etsi security week 2020 goes virtual!

48
Presented by: © ETSI ETSI Security Week 2020 goes virtual! Marcus Wong Futurewei Silke Holtmanns, AdaptiveMobile Security Pieter Veenstra, Net Number Deploying 5G Securely 5G Deployment

Upload: others

Post on 02-Nov-2021

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ETSI Security Week 2020 goes virtual!

Presented by:

© ETSI

ETSI Security Week 2020 goes virtual!

Marcus Wong FutureweiSilke Holtmanns, AdaptiveMobile SecurityPieter Veenstra, Net Number

Deploying 5G Securely5G Deployment

Page 2: ETSI Security Week 2020 goes virtual!

ETSISecurity

Week 2020

Monday 8 June3pm

5G Deployment

Tuesday 9 June

3pm CET

SSP: The New Smart Secure Platform - A High Level Introduction

4.45pm

SSP: The New Smart Secure Platform - The Technical Realisation

Wednesday 10 June10.30am

Insight into the First Steps of the Cybersecurity Act Reality

3pm

5G Security for Verticals

Thursday 11 June10.00am

Consumer IoT Security Standards

11.30am

Consumer IoT Security –Certification Schemes

3pm

ETSI Standardization in Advanced Cryptography

Monday 15 June

3pm

SKINNY LATTE: Scalable Hierarchical Identity Based Encryption over Lattices

Tuesday 16 June3pm

5G Security Evolution

Wednesday 17 June10.30am

5G Network Certification

Thursday 18 June10.00am

Security Challenges and Regulatory Aspects

3pm

Fully Homomorphic Encryption

Friday 19 June

10.30am

Industry Applications and Use Cases for Advance Cryptography

Deploying 5G Securely

Cybersecurity Act –one year on

Smart Secure Platform

Even more advanced Cryptography

scheduled in CEST

Page 3: ETSI Security Week 2020 goes virtual!

© ETSI ETSI Security Week 2020 goes virtual

5G Deployment Moderated by Marcus Wong, Futurewei

Secure Core Network MigrationSilke Holtmanns, AdaptiveMobile Security

GSMA Investigation on 5G Security – Tracking Security Open IssuesPieter Veenstra, Net Number

Page 4: ETSI Security Week 2020 goes virtual!

© Copyright 2020. All rights Reserved.

Secure Core Network Migration

Silke Holtmanns

ETSI Security Week 2020

Page 5: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 5

5G Deployment Status

Page 6: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 6

5G Deployment Status

MA 5G IC

Page 7: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 7

Resistance is futile

+ =3G/4G Core

Point-to-point

Operational Network

Support for legacy

5G Core

Service Based Architecture

Page 8: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 8

Attackers think differently

Diameter FW

SS7 FW

SEPP

2G attack

5G attack

3G/4G attack

Subscriber Database

MobilityHandling

Policy & Charging

Data SessionHandling

Attacker

Page 9: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 9

MNO45G NSA

IPX Ecosystem

Home Network Visited Networks

MNO25G SA

Interconnection Network (IPX)

MNO14G

IPX Provider

Roaming Hub

Partners and potential message paths

Value Added Service Provider

MNO32G-3G

Page 10: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 10

• Normal Outbound Roaming Scenario• Home routed traffic is assumed

• Home Network has a 5G core with support for “4G legacy”

• Visited partner network has 4G and 5G RAN with dual core• User plane traffic is routed via home-network

• User starts a browsing session in his vacation

Migration Scenario 1 – Mobility Migration (HR)

Page 11: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 11

HSS + UDM

AMF

E-UTRAN

MME

hPCF

HOME NETWORK

VISITED NETWORKSGW

N26

N8

NG-RAN

S1_MME

Uu

S6a

S11

S1_U

S8_U

S8_C

N15

N11

N4

N7

N3 N2 N1

N10

UPF

N9

vSMF vPCF

N16 N24

Mobility Management Migration(home-routed)

