Skip navigation
Like what you’re reading?

Your guide to end-to-end security when introducing 5G core

Mobile networks serve eight billion subscribers worldwide, and in many countries, these networks are part of the national critical infrastructure. As a result, enhanced security in 5G is crucial as well as transparency, both in terms of design and the implementation of security solutions. Here’s a handy guide to end-to-end 5G Core security.

Strategic Product Manager

Cloud native security

Strategic Product Manager

Strategic Product Manager

It’s becoming clear that 5G will enable many new use cases, including ones that will make the critical role of mobile networks even more apparent. Service provides are increasingly requested to provide evidence on how security and privacy is managed in their networks to gain acceptance and trust.

The 5G networks will serve as a foundation for these new use cases and services, and as these different use cases may share resources in the mobile network, a cyberattacks against one could  affect many others. The more society depends on digitalized services, the more likely it is that cyber threats against these services will increase – making security a critical factor for 5G business success.

 

Four layers of 5G security

To understand how security is structured we divide it in four layers, from the bottom up we have:

  • Security standards for i/f and security architecture
  • Product development security
  • Security deployment of the end-to-end (E2E) architecture
  • Security management and operations
The security layers in 5G

Figure 1: The security layers in 5G

 

Standardization

We have a lot of new standardization which serves as a foundation for 5G security from bodies like 3GPP, the Internet Engineering Taskforce (IETF), the European Telecommunications Standards Institute (ETSI ISG NFV), and the National Institute of Standards and Technology, US (NIST). They have defined the interfaces and security architecture for the mobile networks. Due to all the different technology domains that make up 5G there is no single standard for security in 5G.

Apart from standards, there are also new regulations related to 5G security. In general, these regulatory requirements aim to raise the baseline security of products and services, and to protect the networks from attacks. An example is the EU toolbox.

 

Secure products

As a 5G system will be built on a largely virtualized cloud platform with many different network functions and 3PP applications, and there will be many different vendors involved. When developing these products, vendors don’t just need to consider the 3GPP and other standardized interfaces, but also build security into products during the development process.

Ericsson has systematically developed a state-of-the-art model, called The Security Reliability Model (SRM), to incorporate security and privacy considerations into all phases of product development.

Mobile networks and 5G serve as a backbone for modern society. Therefore, security assurance is a means to ensure that network equipment meets security requirements and is implemented following secure development and product lifecycle processes.

 

Security in 5G Core

As an example of new security products in 5G, Ericsson has recently launched an integrated Packet Core Firewall as a single CNF (Cloud native network function) as part of the user plane in the Ericsson Packet Core Gateway. Today, this is solved with different multi-vendor hardware nodes, which increases latency, has hardware dependencies and is more complex to orchestrate. A single CNF solution means it scales in and out simultaneously with the UP, meeting specific 5G use case requirements, including edge, deep edge and small-scale deployments.

 

Secure deplyment and operations

Mobile network security management architecture

Figure 2: Mobile network security management architecture

As indicated above, security in a 5G system implies much more than specific products inserted at different places. It requires the ability to overlook and mange security across the entire network architecture, especially considering the vast number of multi-vendor solutions. As 5G networks will also be highly dynamic, threat detection and mitigation must also be done very quickly.

There are no telecom-specific security frameworks, and as a result many communication services providers are turning to generic cyber security frameworks – for example, the NIST Cybersecurity Framework and Center of Internet Security (CIS) controls – when designing approaches and processes around security operations. However, ETSI has defined the NFV Security Lifecycle Management, which outlines the three main stages for the VNF security life cycle: security planning, security enforcement, and security monitoring.

 

The journey to intelligent security management

Communication services providers today have varying levels of maturity in their security operations, and many have static manual processes in their telecoms network security operations.

Ericsson has defined a three-step approach to reach a high level of intelligent security management.

  1. Dynamic: Introduce automated security policy configuration and compliance monitoring
  2. Cognitive: Automated threat and vulnerability detection assisted with ML /AI
  3. Intelligent: Repeatable, adaptive and holistic security management with threat intelligence. This provides end-to-end visibility for business-related security risks, and actions can be directed via automated workflows to mitigate risks faster.

 

Solutions for security management

Ericsson has been working for many years to develop a management solution for the entire telecom network across all layers and network domains including multi-vendor products.

The Ericsson Security Manager is an evolutionary security management automation solution implementing building blocks for all the necessary functions: risk orchestration, protection, detection and response. It adheres to NIST Cybersecurity Framework principles. It turns data collected from the managed context into powerful security insights, identifying relevant threats and vulnerabilities. Active response also helps shorten the incident containment with a high degree of automation as closed loop and expert assisted response mechanisms.

Security as a source of revenue for service providers

Figure 3: Security as a source of revenue for service providers

 

Security as a source of revenue for service providers

The rise in new business contexts built on top of the 5G network platform will rely upon the increasingly dynamic and distributed nature of 5G network architecture. This makes managing the security of the network and services a growing challenge as the network threat surface is increased and new threat vectors are introduced. Communication service providers need to manage the security and privacy of their networks and services in a more complex business environment. This also opens for new business opportunities, since communication service providers can manage the security for many enterprises’ specific needs going forward.

For some further details please read our recent document "Mastering complete 5G network security - A guide to protecting your network when introducing cloud native 5G core"

 

Want to know more about the guide series?

Visit the page Guide to cloud native 5G Core 

Your guide to building a cloud native 5g core

Please read the previous articles from the series: ​ 

Building a cloud native 5G Core: the guide series 

Your guide to building a cloud native infrastructure for 5G 

Your guide to evolving to 5G Core with full efficiency 

Your guide to enabling voice services in 5G networks

Your guide to 5G network automation and zero touch

Your guide to transforming network operations on the journey to 5G

 

Want to know more about security?

Integrated Ericsson Packet Core Firewall 

5G security WP: A guide to 5G network security

Ericsson Security Reliability Model (SRM)

The role of security standards in 5G

5G security: how to enable a trustworthy 5G system

5G network security is national security

Ericsson technology review: end-to-end security management for IoT

Read more about Network automation



 

 

The Ericsson Blog

Like what you’re reading? Please sign up for email updates on your favorite topics.

Subscribe now

At the Ericsson Blog, we provide insight to make complex ideas on technology, innovation and business simple.