SlideShare a Scribd company logo
-
-
-
-
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and power
efficiency meet or surpass corporate and industrial requirements, and research
companies announce the dawning of the Private 4G and 5G era. In fact, some
researchers point out that the market for private 5G shall be bigger than public 5G.
But this should be taken with caution, as networks are built and players evolve, there
are still no winners on this race.
Focusing on 5G, the first decision for Corporate Management is not a simple “Make
or Buy”, but rather how much responsibility I want on the network deployment and
management and how much segregation does my business require?
Enterprise migration to a much more flexible wireless network which may be built
and optimized for latency, low energy consumption or throughput (not the main
motivator) according to specific requirements is expected. Next step is planning
this migration.
PRIVATE 5G NETWORKS
(AND HOW TO SECURE
THOSE)
secgen.com
Main options so far are:
Procure a Private Network from a local MNO (which has several models on itself)
Procure a “NPN As a Service” from a Vendor/Hyperscaler and deploy only 5G NR
elements, possibly using public spectrum
Buy a full Private Network which will be deployed on premises and require 24x7
support with a good SLA.
Each one brings security challenges and, as a minimum, companies need to follow
their due diligence towards their supply chain, validating that service providers’
security measures are in place and any breaches must be reported to customer,
on contract.
Model
PNI-NPN
NPN as A Service
NPN
Enterprise Responsibilities Provider Responsibilities Security
Enterprise or industrial
endpoints, evaluating and
monitoring Security of
MNO
Enterprise or industrial
endpoints, evaluating and
monitoring Security of
Service Provider.
Also Management and
Operation of RAN elements
and some Core elements
(e.g.: UPF) depending on
the integration scenario.
Both IT/OT and Telco
solutions
All Mobile Network
Infrastructure, availability,
Security Lifecycle and
endpoint activation.
This is the only option
where spectrum is already
paid for. The others may
incur on additional costs
or use of shared frequen-
cy bands
Usually, 5G Core Functions
and RAN control.
This may not be the best
fit for big plants or
company campuses, but
rather useful for smaller
business.
Software/Hardware
Delivery and Support
100% on MNO
to provide the
Security but
Enterprise
must validate
and, when
applicable,
audit.
Shared,
according to
the integration
level.
100% on
Enterprise
MNO Private Network Offer (PNI-NPN)
secgen.com
This is for sure the fastest and low-touch option in case your site already has 5G
coverage. Used for both industry and logistics companies (warehouses and ports, for
instance), the level of delegation may vary from 100% as a Service to just the 5G radio
part, as shown in Ericsson’s value proposition reproduced below.
One company may just pay for a slice using dedicated resources from the MNO (T1),
might decide to build its own RAN (T2) and so on. Even on T6 model, the company may
buy project, operation and support from the Operator, which in some countries act as
the solution Integrator as well.
5G As a Service (or NPNaAS)
Hyperscalers proposals roam between T2 and T3 models, depending on the company
requirements, especially local data breakout for accessing internal systems and/or
Internet with low latency and high capacity.
In some cases, Hyperscalers might try also to host those systems as an additional
service.
On
Enterprise
premise
Ericsson
components
Reuse of MNO network assets
T1
Total slicing
T2
Local RAN +
Core slicing
T3
T2 + Local data
breakout
T4
T3 + PTT
T5
T4 + Unified
Communications
T6
Full network
on premise
(isolated)
Integrated Deployment Isolated
Deployment
RAN
Outdoor/indoor
EPC
RAN
Outdoor/indoor
RAN
Outdoor/indoor
RAN
Outdoor/indoor
RAN
Outdoor/indoor
EPC EPC EPC
Push to Talk Push to Talkj +
IMS
Push to Talkj +
IMS
HSS HSS
Only Local
management
Private 5G Network (NPN)
secgen.com
The case for T6 may be somewhat rare because just a few scenarios that really
require it:
Law enforcement communication networks for events: Available independent of
public network load, specific privacy requirements, etc.