SEPPFine tuned

Diameter FWFine tuned GTP_C FW

PGW_U + UPF

PGW_C + SMF

User Planeprotection

Page 12: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 12

•Outbound roaming scenario

• Usage of “legacy” 4G-based Non-3GPP access at a partner

• Home network supports legacy

• Traffic is home-routed

• Architecture for interworking between 4G ePDG/EPC and 5GS

Migration Scenario 2 – 4G Supported Non-3GPP Access

Page 13: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 13

AMFePDG

3GPP AAA

Server

N8

NG-RAN

SWx

N10

S2b-US2b-C

N15

N9

N24

N4

N11

N3N2

N1

N16

3GPP AAA Proxy

SWm

SWd

S6b

vPCFvSMF

UPF

Interworking between ePDG/EPC and 5GS

VISITED NETWORK

HOME NETWORK

Fine tuned Diameter FW

Fine tuned GTP-C FW

SEPP

HSS + UDM

hPCF

PGW_U + UPF

PGW_C + SMF

User Plane protection

Page 14: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 14

• 4G User Data Repository (UDR) in place

• HSS used to support 4G “legacy” core

• 5G Unified Data Management (UDM) “frontend” in place

• 5G User Data Repository (UDR) “frontend” in place

• Addressing of HSS using a REST API Nhss

Migration Scenario 3: Subscriber Database Migration

Page 15: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 15

4G EPS-UDR5G-UDR

S6a, S6d, S6c, SLhSWx

SBI

NU1

Ud

NU2

Sh, Si, Cx, N70/N71

N2

N16

5G UDM

N8/N10/N13/N21/N52/NL6

N26 (non-SBA)

N35

4G HSS

5G Core 4G EPC IMS

Gx, Gxe, Sgi, Dx

Gm, Rx (non-HSS related traffic)

Database Migration

NhssREST API

SEPP

Page 16: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 16

IMS integration to 5G SBA

5G System IMS Domain

NRF

ALG/AGW

PCF

UPF

SEPP

HSS

UDM

AMF

Service Based Architecture (SBA)

SMF

TAS

S-CSCF

P-CSCF

I-CSCF

IMS

AF

IBCF/THIG

Gm

Sh, Cx

5G-UDR

Page 17: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 17

Migration Threats – Countermeasures – Your toolbox

• SS7 attacks

• Diameter attacks

• 5G attacks

• New attack vectors

& changing attacks

• Bad configuration /

operation

• GTP attacks

• Bad user traffic

• Bad security quality

• SS7 Firewall (incl. CAMEL)

• Diameter Signaling FW

• SEPP

• Threat intelligence,

update service & research

• Regular pentesting /

scanning

• GTP-C Firewall

• GTP-U traffic scanner

• 3GPP & GSMA SCAS

Page 18: ETSI Security Week 2020 goes virtual!

© Copyright 2019. All rights Reserved. 18

• Migration plans for core network need to consider:

• Make a plan on interfaces and what protocols they support

• Each protocol needs its own protection

• Some existing firewall can be adjusted

• Correlate attacks to see if attacks use a toolbox

• Assume that your defenses are breached at some point and prepare for “containing” the attack

• Dynamic evolution with the migration

• How are you partner evolving?

• Fine tune security along with their evolution

• Threat intelligence and evolution to counter attacks immediately

Conclusion

Page 19: ETSI Security Week 2020 goes virtual!

© Copyright 2020. All rights Reserved.

More details?

16.6.2020White Paper & Webinar https://event.on24.com/wcc/r/2380247/025BEC344908A8D628515F13C86A4D52?partnerref=adaptivemobile

[email protected]

Page 20: ETSI Security Week 2020 goes virtual!

© ETSI ETSI Security Week 2020 goes virtual

Presenter: Pieter Veenstra, Net NumberGSMA Investigation on 5G Security – Tracking Security Open Issues

Page 21: ETSI Security Week 2020 goes virtual!

Associate Member

Pieter Veenstra

NetNumber - Senior Manager Product Development

GSMA – FASG RIFS Chair

http://www.linkedin.com/in/pkveenstra

GSMA INVESTIGATION 5G SECURITYTracking Security Open Issues

Page 22: ETSI Security Week 2020 goes virtual!

22

Associate Member

SESSION OVERVIEW

• Snapshot NetNumber

• GSMA investigation 5G Security

• Why is 5G Security needed?

• What changes with 5G Security?

• When does 5G become safer than LTE?

• Take-Aways

• Best Practices

Page 23: ETSI Security Week 2020 goes virtual!

23

Associate Member

NetNumber Snapshot

Trusted by 200+ global customers

Unique Software Platform TITAN

Enables Network Transformation,

reduces CAPEX, OPEX and Time to Market

Solutions from 2G – 5G, Private LTE IoT/M2M

Main offices in Boston, Frankfurt, Prague & Warsaw

220 Employees Presence in 22+ countries

Founded 1999

Changing Future of Telco Networks

Eliminate latency, Simplify signaling core, Bundled

apps, Data

Mobile Network

Operators

Fixed Line Operators Cable

Enterprise / Cloud IoT / M2M

P-LTE forEnterprise,

Govt, Utilities, Satellite

Our Customer Segments

February 2020 Finalist “Best Mobile Authentication

& Security Solution”

June 2019 Winner, “Best Network Security

Technology” Associate Member

Page 24: ETSI Security Week 2020 goes virtual!

