security considerations for the 5g era€¦ · “5g networks are beginning to touch every facet of...
TRANSCRIPT
![Page 1: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/1.jpg)
Presentation SlidesPermission to use with attribution
to ‘5G Americas’ is granted.
![Page 2: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/2.jpg)
“5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security central to this monumental technology. Mobile Network operators and their vendor partners have always and will continue to put security as a top priority for their networks.”
Chris Pearson, President, 5G Americas
![Page 3: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/3.jpg)
“Security has been designed and incorporated into 5G standards. A strategic approach is taken related to cloud-native services, open-source software, APIs, SDN, and NFV, which together provide greater overall 5G network security.”
David Krauss, Principal Network Architect for Ciena
![Page 4: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/4.jpg)
Monolithic versus
Disaggregated Architecture
![Page 5: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/5.jpg)
Evolution from network appliances to virtualization
![Page 6: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/6.jpg)
5G RAN splits
resulting in fronthaul,
midhaul and backhaul
![Page 7: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/7.jpg)
5G Non-Standalone Architecture
![Page 8: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/8.jpg)
5G Standalone Architecture
![Page 9: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/9.jpg)
System Architecture for 5G SMS over NAS
UE
AMF
UDM
SMSF(SMS Function)
N1
N20
N8
to/from SMS-GMSC/IWMSCSMS Router
to/from SMS-GMSC/IWMSCSMS Router
N21to/from IP-SM-GW
to/from SGs MSC
![Page 10: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/10.jpg)
SDN Architecture and 5G
![Page 11: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/11.jpg)
Comparison of 4G and
5G NR Architecture
![Page 12: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/12.jpg)
Efficiencies and Threats for an Open
5G RAN Architecture
![Page 13: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/13.jpg)
Threat Intelligence
Layers
Unsupervised Machine LearningSupervised Machine LearningBehavior Analysis/Anomaly DetectionHeuristics AnalysisMalware Signatures/File HashesThreat Reputation - DomainsThreat Reputation - IP Addresses
Indicators of Compromise (IoC)
Automated Threat Intelligence (ATI)
![Page 14: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/14.jpg)
Non-roaming
reference architecture from 3GPP
23.501
![Page 15: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/15.jpg)
SECaaSbuilt upon Network Slicing
![Page 16: Security Considerations for the 5G Era€¦ · “5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security](https://reader034.vdocuments.us/reader034/viewer/2022050305/5f6dda144df03f0c4e776838/html5/thumbnails/16.jpg)
Zero-Trust Validation checks required at both the hardware and software layers