Agricultural plants so big that are poorly covered or even not covered by public
networks. Although those might be surprised by some specific initiatives from
both MNOs and heavy machinery vendors
Mining plants which require kilometers of indoor coverage
Owning a network means Operational Costs that may be equivalent or bigger than
paying for it “as a service”.
Also, depending on the country, companies must pay for a spectrum license or use
shared spectrum subject to future interference as new networks and services are
implemented. When you consider the logistics use case, spectrum licensing across
many sites may become a burden as well.
Security of a Private 5G Network
There are many security features available from the specification. Enterprise and
industry must assure they are enabled on their environments. For a non-exhaustive
list:
SUPI concealing, meaning that the unique Id of a subscription and its keys are not
openly transmitted on the air interface.
IPSec enabled for Backhaul to assure no interception is possible between RAN and
Core. Even more relevant if your Core is hosted externally.
Encrypt both Control and User Plane on the Air Interface to assure confidentiality
and integrity of transmitted data.
Security Process
secgen.com
Possibly the hardest part on private networks is to keep those safe for the entire
lifecycle. This may become a relevant argument for PNI-NPN and NPNaAS, since the
technology keeper must assure the integrity and availability of assets from:
Our research has identified threats to the 5G Core not covered by the Standards and
that must be taken in consideration. We may support MNOs for a safer 5G Service
Telco Cloud Security recommendations also apply since 5G is Cloud Native.
In a nutshell, Telco Cloud is the base virtualization infrastructure that makes 5G viable.
It supports all Core Functions and recently a huge part of the RAN, in case Open RAN
is implemented. Nevertheless, technologies were not re-created but instead
absorbed from IT Virtualization vendors, as well as COTS x86 servers and Data
Switches.
All those parts and its Management and Orchestration layers add complexity to the
5G ecosystem as well as further domains for Vulnerability Management.
For details and additional insights, specific articles we have written on the subject are
available.
Onboarding of new Functions or releases
Hardening of OS, Hypervisors, Management Systems and VNFs
Assuring the designed Network Architecture is kept and evolve according to new
requirements
SOC integration and active monitoring
Robust Change Management and Vulnerability Management processes
secgen.com
All those tasks are complex, and even more because several vendors are used on the
building of a 5G Network. Not all companies might want to build a new team or
specialize a current one in Telecom Networks and Telecom Security. The latter is so rare
that we are usually requested to recommend or support on the hiring of new
professionals even for MNOs.
The usage of Private 4G/5G in Industry includes new elements and borders to be
Assessed for Security:
Industrial risks
IT environment
security assessment
Pentesters
Team 2
External pentest
Internal pentest
Social engineering
4g/5g security assessmet
Wireless
Local users
OT environment
Local network
point
of access
point
of access
point
of access
Pentesters
Team 1
OT environmenmt
security assessment
Internet
The usual temprary glimpse on service or traffic speed noticed sometimes in heavily
loaded Public Networks are a nuisance for subscriber during special events such as
New Year’s Eve or huge concerts. While serving an industrial plant, the lack of availability
or capacity for Real-time transmission could impact on profits and create physical
hazards for the plant itself and its workers.
Security Assessment on the RAN and its redundancy comes as a minimum set of
actions to be considered to mitigate attacks on that layer. Constant monitoring of RAN
exceptions is also recommended.
secgen.com
Additional Assessments such as pentesting through the external connections (5GaAS,
for instance) and internal testing must be performed to ensure the network was built
securely and mitigate attack risks.
Any external access must be performed through VPNs and authenticated for both
users and endpoints.
Whenever MQTT is used, MQTTS is advised and a MQTT firewall may prevent an attacker
of introducing harming conditions into the environment, bad data into controlling
application and cause damages.
And as it cannot be stressed enough: ICS should not have a straight unfiltered
connection to Corporate Datacenter. No matter the costs or use cases.