24

Associate Member

Customer and Partner Snapshot

16 out of 20 largest Global Telcos and 18 IPX carriers use NetNumber TITAN

MEA & Asia

North & South America

Europe Partners

Page 25: ETSI Security Week 2020 goes virtual!

25

Associate Member

Scope

• Initial focus issues in 3GPP Release 15

• Where applicable listing refinements and open issues in 3GPP Release 16

Purpose

• Collect 5G security open issues relevant to GSMA members

• Per issue sketch of context and problem

• Track per issue if resolved in standards or to be covered by GSMA guidelines

GSMA Activity

• Initiative kicked-off end 2017 in FSAG

• Overview with guidelines in PRD FS.40

Tracking Security Open Issues

Investigation 5G Security

Associate Member

Page 26: ETSI Security Week 2020 goes virtual!

Associate Member

Why is 5G Security needed?NetNumber as a Trusted Advisor

Page 27: ETSI Security Week 2020 goes virtual!

27

Associate Member

Why is 5G Security needed?

GDPR = General Data Protection Regulation

• High trust as 5G will become a critical

asset with the digital transformation of

our society and industry

• Stricter information privacy rules and

data protection legislation (EU GDPR)

• Mandatory encryption of all information

transfer as 5G networks are built with

layered and virtualized technologies

• Considering the limitations of SS7 and

risks for our customers, we won’t

survive another network generation

without operator-to-operator security

Page 28: ETSI Security Week 2020 goes virtual!

28

Associate Member

The earlier 2G/3G and 4G/LTE mobile networks …

Source GSMA: 5G status update

Page 29: ETSI Security Week 2020 goes virtual!

29

Associate Member

… but the 5G Core network will look very different

Source GSMA: 5G status update

Page 30: ETSI Security Week 2020 goes virtual!

Associate Member

What changes with 5G Security?NetNumber as a Trusted Advisor

Page 31: ETSI Security Week 2020 goes virtual!

31

Associate Member

Secure by Design

5G standards development has adopted ‘Secure by Design’ principles, leading to:

• Use of Mutual Authentication

• Confirming sender and receiver have an established trust and the end-to-end relationship is secured

• A presumed “open” network

• Removing any assumption of safety from overlaid product(s) or process(es)

• An acknowledgment that all links could be tapped

• Mandating encryption of inter/intra-network traffic, ensuring the encrypted information is worthless when intercepted

Paradigm shift to existing Telco practices as this requires

mandatory encryption of inter/intra-network and privacy

sensitive information under all circumstances!

5G standards development has adopted ‘Secure by Design’ principles, leading to:

• Use of Mutual Authentication

• Confirming sender and receiver have an established trust and the end-to-end relationship is secured

• A presumed “open” network

• Removing any assumption of safety from overlaid product(s) or process(es)

• An acknowledgment that all links could be tapped

• Mandating encryption of inter/intra-network traffic, ensuring the encrypted information is worthless when intercepted

Page 32: ETSI Security Week 2020 goes virtual!

32

Associate Member

Subscriber Protection

5G improves confidentiality and integrity of user and device data:

• Providing confidentiality of the initial non-access stratum (NAS) messages between the device and the network

• Introducing home control, preventing various roaming fraud types

• Supporting unified authentication across other access network types

• Introducing user plane integrity checking

• Enhancing privacy protection with the use anchor keys

Increased subscriber privacy and data protection

False base station (Stingray phone tracker) prevention

Authentication confirmation added to combat fraud

Equivalent high security offered via WiFi and alike networks

Page 33: ETSI Security Week 2020 goes virtual!

33

Associate Member

Network Slicing

Associate Member

End-to-End Isolation in RAN, TN, and CN of slices in a 5G network

Aspects are still under discussion how this end-to-end

isolation can be guaranteed under all circumstances!

Page 34: ETSI Security Week 2020 goes virtual!

34

Associate Member

Signaling Data Integrity

• The inter-PLMN interface is a sensitive

interface, operators are responsible to

protect their (user) assets, mandatory

• Attention on attacks & privacy concerns

(like GDPR) will grow over time with the

next steps of the digital transformation

Network Protection

Associate Member

• Taking advantage of high-performance

computer resources and best practices

in data centers and internet technology

• Avoiding another network generation

with telecom specific signaling issues

New IT signaling protocol stack

Page 35: ETSI Security Week 2020 goes virtual!

