Skip navigation
Telecom Security

Telecom Security

Understand security in the age of 5G

Telecom security

Telecom networks form the foundation of our connected world, enabling communication, elevating business possibilities and supporting essential services. But as our reliance on telecom infrastructure and systems grows, so too does the frequency and potential impact of attacks. Simply put, protecting our networks and infrastructure from evolving threats is more vital today than ever before.

Understanding telecom security

At its core, telecom security is a field of cybersecurity focused on protecting telecommunications infrastructure, data, and communications from unauthorized access, attack or damage. It encompasses all the measures and technologies used to protect the confidentiality, integrity, and availability of every element of a mobile network. This includes the vast amounts of sensitive data transmitted across these networks, such as personal user data, business communication, and government information.

With the emergence and adoption of technologies like 5G, artificial intelligence (AI) and cloud infrastructure, the complexity of telecom networks has also increased, intensifying the need for ever more robust security and privacy measures.

Why is telecommunication and network security so important?

Mission critical Firefighters using a drone.

Unlike a standard IT system, a telecom network cannot just be switched off during an attack to prevent access and allow the issue to be resolved. Maintaining reliable, available ‘always-on’ connectivity is vital – and not only to industries and enterprises looking to keep their operations up and running. Critical infrastructure such as healthcare, finance, energy grids, transportation and government operations (including defense and public safety) can also be impacted.

In our modern digitized society, an attack on telecommunications infrastructure could lead to widespread disruption across multiple facets of society, plus have a roll-on effect as emergency response services and disaster recovery efforts become hindered. Ensuring telecom systems remain uncompromised is a serious matter – and one that requires dedicated efforts and responsibilities to be shared across a number of key players.  

I understand the issues of telecom security – what about the solutions?

Skip ahead to find out how to protect these crucial systems and infrastructure.

Discover more

Challenges of the evolving security landscape

A complex, connected ecosystem

Traditionally, telecom networks were closed, proprietary systems which were relatively secure due to their isolation and limited external interfaces. Today, open and interoperable systems based on technologies like 5G, cloud infrastructure, virtualization and the Internet of Things are unlocking new and exciting opportunities. However, they also bring the exponential growth of connected components, devices and applications, increasing the potential entry points for attackers and expanding the attack surface for them to target.

While 5G systems are more secure and trustworthy than previous generations by design, this complex and decentralized landscape also requires a more nuanced, structured and collaborative approach to telecom network security and management. This includes considerations around exposing advanced 5G functionality and network services via application programming interfaces (APIs), such as taking important lessons from enterprise on APIs and network security, and the unique challenges of external API security – securing APIs while exposing them.

New technologies impacting telecom cybersecurity

Cybercriminals are also continuously developing new and more sophisticated ways to attack telecom networks, exploiting vulnerabilities and bypassing security measures. Just as AI and machine learning (ML) technologies for mobile networks offer new capabilities such as threat identification, assessment and mitigation, they can also help threat actors to increase the sophistication, intelligence and frequency of their attacks.

Meanwhile, a key concern is addressing the potential impact of quantum computing on 5G and 6G security.

More players, more cooperation

With 5G, the lines between IT and telecom are also becoming increasingly blurred. As applications and application programming interfaces (APIs) become significant additions to networks, enabling new opportunities for telecom network operators and enterprises alike, it also means introducing more third-party players like application developers into the telecom ecosystem. As a result, telecom security now relies on strong collaboration between a wider range of stakeholders, including governments, regulators, telecom operators, equipment vendors and software and security providers, to develop and implement effective security measures.

""

Telecom security risks: the rising threats to mobile networks

Telecom security risks: the rising threats to mobile networks

This evolving landscape – and the convergence of ecosystems it represents – opens up new opportunities for threat actors to exploit vulnerabilities and compromise networks and components, including:

  • Taking advantage of weaknesses in misconfigurations or vulnerabilities in virtualization, cloud services or network slicing to gain access to unauthorized resources.
  • Leveraging insufficient security of devices (such as IoT devices) and exposed interfaces as an entry-point to the network.
  • Using valid credentials for accessing targets, via traditional social engineering techniques to obtain human identities or via weaknesses in machine identities.
  • Exposing personal data to unauthorized access, generating leakage, unlawful exposure and privacy breaches.

