest link (equipment at one of the victim's MNOs).
This is why it is becoming increasingly important to take a moment to compare
telecom cybersecurity practices with those used in the traditional IT space. While an
initial assessment of security policies, frameworks, and safety regulations followed by
leading MNO groups will reveal that they are as strong and binding as any other top
ICT companies, this may not always be true. There are alarming security
vulnerabilities that could prove damaging to the entire system.
To understand the risks better let us examine a recent example of a security breach
disclosed by Vodafone. This leading MNO embraced the NIST framework for risk
management and cyber-security and included the supply chain as an exposure
source to be placed on RM. When Vodafone’s recently annual report was published, it
contained relevant information on security as part of a very structured way to assess
the binding laws and regulations for every market and its impacts on business and
actions performed. The document also disclosed information on cyber-attacks,
including a relevant third-party supplier attack that the company was made aware
of.
On the other hand, a disclosure from the supplier revealed that the attacker had
access to information about subscribers using roaming for years before being
discovered. Worst of all, due to the associated service being related to roaming,
attacker had access to MSISDN and IMSI lists of traveling subscribers. The group’s
figures are impressive – with 9,000 suppliers and 71 assessments of the supply chain,
why is this incident relevant?
Recommendations for MNOs
secgen.com
So, what then can be done to strengthen telecom supply chain security? While limiting
services in a highly competitive market is not the answer, neither is reinventing
something that took decades to standardize, stabilize and monetize. One option would
be to implement stringent security measures on the launch of new roaming services
such as:
Here are a few points to consider:
MSISDN and IMSI lists are personal data and although they cannot automatically
be connected to individuals, they may enable attacks to their privacy
Traveling subscribers are usually good value subscribers and the list includes
government and blue-chip customers
Vodafone reports the impacts for their subscribers was minimum, but we must
consider that other MNOs were affected and total amount of exfiltrated data is
not disclosed by the supplier
Once again, the complexity of the roaming interconnection impacts on security.
VoLTE and Vo5G roaming, rushed by the unplugging of 2G and 3G in some
countries
5G roaming
As far as ensuring security for networks with legacy protocols, SecurityGen always
recommends following the Inspect-Protect-Detect described on the NIST framework to
ensure that your risk management is performed in a proactive manner.
An old discussion regarding limitations of filtering on service border elements (STP and
DEA) always led to an argument on whether or not “if you keep your IMSI list secret,
further attacks are rare”. Most of us are aware that IMSI lists are available for sale on the
Dark Web. In fact, for those in the telecom supply chain security business, it is now
common knowledge that IMSI catchers and rogue NodeBs are built to collect
subscriber information. If these developments seem far-fetched, here is another fact
that might shock you:
secgen.com
There is strong evidence that MSISDN-IMSI lists were collected on the clearing house
between MNOS, meaning that even if you don’t use a specific provider, data from
your subscribers may have been already collected and sold, depending on the
visited network.
This information is both cause for alarm and a call for immediate remedial action. At
SecurityGen, we believe that using a NextGen Firewall that identifies and eliminates
new and existing threats in addition to IMSI collection is crucial for ensuring security. We
must recall that security through obscurity is neither useful nor acceptable in a
connected world. Your IMSIs may already have been compromised and mapped, so
let’s deal with the elephant in the room.
What about future roaming services?
Roaming security is about safely exposing telecom core assets to enable a seamless
experience for subscribers around the globe. Today, with many 2G and 3G networks
being decommissioned in the US, travelers from abroad may face an unexplainable
situation. They may find that while apps and smart functions continue to work, they
cannot receive regular phone calls from businesses or relatives that have not yet
moved to a fully digital mode.
While technically a VoLTE/Vo5G call in roaming is clearly possible but legacy fallback
was the easiest and also, the preferred way while it was available. If you are
implementing IMS access from roaming, you should see it as an opportunity of
validating its security beforehand.
5G roaming is a new frontier and while roaming providers and MNOs work on the
details of implementation and management, there is still time to establish a safe 5G
core architecture and assess the strength of its security across network functions.
While the costs for later corrections are always higher and some changes would
impact a whole distributed core at a single maintenance window, the smartest thing
to do at this point would be to act fast.
If 5G seems far from your reality, just consider security starts at the buying process, not
excluding any vendors but assuring they will propose and implement secure solutions.
The days where 3GPP release compliance were enough are gone. Today, including
both Telecom and IT best practices into your process have become an imperative.
secgen.com
UK | Italy | Czech Republic | Brazil | Mexico
India | South Korea | Japan | Malaysia | UAE
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global
start-up focused on telecom security.
We deliver a solid security foundation to
drive secure telecom digital
transformations and ensure next-gen
enterprise intelligent connectivity.
About SecurityGen Connect With Us
References
https://www.cisa.gov/supply-chain
https://www.enisa.europa.eu/publications/threat-landscape-for-supply-chain-att
acks
https://www.secgen.com/articles/SG_Article_LightBasin
https://thestack.technology/vodafone-supplier-hacked-syniverse-hack/
1
2
3
4

