SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
The communications technology journal since 1924
Setting the standard: methodology
counters security threats
January 29, 2014
2014 • 1
Setting the standard:
methodology counters
security threats
Security has become a central question for network operators and the global
telecommunications industry. This is largely due to a shift to more open IP
networks, as well as a diminishing dependence on obscure telecom protocols
and isolated infrastructure to provide security. The concerns that arise from
these developments need to be addressed holistically throughout product
development life cycles from creation to termination.
changers have been the availability of
open source implementations of 3GPP
radio protocols and the use of common
platforms.Astheworldmovestowarda
futureinwhichtheimpactofthesefac-
tors becomes even greater, security has
become a primary consideration of the
telecommunicationsindustry.
To preserve interoperability among
products, existing 3GPP telecommuni-
cations standards have been developed
with a focus on protocols and equip-
mentbehavior.Thesecurityelementsof
thesestandardspreventattackersfrom
misusing systems through the defined
protocolsandinterfaces.
However, the existing standards do
not cover how to securely implement
protocols and associated functionality
in a product, or how to test any given
implementation for vulnerabilities.
Neither do the standards specify how
to secure the proprietary interfaces of
aproductorhowsecurity-relatedissues
should be managed throughout the
product life cycle. In other words, secu-
rity assurance is not part of the 3GPP
standards.
As demands for tougher security
measures now tend to be discussed on
a national level, the risk that different
countrieswilldevelopdivergingcollec-
tions of security requirements is high.
This kind of fragmentation may not
only make networks more expensive,
but it jeopardizes interoperability and
threatens subscriber access to network
servicesandcapabilities.
As this new threat landscape has
become more evident and clearer to
both governments and the telecom-
munications industry, the demand for
strongersecurityrequirementsoncom-
municationsequipmenthasrisen,with
specific emphasis on telecommunica-
tionsequipment.
Ideally,thestandardsthatgovernthe
telecommunications industry should
provide sufficient security functional-
itytocombatanynewthreats.However,
traditional telecom networks have
offered a limited set of functionality,
whichhasineffectprovidedthemwith
protection.Devicesrunningonisolated
infrastructurearebynaturelessvulner-
able than networked ones. Mobile tele-
com networks have an additional layer
of protection provided by the many
and very detailed telecom specifica-
tions. This situation has now changed
dramatically. In parallel with the
transition to IP technology, the game
KARL NORRMAN, PATRIK TEPPO, KEIJO MONONEN AND MATS NILSSON
BOX A  Terms and abbreviations
CCRA 	 Common Criteria
	 Recognition Agreement
eNodeB	 evolved NodeB
IEC	International
	 Electrotechnical 		
	Commission
ISO	 International Organization
	 for Standardization
MME	 Mobility Management 	
	Entity
RNC	 radio network controller
SCAS	 Security Assurance 	
	 Specification
SECAM	 Security Assurance 	
	Methodology
SRM	 security reliability model
USIM	 Universal Subscriber 	
	 Identity Module
Over the past decade, the
number of attacks on IT and
communications systems has
risen drastically. This increase
has gone hand in hand with
a massive rise in the use of
communications systems for
everything from utilities and
public health, to transportation
and everyday communication.
Ericsson refers to this as
the Networked Society, and
within it, networks serve as
critical infrastructure that is
fundamental for economic and
social development. However,
it also leaves society more
vulnerable to cyber threats,
both malicious and those arising
from carelessness and a lack of
awareness – it is this situation
that needs to be addressed.
2
ERICSSON REVIEW • JANUARY 29, 2014
Building trust
Tocounteractthesepotentialthreats
to operator revenue, the best approach
to addressing security issues is one that
isglobalandrootedinstandardization.
Standardizationactivities
In mid-2012, Ericsson initiated a 3GPP
initiative to stay ahead of the new secu-
ritychallenges.Theobjectiveofthisini-
tiative was to develop a set of security
assurance requirements better suited
for a world of ubiquitous connectivity,
including a methodology to create the
requirements, and a process to ensure
that commercial products meet the
desiredlevelofsecurity.
For the methodology part, the ini-
tial idea was to reuse the ISO/IEC 15408
­standard Common Criteria1
. This
approach is often used in conjunc-
tion with product certification pro-
cesses, such as the Common Criteria
Recognition Agreement (CCRA), under
which product evaluations and protec-
tion profiles are performed to high and
consistentstandards.
However, 3GPP perceived the
Common Criteria methodology to be
toocomplexanddecidedtodesignanew
andlighterone,whichwouldbetailored
to meet the needs of the telecom indus-
try – but borrowing from Common
Criteriawhenappropriate.