There are three main motivations behind threat actors targeting telecom networks:

Personal or otherwise sensitive data is also always of high interest to cybercriminals, and can be obtained by eavesdropping, location tracking or by obtaining data such as call metadata, especially call detail records (CDRs). This makes the core network, customer billing and customer care systems primary targets.

Ransomware attacks have been the most common type of financial gain attack in recent years, with ransomware operators shifting to target large organizations in industries like manufacturing, where a low tolerance for downtime makes them more likely to pay out. However, this category can also include the sale of personal data or access, Distributed Denial-of-Service (DDoS) attacks and extortion, cryptocurrency mining or fraud.

The least common motivation for targeting telecom networks, these attacks are often rooted in ideology, driven by personal, group or nation-state agendas. These include DDOS attacks, communication disturbances, the destruction of assets and even network-wide disruptive cyberattacks that put critical services at risk.

""
The image is a diagram showing three main motivations behind cyber threats, with each category marked by a colored box containing text and associated icons. 1. Surveillance/Espionage (Blue box): Activities: Obtaining personal data, Eavesdropping, Tracking location. Icons: An ear, symbolizing listening or eavesdropping. An eye, representing observation or surveillance. A person speaking, a video camera, a document, a folder, a chat bubble, and a profile card, indicating various surveillance methods or targets. 2. Financial Gain (Green box): Activities: Selling personal data. Selling access, Ransomware and extortion, DDoS attacks and extortion, Cryptocurrency mining, Fraud. Icons: A dollar bill, indicating money or financial transactions. An upward-pointing graph, symbolizing profit or financial growth. A document, fingerprint, key, magnifying glass, and person. 3. Disruption/Sabotage (Orange box): Activities: Disturbing communication, DDoS attacks, Destroying assets, Icons: A network with interconnected nodes, representing communication networks. A lightning bolt, symbolizing disruption or destruction. A bug, representing malware or system compromise.

Discover what’s driving the enemy

Learn more about the motivations, opportunities and capabilities of threat actors in our Ericsson Mobility Report article Securing 5G Networks

Download the article

A holistic approach to telecom security: the trust stack

To successfully navigate the ever-evolving threat landscape and to protect the end-user, we need a system that encompasses all layers of the telecom ecosystem. A comprehensive system that mitigates telecom security risks and prevents any elements from slipping through the gaps, as we work together to secure our networks and ensure compliance with data privacy and protection regulations.

This is where our security trust stack comes into play – an approach built on four key pillars: standardization, product development, deployment and operations. These four areas converge to create the ideal secure foundation on which to build large-scale, security-sensitive systems.

A holistic approach to telecom networks, Operations, Deployment, Development, Standardization

The operational processes which allow networks to function and deliver targeted levels of security are highly dependent on the deployment and operations of the network itself. Operations elements include secure operational procedures, monitoring security performance, vulnerability management and detection of attacks, as well as response and recovery after a breach.

A dynamic threat environment calls for intelligent security operations. Our Intelligent security management brings capabilities powered by automation and intelligence. Security is also an embedded part in our Network Management and Support Service with people, processes and tools.

At the deployment phase, networks are configured for a targeted security level, which is key to setting security parameters and further strengthening the security and resilience of the network. Relevant factors here include solid network design and compliant data handling with security, privacy and resilience in mind, configuration of security and privacy parameters and hardening of the network.

Network vendors design and develop proprietary solutions and work together with other ecosystem stakeholders in a joint effort to implement the agreed standards for functional network elements and systems. This is crucial for making the end network product both functional and secure. Solutions and focus areas include secure hardware and software components, secure development processes, version control and secure software updating.

Ericsson Security Reliability Model (SRM) is a systematic approach to incorporating security and privacy considerations across our product value flow - from sourcing to development to delivery. SRM makes it possible to offer a portfolio that’s inherently secure, easy to integrate and ready to address both evolving privacy-protection demands and security threats against the network.

Standardization is a process whereby operators, vendors and other stakeholders set standards for how networks around the globe will work together. This also includes how to best protect networks and users against malicious actors and incudes considerations for secure interoperable architecture, privacy protecting secure protocols and security algorithms.