IoT devices are numerous and must be cost-effective according to each application.
That being said, they are unlikely to support EDRs or other IT-positioned solutions. Each
device must be secured on design phase and assessed before usage on an industrial
network.
Known threats for OT/ICS:
Management and Control Plane Attack
Management and Control Plane Attack
Zero day and DdoS attacks
Lateral Movement and Malware attack
Usage of unsecure protocols
Network Hardware vulnerabilities
Network Perimeter vulnerabilities
Equipment pivoting
Transmission Poisoning / altering
Mngt networks are exposed to the same advanced threats and
attacks as business system
Plethora of devices are subject to unknown threats
Compromise host by host, typical from malware
Non secured sessions i.e. DNP3, Modbus, IEC 1xx are non secure by
design.
Plenty of devices with non mitigated / patched vulnerabilities
Inadequate physical protection of network equipment
Plenty of devices with non mitigated / patched vulnerabilities
Industrial devices used as tele command to control other
processes / devices
secgen.com
To achieve those, besides following the best practices and 5G standards, a relevant
font of information is NESAS (Network Equipment Security Assurance Scheme) from
GSMA. According to it, some key Network Functions must be verified against previously
undealt threats.
Authentication and key agreement procedure (Synchronization handling, RES*
verification failure)
Security mode command procedure (Replay protection of NAS, NAS integrity
algorithm selection)
5G-GUTI allocation
Invalid or unacceptable UE security capabilities handling
Validation of S-NSSAIs in PDU session establishment request
AMF
UPF
Confidentiality, integrity, replay protection of user data transported over N3 interface
NRF
NF discovery authorization for specific slice
The eUICC/eSIM enrollment procedure and physical cards procedures for Private
Networks must be monitored and controlled. Preferably using different provisioning
chains and with much more limited access control. SIM Swapping on enterprise or an
industrial plant may turn into huge losses for customers.
MNOs must perform periodic security assessments related to elements that serve the
NPN slices and provide evidence for customers’ due diligence.
UK | Italy | Czech Republic | Brazil | Mexico
India | South Korea | Japan | Malaysia
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global
start-up focused on telecom security.
We deliver a solid security foundation to
drive secure telecom digital
transformations and ensure next-gen
enterprise intelligent connectivity.
About SecurityGen Connect With Us
Recommendations for MNOs
The base for Private Networks in PNI-NPN model is about slicing, isolation, and secure
integration to enterprise customers.

More Related Content

PDF
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
PDF
Securing the 5G growth story with NFVi (1).pdf
PDF
Securing the 5G growth story with NFVi.pdf
PDF
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
PDF
Securing the 5G growth story with NFVi (1).pdf
PDF
Securing the 5G growth story with NFVi.pdf
PDF
Public Internet WAN
PDF
Public Internet WAN
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi.pdf
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi.pdf
Public Internet WAN
Public Internet WAN

Similar to Securing Private 5G Networks (1).pdf (20)

PDF
Best 5G Security Solutions - SecurityGen
PDF
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
PDF
5G Security Program Datasheet (2).pdf
PDF
5G Security Program -Case Studies
PDF
Best 5G Security Solutions - SecurityGen
PDF
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
PDF
5G Security Program Datasheet (2).pdf
PDF
5G Security Program -Case Studies
PDF
Private-Enterprise-Networks.pdf
PDF
Private-Enterprise-Networks.pdf
PPTX
Security course: exclusive 5G SA pitfalls and new changes to legislation
PPTX
Security course: exclusive 5G SA pitfalls and new changes to legislation
PPTX
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
PPTX
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
PDF
An analysis of the security needs
PDF
An analysis of the security needs
PDF
Network Slicing_Affirmed-Networks for telecom.pdf
PDF
Network Slicing_Affirmed-Networks for telecom.pdf
PDF
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
PDF
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Best 5G Security Solutions - SecurityGen
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
5G Security Program Datasheet (2).pdf
5G Security Program -Case Studies
Best 5G Security Solutions - SecurityGen
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
5G Security Program Datasheet (2).pdf
5G Security Program -Case Studies
Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdf
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
An analysis of the security needs
An analysis of the security needs
Network Slicing_Affirmed-Networks for telecom.pdf
Network Slicing_Affirmed-Networks for telecom.pdf
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Ad

More from Security Gen (20)

PDF
Protect Your Network_ Invest in Telco Security Solutions Today
PDF
Unlock the Future: SecurityGen's 5G Standalone Solutions
PDF
Address 5G Vulnerabilities with SecurityGen's Expert Solution
PDF
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
PDF
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
PDF
SecurityGen - Your Shield Against Cyber Threats
PDF
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
PDF
Why the VoLTE Rush?
