Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of...

Preview:

Citation preview

Presentation SlidesPermission to use with attribution

to ‘5G Americas’ is granted.

“5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security central to this monumental technology. Mobile Network operators and their vendor partners have always and will continue to put security as a top priority for their networks.”

Chris Pearson, President, 5G Americas

“Security has been designed and incorporated into 5G standards. A strategic approach is taken related to cloud-native services, open-source software, APIs, SDN, and NFV, which together provide greater overall 5G network security.”

David Krauss, Principal Network Architect for Ciena

Monolithic versus

Disaggregated Architecture

Evolution from network appliances to virtualization

5G RAN splits

resulting in fronthaul,

midhaul and backhaul

5G Non-Standalone Architecture

5G Standalone Architecture

System Architecture for 5G SMS over NAS

UE

AMF

UDM

SMSF(SMS Function)

N1

N20

N8

to/from SMS-GMSC/IWMSCSMS Router

to/from SMS-GMSC/IWMSCSMS Router

N21to/from IP-SM-GW

to/from SGs MSC

SDN Architecture and 5G

Comparison of 4G and

5G NR Architecture

Efficiencies and Threats for an Open

5G RAN Architecture

Threat Intelligence

Layers

Unsupervised Machine LearningSupervised Machine LearningBehavior Analysis/Anomaly DetectionHeuristics AnalysisMalware Signatures/File HashesThreat Reputation - DomainsThreat Reputation - IP Addresses

Indicators of Compromise (IoC)

Automated Threat Intelligence (ATI)

Non-roaming

reference architecture from 3GPP

23.501

SECaaSbuilt upon Network Slicing

Zero-Trust Validation checks required at both the hardware and software layers

Recommended