We are proud to be a driving force in security standardization and specification development, proactively contributing and aligning with several relevant organizations, including:

  • Third Generation Partnership Project (3GPP)
  • Internet Engineering Task Force (IETF)
  • European Telecommunications Standards Institute (ETSI)
  • Global System for Mobile Communications Association (GSMA)
  • National Institute of Standards and Technology (NIST)
  • Open RAN (O-RAN) Alliance.

We also contribute strongly to the 3GPP security work Security Assurance Methodology (SECAM) for 3GPP nodes, and hold a worldwide certificate for ISO 27001.

 

5G network security: private, resilient connectivity

5G network security is raising the bar, utilizing technology and innovation to protect critical networks as well as the consumers, businesses and governments that utilize them. 5G has been specifically designed with new security and privacy functionality to make it more resilient towards various frauds, subscriber privacy and eavesdropping issues than earlier generations. Considerable effort has also been put into protecting the interconnect networks between service providers, encrypting or pseudonymizing subscriber identifiers and preventing the modification of the user data sent between user equipment and radio base stations. 

Aligned with the tenets of zero-trust architecture

Zero-trust architecture operates based on the assumption that the attacker could already be inside the network, enhancing security by both blocking unauthorized access to network resources and preventing internal lateral movement by an attacker. Zero trust and 5G are also a natural match when it comes to security. 5G has key security features enabling and built-in support for zero-trust architecture, as well as specifications that are aligned with the zero-trust tenets. 

""

Expert insights into the world of 5G security

Ericsson solutions: secure and private by design

A man  standing in front of an urban area in the dusk.

At Ericsson, we believe security and privacy protection should be underlying and innate parts of everything we do. These considerations are embedded from the design stage in all of our network products and solutions, ensuring a secure and resilient foundation for 5G networks and services. Additionally, we offer specific solutions and services to address particular needs.

RAN security

Core network security

Security management and operations

Enterprise security solutions

Why Ericsson? A partner you can trust

Research, innovation and expertise

We have a long history of innovation and end-to-end expertise when it comes to telecom networks and their secure operation. Our security research lays the foundation for the intelligent network platform that offers security, privacy, reliability, availability and robustness for today’s and future use cases.

A well-established internal control framework 

Our Security Reliability Model (SRM) enables a managed, risk-based approach to security and privacy implementation, with requirements tailored to the environment and demands. This approach helps us meet stakeholders' expectations and cater for the rapid evolution of both technology and global legislation.

Global reach and partnerships

A global presence, regulatory certifications and strong partnerships with carriers, channels, alliances and system integrators as well as active involvement in industry ecosystem development and standardization such as 3GPP.

Customer focus and support

We pride ourselves on our position as trusted partners in your telecom network journey, and are committed to customer support, including business and technical enablement, and a robust product security incident response process.

Wondering what to do if you encounter a security vulnerability or attack?

Contact Ericsson Product Security Incident Response Team (PSIRT) who can support with the product vulnerability management process, customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.

""

Protecting the connectivity of tomorrow

Future network security

Intelligent networks will carry an abundance of industry and consumer data, changing the nature of business competition. Securing those assets will make future network security key to ensuring trustworthiness of society and industry.

Quantum-safe networks

Technology will also continue to evolve and transform the world around us – and the threats we face. One challenge is addressing the emerging threat of quantum computing to current encryption algorithms – something we are already preparing for.

 

Related topics and technologies

Network evolution

By 2030, mobile networks will replace large parts of legacy IT network infrastructure, forming the critical foundation of the digital society and bringing new capabilities and opportunities.   

Network security for policy makers

In the era of 5G, it's important to conceptualize security on a system wide level where telecom networks are an important component.

Network security standards

Together with the ecosystem we drive and develop an industry-wide framework of common standards providing a strong baseline for seamless interoperability and secure evolution of mobile networks.

Telecom AI

AI is creating business value through improved performance, higher efficiency, customer experience as well as creating new business models.

5G standalone

Explore the entry ticket to new innovative applications, services and solutions through open APIs, differentiated connectivity and service-based architecture.

5G RAN

Secure a smooth, fast and agile 5G introduction to reduce cost for your mobile broadband business and enable industry digitalization for growth.

Stay updated

News and press releases

Blog post

White papers

Follow Ericsson Networks