security considerations for the 5g era€¦ · “5g networks are beginning to touch every facet of...

16
Presentation Slides Permission to use with attribution to ‘5G Americas’ is granted.

Upload: others

Post on 24-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Presentation SlidesPermission to use with attribution

to ‘5G Americas’ is granted.

Page 2: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

“5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security central to this monumental technology. Mobile Network operators and their vendor partners have always and will continue to put security as a top priority for their networks.”

Chris Pearson, President, 5G Americas

Page 3: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

“Security has been designed and incorporated into 5G standards. A strategic approach is taken related to cloud-native services, open-source software, APIs, SDN, and NFV, which together provide greater overall 5G network security.”

David Krauss, Principal Network Architect for Ciena

Page 4: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Monolithic versus

Disaggregated Architecture

Page 5: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Evolution from network appliances to virtualization

Page 6: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

5G RAN splits

resulting in fronthaul,

midhaul and backhaul

Page 7: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

5G Non-Standalone Architecture

Page 8: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

5G Standalone Architecture

Page 9: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

System Architecture for 5G SMS over NAS

UE

AMF

UDM

SMSF(SMS Function)

N1

N20

N8

to/from SMS-GMSC/IWMSCSMS Router

to/from SMS-GMSC/IWMSCSMS Router

N21to/from IP-SM-GW

to/from SGs MSC

Page 10: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

SDN Architecture and 5G

Page 11: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Comparison of 4G and

5G NR Architecture

Page 12: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Efficiencies and Threats for an Open

5G RAN Architecture

Page 13: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Threat Intelligence

Layers

Unsupervised Machine LearningSupervised Machine LearningBehavior Analysis/Anomaly DetectionHeuristics AnalysisMalware Signatures/File HashesThreat Reputation - DomainsThreat Reputation - IP Addresses

Indicators of Compromise (IoC)

Automated Threat Intelligence (ATI)

Page 14: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Non-roaming

reference architecture from 3GPP

23.501

Page 15: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

SECaaSbuilt upon Network Slicing

Page 16: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security

Zero-Trust Validation checks required at both the hardware and software layers