The new approach goes under
the name of Security Assurance
Methodology (SECAM), and its
study phase has been completed and
­documented in a 3GPP Technical
Report2
.Theformalizationofthemeth-
odology is documented in the 3GPP
TechnicalReport3
.
Thenewmethodology
The aim of any security assurance
methodology–andSECAMisnoexcep-
tion–istoprovideuserswiththeassur-
ance that commercial products fulfill
the security goals defined by the prod-
uct’s intended use, at a predetermined
levelofsecurity.
Manufacturers,purchasersandusers
often refer to products as being secure.
Thetruemeaningofsuchastatementis
thataproductmeetsagivensetofsecu-
rity requirements, which in the worst
case are implicit. But even if a product
explicitly fulfills a defined set of secu-
rity requirements, it may still contain
vulnerabilities–itissimplynotpossible
todefineeverysinglewayaproductcan
bemisused.Securityrequirementscan
be defined in a negative manner, for
example: it shall not be possible for an
unauthorized agent to modify the sys-
temconfiguration.
However,thereisnowaytoprovethat
a product meets such a requirement.
There may be ways for an unauthor-
ized agent to modify system configu-
ration that are not known at the time
ofevaluation.
SECAM differs from previous 3GPP
standards in that it establishes security
requirements not just for products but
alsoforthedevelopmentprocessusedto
manufacturethem.
The methodology applies the follow-
ing concept of assurance: an accreditor
verifies that a manufacturer is capable
of producing products to a given set of
security requirements, thus eliminat-
ing the need to issue certificates on a
per product basis. This approach is in
contrasttotheoneadoptedbyCommon
Criteria, in which each product is typi-
cally evaluated and certified by a third
party,andwhereaccreditationrequire-
ments relate to the evaluation process
and thus fall on the third party and not
themanufacturer.
Roles,trustrelationships
andrequirements
SECAM includes a number of different
roles, such as manufacturers and pur-
chasers, and covers a number of trust
relationships. Manufacturers build
productsbasedonspecifications,while
purchasers – in almost all cases opera-
tors–trustthemanufacturertoadhere
totheagreedsecurityrequirements.
With SECAM, purchasers should be
able to trust an accreditor’s indirect
verification of a manufacturer’s devel-
opment process. As the accreditor only
verifies the development process, not
the product itself, an additional role is
needed to verify that products actually
meetgivensecurityrequirements.This
istheroleoftheevaluator,whichcould
betakenonbyathirdparty.However,it
is anticipated – and allowed by SECAM
– that manufacturers will assume this
role themselves once they have been
verifiedbyanaccreditor.
These roles and processes are illus-
trated in Figure 1, and once all roles
have been verified, purchasers will be
abletotrustthesecurityofthedelivered
commercialproducts.
Theaccreditorwillreassesstheman-
ufacturer’s product development
Product
specifications
Product
specifications
ManufacturerManufacturer
AccreditorAccreditor
EvaluatorEvaluator PurchaserPurchaser
Security
assurance
specifications
Security
assurance
specifications
Development Evaluation
Purchaser
acceptance
decision
FIGURE 1  SECAM process and roles
3
ERICSSON REVIEW • JANUARY 29, 2014
for eNodeBs as well as the group of plat-
form and physical security require-
ments. A product that provides both
RNC and NodeB functionality can
apply the specific requirement groups
for these 3GPP functions, as well as the
same platform and physical security
requirementsastheeNodeB.
Groups of requirements are
brought together under the umbrella
of a Security Assurance Specification
(SCAS),which roughlycorresponds to a
Protection Profile in Common Criteria.
An SCAS is used as input to the product
development process (see Figure 1), and
asseveralrequirementgroupscanapply
to a product, more than one SCAS may
beappropriate.
Along with the actual security
requirements, an SCAS includes tests
to ensure that these requirements are
correctly implemented. So, a product
thatpassesallofthetestsmeetsthecor-
responding requirement. It may not
alwaysbenecessaryforaproducttopass
all tests in an SCAS, though all results
shouldbereported.
It is assumed that management of
an SCAS will follow normal 3GPP pro-
cedures. In other words, corrections or
updates are handled by submitting a
change request to 3GPP. Under the cur-
rent 3GPP meeting schedule, updates
canbeproposeduptofourtimesayear.
Productdevelopmentprocessand
evaluation
Intheory,theproductdevelopmentand
evaluation process consists of four lin-
earsteps.Inthefirststep,theproductis
developed, and then it is tested in steps
two to four. Security assurance, how-
ever, tends to be executed in an itera-
tiveandpartiallyoverlappingfashion.