PDF
Shield Your Network: Prevent DDoS Attacks with SecurityGen
PDF
Fake BTS Network Vulnerabilities
PDF
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
PDF
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
PDF
ACE: ARTIFICIAL CYBERSECURITY EXPERT
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
IDS: INTRUSION DETECTION SYSTEM PLATFORM
PDF
NGFW - An Updated Overview
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
SecurityGen-IDS_case_study.pdf
Protect Your Network_ Invest in Telco Security Solutions Today
Unlock the Future: SecurityGen's 5G Standalone Solutions
Address 5G Vulnerabilities with SecurityGen's Expert Solution
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen - Your Shield Against Cyber Threats
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
Why the VoLTE Rush?
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Fake BTS Network Vulnerabilities
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
ACE: ARTIFICIAL CYBERSECURITY EXPERT
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
IDS: INTRUSION DETECTION SYSTEM PLATFORM
NGFW - An Updated Overview
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
SecurityGen-IDS_case_study.pdf
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced IT Governance
PDF
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced IT Governance
Chapter 3 Spatial Domain Image Processing.pdf

Securing Private 5G Networks (1).pdf

  • 1. - - - - Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution a great promise in fact made some MNOs and Fixed Service Providers to build their own “complementary” Wi-Fi networks, especially due to the high costs on 3G deployment. During the 4G rollout, technology evolution has tilted the scale back for MNOs, but Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now challenging this reality. The specifications for reliability, high speed, low latency, high density, and power efficiency meet or surpass corporate and industrial requirements, and research companies announce the dawning of the Private 4G and 5G era. In fact, some researchers point out that the market for private 5G shall be bigger than public 5G. But this should be taken with caution, as networks are built and players evolve, there are still no winners on this race. Focusing on 5G, the first decision for Corporate Management is not a simple “Make or Buy”, but rather how much responsibility I want on the network deployment and management and how much segregation does my business require? Enterprise migration to a much more flexible wireless network which may be built and optimized for latency, low energy consumption or throughput (not the main motivator) according to specific requirements is expected. Next step is planning this migration. PRIVATE 5G NETWORKS (AND HOW TO SECURE THOSE)
  • 2. secgen.com Main options so far are: Procure a Private Network from a local MNO (which has several models on itself) Procure a “NPN As a Service” from a Vendor/Hyperscaler and deploy only 5G NR elements, possibly using public spectrum Buy a full Private Network which will be deployed on premises and require 24x7 support with a good SLA. Each one brings security challenges and, as a minimum, companies need to follow their due diligence towards their supply chain, validating that service providers’ security measures are in place and any breaches must be reported to customer, on contract. Model PNI-NPN NPN as A Service NPN Enterprise Responsibilities Provider Responsibilities Security Enterprise or industrial endpoints, evaluating and monitoring Security of MNO Enterprise or industrial endpoints, evaluating and monitoring Security of Service