More Related Content

Similar to Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurity Gen
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
 
Why the VoLTE Rush?
Why the VoLTE Rush?Why the VoLTE Rush?
Why the VoLTE Rush?Security Gen
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurity Gen
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecuritySecurityGen1
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsSecurityGen1
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen1
 
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...SecurityGen1
 

Similar to Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance (20)

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Why the VoLTE Rush?
Why the VoLTE Rush?Why the VoLTE Rush?
Why the VoLTE Rush?
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security Services
 
Fb34942946
Fb34942946Fb34942946
Fb34942946
 
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
 

More from SecurityGen1

Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenSecurityGen1
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecurityGen1
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenSecurityGen1
 
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen1
 
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen1
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfUnleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfSecurityGen1
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenSecurityGen1
 
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...SecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfEmpowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfSecurityGen1
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurityGen1
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessSecurityGen1
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenSecurityGen1
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SecurityGen1
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen1
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfSecurityGen1
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallSecurityGen1
 
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecurityFortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecuritySecurityGen1
 
A Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfA Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfSecurityGen1
 

More from SecurityGen1 (20)

Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
 
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfUnleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGen
 
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfEmpowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to Success
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGen
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecurityFortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 Security
 
A Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfA Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdf
 

Recently uploaded

Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 

Recently uploaded (20)

Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 

Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance

  • 1. As telecom networks get more sophisticated, digital access and new technologies (5G) emerge, and cyberattacks continue to increase and evolve, posing a threat to telecommunications. Acknowledging this threat is the first step in your efforts to neutralizing it. Identifying, evaluating and managing the overall security posture of telecom supply chains must be an imperative goal not only for security teams, but also for the engineering and operation teams who work together to make seamless mobile communications possible. Today, however, ensuring telecom supply chain security is becoming more and more challenging. Those who have worked long enough in the telecom engineering space will understand the many reasons why a traditional IT approach to security does not offer enough protection to telecom. Among the many important reasons, some “telecom truths” perdured for years, like the following: MITIGATING RISKS IN TELECOM SUPPLY CHAIN SECURITY - A LONG OVERDUE DISCUSSION Traditional telecom security solutions redundant
  • 2. secgen.com Traditional IT tools work with standard apps that cannot assess new and evolving risks Many functions are isolated from internet access (as if this covered all risks) Mobile networks are not data centers – they have their own vulnerabilities The general public is unaware of critical telecom security protocols and standards Most of the above claims did not age well. You still need specialized tools and knowledge to assess Telecom security but with the convergence of Telecom and IT technologies, network devices that used to run on proprietary hardware with limited external connectivity have become a set of virtual machines connected by a collection of message buses that extend across countries. Roaming interconnectivity also connects these core elements to other mobile network operators (MNOs) with equivalent risks. In this scenario, an exposure of assets could result from a single badly typed command or a “temporary configuration” which later becomes part of the network and cannot be touched anymore. NPN Telecom Supply Chain Regulations The Cybersecurity & Infrastructure Security Agency (CISA) is a branch of the U.S. government that is focused on improving cybersecurity for the nation’s critical infrastructure, which includes telecom, utilities, public health, and logistics. According to CISA, ICT supply chain risks must be evaluated and measured keeping in mind not just the hardware and software but also the services managed by third-party vendors. This means that telecom companies who play the role of both critical infrastructure owners and service providers must, as part of their safety protocols, actively assess the security of their mobile networks and provide reasonable information and assurance of security standards to their customers. Similarly, the European Union Agency for Cybersecurity (ENISA) regularly develops and updates its regulations and standards for 5G security. Its stringent risk management guidelines list telecom supply chains as part of critical infrastructure for European countries.
  • 3. secgen.com Apart from the US and European Union, numerous other countries and regions have also created regulations and best practices – influenced by CISA and ENISA - to ensure the highest levels of security for telecom supply chains. Service Providers in Telecom EU ENISA Progress Threat focus Risk Identification Threat Focus Risk Management Guideline Standards Certification Compatability Risk Management Compatability Standards Virtualization (NVF) ICT Products Cloud Details Operating Networks Threat intelligence sharing ENISA threat landscape for 5G Networks Update of ENISA threat landscape for 5G Networks Cybersecurity of 5G networks EU Toolbox of risk migrating measures Guideline on Security Measures under the EECC 5G Supplement Security in 5G Specifications - Controls in 5GPP Methodology of Sectoral Cybersecurity Assessments Interoperable EU RISK Management Frame- work NVF Security in 5G 5G Cyber Security Standards Risk Management Standards EU ICT Products Common Criteria (draft) EU Cloud Services (ongoing) EU 5G Networks (ongoing) EU 5G Threat Intelligence Sharing (ongoing) 2019 2020 2021 1H/2022 2H/2022+ While recent supply chain attacks such as Solarwinds, Okta, Log4J gained notoriety within the global cyber-security community after they affected a wide range of ICT Companies, telecom-specific security incidents are not publicized much or investigated.
  • 4. secgen.com LightBasin, which we addressed earlier in our article, has already proved the point that roaming interconnection is not as safe as earlier believed. This cluster was able to emulate telecommunication protocols and used packet-capture and scanning tools to gather information by traversing roaming IPX interconnections and taking advantage of the weakest link (equipment at one of the victim's MNOs). This is why it is becoming increasingly important to take a moment to compare telecom cybersecurity practices with those used in the traditional IT space. While an initial assessment of security policies, frameworks, and safety regulations followed by leading MNO groups will reveal that they are as strong and binding as any other top ICT companies, this may not always be true. There are alarming security vulnerabilities that could prove damaging to the entire system. To understand the risks better let us examine a recent example of a security breach disclosed by Vodafone. This leading MNO embraced the NIST framework for risk management and cyber-security and included the supply chain as an exposure source to be placed on RM. When Vodafone’s recently annual report was published, it contained relevant information on security as part of a very structured way to assess the binding laws and regulations for every market and its impacts on business and actions performed. The document also disclosed information on cyber-attacks, including a relevant third-party supplier attack that the company was made aware of. On the other hand, a disclosure from the supplier revealed that the attacker had access to information about subscribers using roaming for years before being discovered. Worst of all, due to the associated service being related to roaming, attacker had access to MSISDN and IMSI lists of traveling subscribers. The group’s figures are impressive – with 9,000 suppliers and 71 assessments of the supply chain, why is this incident relevant?
  • 5. Recommendations for MNOs secgen.com So, what then can be done to strengthen telecom supply chain security? While limiting services in a highly competitive market is not the answer, neither is reinventing something that took decades to standardize, stabilize and monetize. One option would be to implement stringent security measures on the launch of new roaming services such as: Here are a few points to consider: MSISDN and IMSI lists are personal data and although they cannot automatically be connected to individuals, they may enable attacks to their privacy Traveling subscribers are usually good value subscribers and the list includes government and blue-chip customers Vodafone reports the impacts for their subscribers was minimum, but we must consider that other MNOs were affected and total amount of exfiltrated data is not disclosed by the supplier Once again, the complexity of the roaming interconnection impacts on security. VoLTE and Vo5G roaming, rushed by the unplugging of 2G and 3G in some countries 5G roaming As far as ensuring security for networks with legacy protocols, SecurityGen always recommends following the Inspect-Protect-Detect described on the NIST framework to ensure that your risk management is performed in a proactive manner. An old discussion regarding limitations of filtering on service border elements (STP and DEA) always led to an argument on whether or not “if you keep your IMSI list secret, further attacks are rare”. Most of us are aware that IMSI lists are available for sale on the Dark Web. In fact, for those in the telecom supply chain security business, it is now common knowledge that IMSI catchers and rogue NodeBs are built to collect subscriber information. If these developments seem far-fetched, here is another fact that might shock you:
  • 6. secgen.com There is strong evidence that MSISDN-IMSI lists were collected on the clearing house between MNOS, meaning that even if you don’t use a specific provider, data from your subscribers may have been already collected and sold, depending on the visited network. This information is both cause for alarm and a call for immediate remedial action. At SecurityGen, we believe that using a NextGen Firewall that identifies and eliminates new and existing threats in addition to IMSI collection is crucial for ensuring security. We must recall that security through obscurity is neither useful nor acceptable in a connected world. Your IMSIs may already have been compromised and mapped, so let’s deal with the elephant in the room. What about future roaming services? Roaming security is about safely exposing telecom core assets to enable a seamless experience for subscribers around the globe. Today, with many 2G and 3G networks being decommissioned in the US, travelers from abroad may face an unexplainable situation. They may find that while apps and smart functions continue to work, they cannot receive regular phone calls from businesses or relatives that have not yet moved to a fully digital mode. While technically a VoLTE/Vo5G call in roaming is clearly possible but legacy fallback was the easiest and also, the preferred way while it was available. If you are implementing IMS access from roaming, you should see it as an opportunity of validating its security beforehand. 5G roaming is a new frontier and while roaming providers and MNOs work on the details of implementation and management, there is still time to establish a safe 5G core architecture and assess the strength of its security across network functions. While the costs for later corrections are always higher and some changes would impact a whole distributed core at a single maintenance window, the smartest thing to do at this point would be to act fast. If 5G seems far from your reality, just consider security starts at the buying process, not excluding any vendors but assuring they will propose and implement secure solutions. The days where 3GPP release compliance were enough are gone. Today, including both Telecom and IT best practices into your process have become an imperative.
  • 7. secgen.com UK | Italy | Czech Republic | Brazil | Mexico India | South Korea | Japan | Malaysia | UAE Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure next-gen enterprise intelligent connectivity. About SecurityGen Connect With Us References https://www.cisa.gov/supply-chain https://www.enisa.europa.eu/publications/threat-landscape-for-supply-chain-att acks https://www.secgen.com/articles/SG_Article_LightBasin https://thestack.technology/vodafone-supplier-hacked-syniverse-hack/ 1 2 3 4