To enable purchasers to reevaluate a
product, manufacturers must provide
thetestresultsfromtheevaluationpro-
cessandthedocumentationdescribing
the product in the context of the appli-
cableSCASs.Ifaproductfailsatest,this
shouldbedocumentedandclearlycom-
municated to the purchaser. An over-
view of the four steps of the product
development and evaluation process is
showninFigure 2.
Throughouttheinitialproductdevel-
opment, manufacturers should docu-
ment how the requirements of each
applicable SCAS correlate to specific
processes at regular intervals to ensure
that approved procedures continue to
be followed. During these assessments,
theaccreditorwillalsoverifythatman-
ufacturersareabletofulfillthesetsecu-
rity assurance requirements, and that
theevaluatoriscapableofperforminga
properevaluationoftheproduct.
The specific security requirements
that should be set for product develop-
ment processes have yet to be decided.
It has, however, been agreed that these
requirements will be set by GSMA –
which also acts as an accreditation
authorityfor(U)SIMmanufacturers4
.
Selfdeclaration
Oncetheevaluationofaproductiscom-
plete, manufacturers can issue a self
declaration, which can be used by pur-
chasers for guidance during their buy-
ing process. A self declaration includes
the results of product evaluations, as
well as information about whether the
manufacturer and the evaluator are
accreditedornot.
Usingthesecurityrequirementsand
test results defined in the self declara-
tion, purchasers can carry out their
own product evaluation. If the results
of such a reevaluation are not consis-
tent with the self declaration, the pur-
chasermayinitiateadisputeresolution
process with the accreditor. Should the
accreditor conclude that the accredited
manufacturer and evaluator have not
acted according to the requirements
for the product development process,
disciplinary action could be taken, the
outcome of which could be the revoca-
tionofaccreditationlicenses.
Securityassurancerequirements
There are two main types of security
assurance requirements in SECAM;
these two types are also part of the
CommonCriteria.Thefirsttyperelates
tothedevelopmentprocessandthesec-
ondtoproducts.
Some examples of requirements
relating to the development process
includethatthemanufacturershall:
useappropriatedevelopment-site
protection;
deploysufficientversionand
configurationmanagement;
applysecurecodingguidelines;and
ensurethatasuitablepatch
managementprocessisinplace.
Requirements related to products are
definedby3GPPandcollectedingroups.
Several different requirement groups
could apply to one and the same prod-
uct.Forexample,requirementsthatare
specific to a particular 3GPP function,
such as an RNC, a NodeB, or an eNodeB
maybecollectedintoonegroup.
Other requirements, such as those
related to platform security and physi-
cal protection of the implementation
may be put into another group. The
purpose of this separation is that same
requirement groups may be applicable
to several different products and can
thereforebereused.Forexample,abase
station that provides eNodeB function-
ality can apply the requirement group
Product
specifications
Product
specifications
Security
assurance
specifications
Security
assurance
specifications
Development
Enhanced
vulnerability
analysis
SCAS
compliance
testing
Basic
vulnerability
testing
FIGURE 2  Product development and evaluation process (according to SECAM)
4
ERICSSON REVIEW • JANUARY 29, 2014
Building trust
functions, assets or properties of the
product.Thisdocumentationisreferred
to as the SCAS instantiation and is
SECAM’sclosestequivalenttoaSecurity
Target in Common Criteria. The pri-
marypurposeoftheSCASinstantiation
istoprovidesufficientdetailtocarryout
the required test activities: compliance
testingandbasicandenhancedvulner-
abilitytesting.
Tests should be specified in such a
waythataproducteitherpassesorfails
–partialfulfillmentisnotanoption.
Compliance testing includes, for
example, verification that security
configuration documentation exists,
and that roles for operation and main-
tenance personnel are properly docu-
mented. Tool-driven and manual tests
(in which a tester interacts with the
product), such as verifying that access
to the operations and maintenance
function is authenticated, can also be
includedintheSCAS.
Basic vulnerability testing of a prod-
uct consists of running a set of security
testing tools. Port scanning is one such
tool, and this test identifies open ports
that should be closed. The testing pro-
cess could also include the use of tools
that exploit known vulnerabilities in
both open and closed source software
included in the product, as well as fuzz
testingofprotocolimplementations.
Enhanced vulnerability testing is a
more thorough analysis and requires
thatthetesterpossessesadeeperunder-
standing of threat analysis and risk
assessment than is needed for the pre-
viousteststeps.
Bynature,thistypeofanalysisishard
to standardize, and 3GPP has decided
to exclude it from the first stages of
SECAM.Itmay,however,beincludedat
a later stage, when SECAM has reached
agreaterlevelofmaturity.