Provider. Also Management and Operation of RAN elements and some Core elements (e.g.: UPF) depending on the integration scenario. Both IT/OT and Telco solutions All Mobile Network Infrastructure, availability, Security Lifecycle and endpoint activation. This is the only option where spectrum is already paid for. The others may incur on additional costs or use of shared frequen- cy bands Usually, 5G Core Functions and RAN control. This may not be the best fit for big plants or company campuses, but rather useful for smaller business. Software/Hardware Delivery and Support 100% on MNO to provide the Security but Enterprise must validate and, when applicable, audit. Shared, according to the integration level. 100% on Enterprise
  • 3. MNO Private Network Offer (PNI-NPN) secgen.com This is for sure the fastest and low-touch option in case your site already has 5G coverage. Used for both industry and logistics companies (warehouses and ports, for instance), the level of delegation may vary from 100% as a Service to just the 5G radio part, as shown in Ericsson’s value proposition reproduced below. One company may just pay for a slice using dedicated resources from the MNO (T1), might decide to build its own RAN (T2) and so on. Even on T6 model, the company may buy project, operation and support from the Operator, which in some countries act as the solution Integrator as well. 5G As a Service (or NPNaAS) Hyperscalers proposals roam between T2 and T3 models, depending on the company requirements, especially local data breakout for accessing internal systems and/or Internet with low latency and high capacity. In some cases, Hyperscalers might try also to host those systems as an additional service. On Enterprise premise Ericsson components Reuse of MNO network assets T1 Total slicing T2 Local RAN + Core slicing T3 T2 + Local data breakout T4 T3 + PTT T5 T4 + Unified Communications T6 Full network on premise (isolated) Integrated Deployment Isolated Deployment RAN Outdoor/indoor EPC RAN Outdoor/indoor RAN Outdoor/indoor RAN Outdoor/indoor RAN Outdoor/indoor EPC EPC EPC Push to Talk Push to Talkj + IMS Push to Talkj + IMS HSS HSS Only Local management
  • 4. Private 5G Network (NPN) secgen.com The case for T6 may be somewhat rare because just a few scenarios that really require it: Law enforcement communication networks for events: Available independent of public network load, specific privacy requirements, etc. Agricultural plants so big that are poorly covered or even not covered by public networks. Although those might be surprised by some specific initiatives from both MNOs and heavy machinery vendors Mining plants which require kilometers of indoor coverage Owning a network means Operational Costs that may be equivalent or bigger than paying for it “as a service”. Also, depending on the country, companies must pay for a spectrum license or use shared spectrum subject to future interference as new networks and services are implemented. When you consider the logistics use case, spectrum licensing across many sites may become a burden as well. Security of a Private 5G Network There are many security features available from the specification. Enterprise and industry must assure they are enabled on their environments. For a non-exhaustive list: SUPI concealing, meaning that the unique Id of a subscription and its keys are not openly transmitted on the air interface. IPSec enabled for Backhaul to assure no interception is possible between RAN and Core. Even more relevant if your Core is hosted externally. Encrypt both Control and User Plane on the Air Interface to assure confidentiality and integrity of transmitted data.