Associate Member

When does 5G become safer than LTE?

NetNumber as a Trusted Advisor

Page 36: ETSI Security Week 2020 goes virtual!

36

Associate Member

NR

LTE

5G UE RAN5GCCore

5G UE = 5G mobile device

RAN = Radio Access Network

Tomorrow’s 5G service with 5G Security as designed

The comprehensive 5G Security enhancements only work

if the 5G enabled mobile device is controlled by a 5G Core!

With 5G devices controlled by a 5G Core via both 5G radio and LTE radio

Page 37: ETSI Security Week 2020 goes virtual!

37

Associate Member

HTTP/25G SA scenario

NR

LTE

5G UE RAN5GC

5GC

HPMN

VPMN

5G UE = 5G mobile device

RAN = Radio Access Network

VPMN = Visited Public Mobile Network

HPMN = Home Public Mobile Network

5G SA = 5G Stand-Alone Architecture

The comprehensive 5G Security enhancements only work

if the 5G enabled mobile device is controlled by a 5G Core

and if you connect to a 5G Core network when travelling!

Tomorrow’s 5G roaming with 5G Security as designed

With 5G devices controlled by a 5G Core via both 5G radio and LTE radio

Page 38: ETSI Security Week 2020 goes virtual!

38

Associate Member

NR

LTE

HPMNEP

C

EPC

Diameter or SS75G NSA and LTE scenarios

5G UE RAN VPMN

5G UE = 5G mobile device

RAN = Radio Access Network

VPMN = Visited Public Mobile Network

HPMN = Home Public Mobile Network

5G NSA = 5G Non-Stand-Alone Architecture

Today’s 5G services are mainly with only 5G radio networks

and re-use of the existing investments in LTE Core networks

by which no advantage can be made of 5G Security

But today’s 5G service still works with LTE Security

With 5G devices controlled by an LTE Core via both 5G radio and LTE radio

Page 39: ETSI Security Week 2020 goes virtual!

39

Associate Member

The rollout of 5G will take years

• 1.8 billion 5G connections in 2025 with developed Asia and the US in the lead

• North America 48% and global coverage 20.1% in 2025

Coexistence with legacy mobile generations

Source GSMA: 5G status update

• SS7 and Diameter are known for their security vulnerabilities

• Mobile roaming is a global eco-system with about 800 mobile operators

Interworking with legacy Signaling

Page 40: ETSI Security Week 2020 goes virtual!

40

Associate Member

Protection Capability per Signaling Type

No Protection

Diameter

HTTP/2 HTTP/2 Confidentiality Protection

(Encryption)on top of Authentication and Integrity Protection

DESS Phase 1Authentication and Integrity Protection(Digital Signature)

5G SA scenario

SS7

5G NSA scenario

An integrated SS7 / Diameter signaling firewall also protects 5G users

Page 41: ETSI Security Week 2020 goes virtual!

Associate Member

TAKE-AWAYSNetNumber as a Trusted Advisor

Page 42: ETSI Security Week 2020 goes virtual!

42

Associate Member

42

Associate Member

TAKE-AWAYS

The digital transformation of our society and industry need

the advanced 5G Security

but

5G is still LTE Security without implementation of a 5G Core

Roaming traffic is a dangerous backdoor and needs very

comprehensive firewalling

Page 43: ETSI Security Week 2020 goes virtual!

Associate Member

BEST PRACTICESNetNumber as a Trusted Advisor

Page 44: ETSI Security Week 2020 goes virtual!

44

Associate Member

44

Associate Member

BEST PRACTICES

Carriers should deploy 5G including 5G Core control

Reuse of existing LTE radio but with 5G Core control

Roaming traffic protected with an integrated SS7 and

Diameter Firewall

Associate Member

Page 45: ETSI Security Week 2020 goes virtual!

www.netnumber.com

Associate Member

Page 46: ETSI Security Week 2020 goes virtual!

© ETSI ETSI Security Week 2020 goes virtual

Questions & Answers

Page 47: ETSI Security Week 2020 goes virtual!

© ETSI ETSI Security Week 2020 goes virtual

Upcoming webinars in the threadDeployment 5G Securely:

10 June, 3pm: 5G Security for Verticals

16 June, 3pm: 5G Security Evolution

18 June, 10am: Security Challenges and Regulatory Aspects

Page 48: ETSI Security Week 2020 goes virtual!

© ETSI ETSI Security Week 2020 goes virtual

Thank you for joining this webinar !

Find the full‘ETSI Security Week 2020 goes virtual’

programme at

www.etsi.org/etsisecurityweek