Figure 5: ZTA critical control groups5
The security management function enforces the security controls implemented across all mobile network domains (for example, RAN, Core, OSS, BSS, cloud infrastructure, and transport) to be in place and ties them into security operations workflows. The security management function also has its own security functions, such as posture management, continuous monitoring utilizing threat intelligence and AI/ML, and certificate automation and PKI.
Security management automates the process of onboarding network assets to the monitoring platform, orchestrates the protect and detect activities by including threat indicators based on multiple sources (for example, logs, cloud-native events, vulnerabilities, configuration status, and so on), and provides enriching context information to assist human and automated responses. MNOs can achieve round-the-clock visibility into the network security posture. This involves gathering and analyzing network-wide configuration status, logs, and events horizontally, while also comprehensively covering the entire MNO technology stack vertically. This approach supports the governance and monitoring objectives of ZTA.
Implementing ZTMM in mobile networks
The cross-cutting functions of the CISA Zero Trust Maturity Model (ZTMM) – Visibility and Analytics, Automation and Orchestration, and Governance – hold relevance for the telecommunications industry, especially concerning security management functions. The security management platform should meet the NIST tenets and CISA cross-cutting functions for the network to achieve a ZTA.
Implementing ZTA is a journey that runs through the stages of ‘Traditional,’ ‘Initial,’ ‘Advanced,’ and ‘Optimal’. It evolves from static policies and manual controls with limited visibility to dynamic policies with automated controls that leverage AI and continuous monitoring to gain network-wide visibility and faster response. Table 1 provides CISA ZTMM definitions for these three cross-cutting functions, with recommended tailoring for mobile networks.
Cross-cutting capabilities |
Traditional |
Initial |
Advanced |
Optimal |
Visibility & Analytics |
- Manually collect limited logs across network with low fidelity and minimal analysis
|
- Automate the collection and analysis of logs and events for mission critical functions
- Regularly assess processes for gaps in visibility
- Continuous monitoring of security configurations
|
- Expand the automated collection of logs and events network-wide (including virtual environments) for centralized analysis that correlates across multiple sources
- Telecom specific threat detection
- Attack surface assessment
|
- Maintain comprehensive visibility network- wide via centralized dynamic monitoring and advanced analysis of logs and events
- Risk profiles for network functions
|
Automation & Orchestration |
- Rely on static and manual processes to orchestrate operations and response activities with limited automation
|
- Automate orchestration and response activities in support of critical mission functions
- Automate selected manual tasks
- Managing backhaul IPsec certificates
|
- Automate orchestration and response activities network- wide, leveraging contextual information from multiple sources to inform decisions
- Automate selected processes
- Certificate automation for mTLS
|
- Orchestration and response activities dynamically respond to network- wide changing requirements and environmental changes
- Automated and streamlined processes
|
Governance |
- Implement policies in an ad hoc manner across the network
- Policies enforced via manual processes or static technical mechanisms
|
- Define and implement policies for telco network- wide enforcement with minimal automation and manual updates
- Select 3GPP security controls for implementation
|
- Implement tiered, tailored policies network-wide and leverages automation where possible to support enforcement
- Access policy decisions incorporate contextual information from multiple sources
|
- Implements and fully automates network-wide policies that enable tailored local controls with continuous enforcement and dynamic updates
|
Regular text = adopted from ZTMM
Bold text = addition of cross-cutting functions for mobile network context
Bold underlined = highlight of end-to-end security management and automation required in ZTMM
Table 1. Cross-cutting ZTA maturity for the mobile network (adapted from ZTMM3)
The Traditional stage is the perimeter-based security and the Initial stage is the first step on the ZTA journey. The following points provide recommendations to step through the stages of the ZTMM:
- To reach the Initial stage – Conduct a comprehensive risk assessment and define a targeted security posture accordingly. Implement continuous monitoring to compare the current security posture with the intended Emphasize the automation of log collection and analysis for NFs and the underlying cloud infrastructure.
- To reach the Advanced stage – Automate asset discovery for NFs, for example in the 5G Core and Radio Access Network (RAN). Enhance threat detection capabilities by deploying comprehensive methods, encompassing both agent-based and log-based detection, ensuring complete Implement mechanisms to identify rogue assets within the network that could potentially impact service availability. For effective network function identity management, establish a system that oversees the distribution, enrollment, and enforcement of public key infrastructure (PKI) certificates, while facilitating secure communication between NFs.
- To reach the Optimal stage – Establish comprehensive centralized security visibility and control across all telco nodes. Implement dynamic monitoring, enforcement, and policy updates with the help of AI/ML in response to threats or regulatory changes.
Security management should facilitate the MNO's progression through this maturity journey, adapting to evolving technology and shifts in the threat landscape. For instance, while a patch for a vulnerability might require time to be disseminated across all software, the security management tool can promptly adjust and enforce the acceptable baseline security configuration to mitigate the potential risk posed by the potentially unpatched vulnerability.