  • 5. Security Process secgen.com Possibly the hardest part on private networks is to keep those safe for the entire lifecycle. This may become a relevant argument for PNI-NPN and NPNaAS, since the technology keeper must assure the integrity and availability of assets from: Our research has identified threats to the 5G Core not covered by the Standards and that must be taken in consideration. We may support MNOs for a safer 5G Service Telco Cloud Security recommendations also apply since 5G is Cloud Native. In a nutshell, Telco Cloud is the base virtualization infrastructure that makes 5G viable. It supports all Core Functions and recently a huge part of the RAN, in case Open RAN is implemented. Nevertheless, technologies were not re-created but instead absorbed from IT Virtualization vendors, as well as COTS x86 servers and Data Switches. All those parts and its Management and Orchestration layers add complexity to the 5G ecosystem as well as further domains for Vulnerability Management. For details and additional insights, specific articles we have written on the subject are available. Onboarding of new Functions or releases Hardening of OS, Hypervisors, Management Systems and VNFs Assuring the designed Network Architecture is kept and evolve according to new requirements SOC integration and active monitoring Robust Change Management and Vulnerability Management processes
  • 6. secgen.com All those tasks are complex, and even more because several vendors are used on the building of a 5G Network. Not all companies might want to build a new team or specialize a current one in Telecom Networks and Telecom Security. The latter is so rare that we are usually requested to recommend or support on the hiring of new professionals even for MNOs. The usage of Private 4G/5G in Industry includes new elements and borders to be Assessed for Security: Industrial risks IT environment security assessment Pentesters Team 2 External pentest Internal pentest Social engineering 4g/5g security assessmet Wireless Local users OT environment Local network point of access point of access point of access Pentesters Team 1 OT environmenmt security assessment Internet The usual temprary glimpse on service or traffic speed noticed sometimes in heavily loaded Public Networks are a nuisance for subscriber during special events such as New Year’s Eve or huge concerts. While serving an industrial plant, the lack of availability or capacity for Real-time transmission could impact on profits and create physical hazards for the plant itself and its workers. Security Assessment on the RAN and its redundancy comes as a minimum set of actions to be considered to mitigate attacks on that layer. Constant monitoring of RAN exceptions is also recommended.
  • 7. secgen.com Additional Assessments such as pentesting through the external connections (5GaAS, for instance) and internal testing must be performed to ensure the network was built securely and mitigate attack risks. Any external access must be performed through VPNs and authenticated for both users and endpoints. Whenever MQTT is used, MQTTS is advised and a MQTT firewall may prevent an attacker of introducing harming conditions into the environment, bad data into controlling application and cause damages. And as it cannot be stressed enough: ICS should not have a straight unfiltered connection to Corporate Datacenter. No matter the costs or use cases. IoT devices are numerous and must be cost-effective according to each application. That being said, they are unlikely to support EDRs or other IT-positioned solutions. Each device must be secured on design phase and assessed before usage on an industrial network. Known threats for OT/ICS: Management and Control Plane Attack Management and Control Plane Attack Zero day and DdoS attacks Lateral Movement and Malware attack Usage of unsecure protocols Network Hardware vulnerabilities Network Perimeter vulnerabilities Equipment pivoting Transmission Poisoning / altering Mngt networks are exposed to the same advanced threats and attacks as business system Plethora of devices are subject to unknown threats Compromise host by host, typical from malware Non secured sessions i.e. DNP3, Modbus, IEC 1xx are non secure by design. Plenty of devices with non mitigated / patched vulnerabilities Inadequate physical protection of network equipment Plenty of devices with non mitigated / patched vulnerabilities Industrial devices used as tele command to control other processes / devices
  • 8. secgen.com To achieve those, besides following the best practices and 5G standards, a relevant font of information is NESAS (Network Equipment Security Assurance Scheme) from GSMA. According to it, some key Network Functions must be verified against previously undealt threats. Authentication and key agreement procedure (Synchronization handling, RES* verification failure) Security mode command procedure (Replay protection of NAS, NAS integrity algorithm selection) 5G-GUTI allocation Invalid or unacceptable UE security capabilities handling Validation of S-NSSAIs in PDU session establishment request AMF UPF Confidentiality, integrity, replay protection of user data transported over N3 interface NRF NF discovery authorization for specific slice The eUICC/eSIM enrollment procedure and physical cards procedures for Private Networks must be monitored and controlled. Preferably using different provisioning chains and with much more limited access control. SIM Swapping on enterprise or an industrial plant may turn into huge losses for customers. MNOs must perform periodic security assessments related to elements that serve the NPN slices and provide evidence for customers’ due diligence. UK | Italy | Czech Republic | Brazil | Mexico India | South Korea | Japan | Malaysia Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure next-gen enterprise intelligent connectivity. About SecurityGen Connect With Us Recommendations for MNOs The base for Private Networks in PNI-NPN model is about slicing, isolation, and secure integration to enterprise customers.