SecurityassuranceatEricsson
To ensure the correct level of security
existsinitsproducts,Ericssonhasdevel-
oped a security reliability model (SRM).
This model provides a method to set
ambition levels for security features
and to ensure that an assigned level is
achieved in the implementation of a
product. SRM consists of three differ-
ent areas, as shown in Figure 3. The
processofsettingthesecurityambition
levelisbasedonriskassessment.
Within the SRM, security measures
arefunctionalrequirementsdefinedfor
products and are divided into different
areas. Each area is further subdivided
into levels, depending on the risks and
threats associated with the product, so
that an appropriate security level can
besetforit.
In the SRM, a standard set of secu-
rity assurance activities – such as risk
assessment – act to secure design rule
compliance, adherence and vulnera-
bility analysis, and configuration and
patchmanagement.Theseactivitiesare
a mandatory part of Ericsson’s process
for product life cycle and are applied to
allproductsindevelopment.Riskassess-
mentisperformedearlyinthedevelop-
mentphaseofaproduct,theoutcomeof
whichdetermineswhatassuranceactiv-
itiesneedtobeappliedlaterintheprod-
uct-developmentprocess.
The configuration and operation of
security functions is documented in
the customer product information.
This documentation is also tested dur-
ingthefunctionaltestingofthesecurity
functions. Instructions and guidelines
to support users on how to harden the
productisalsopartoftheproductdocu-
mentation,aswellasadescriptionofthe
product environment (network, physi-
cal and operational) and how it should
be designed and implemented. All of
this forms key parts of the documenta-
tionrequiredbySCASsin3GPPSECAM.
For Ericsson, the SRM is vital in our
RD processes and provides us with a
documentedapproachtoassurethatwe
developsecureproducts.Allofwhichis
in line with the self declaration that is
includedintheSECAMprocess.
Wayforward
Thefirststepin2014intermsofSECAM
developmentwillbefor3GPPtodevelop
an SCAS for an MME5
and formally
record the SECAM process in a perma-
nent 3GPP document3
. In parallel with
this activity, GSMA will begin to define
therequirementsfortheproductdevel-
opmentprocess,aswellasestablishthe
accreditationauthority.
Once these two activities have been
completed,vendorsandGSMAwillrun
apilottestcaseofSECAMevaluations.
Ericsson engineers will continue to
use their experience of working with
the SRM to provide input to SECAM,
andconversely,theSRMwillbealigned
withSECAM.Andperhapsmostimpor-
tantly,Ericssonwillcontinuetodevelop
its SRM as a core feature to combat
the constantly evolving threats to the
­communicationsindustry.
Conclusions
SECAM provides a framework to set
security requirements that are appli-
cable on a global scale. It also encom-
passes security requirements and
models for evaluating the quality of
product development processes, as
well as indirectly evaluating the qual-
ity of commercial products. In addi-
tion, the framework includes tests
FIGURE 3   Three areas of an SRM
Security reliability modelSecurity reliability model
Security
functions
Security
functions
Security
assurance
Security
assurance
Security
documentation
Security
documentation
5
ERICSSON REVIEW • JANUARY 29, 2014
toensurethatproductsfulfilltheset
requirements.
The SRM model puts Ericsson in
a good position to fulfill the require-
ments and help keep future networks
secureastheytakeanevermorecentral
roleinsociety.
1.	ISO/IEC 15408-1, 2009, Information
technology -- Security techniques
-- Evaluation criteria for IT security
-- Part 1: Introduction and general
model, available at: http://www.iso.
org/iso/home/store/catalogue_
ics/catalogue_detail_ics.
htm?csnumber=50341
2.	3GPP, Technical Report 33.805
V12.0.0, Study on security
assurance methodology for 3GPP
network products, available
at: http://www.3gpp.org/
DynaReport/33805.htm
3.	3GPP, Technical Report 33.916,
Security Assurance scheme
for 3GPP Network Products for
3GPP network product classes,
available at: http://www.3gpp.org/
DynaReport/33916.htm
4.	GSMA, Security Accreditation
Scheme,IncreasingU(SIM)security,
lowering business risks, available
at: http://www.gsma.com/
technicalprojects/fraud-security/
security-accreditation-scheme
5.	3GPP, Technical Report 33.116,
Security Assurance Specification
for 3GPP network product classes,
available at: http://www.3gpp.org/
DynaReport/33116.htm
References
Patrik Teppo
joined Ericsson in 1995
and is currently working as
a security consultant and
systems manager in the
Network Security Competence Center
at Ericsson Finland. He is the driver of
Ericsson’s security reliability model
(SRM) and provides back office
support for 3GPP SECAM
standardization. He holds a B.Sc. in
software engineering from Blekinge
Institute of Technology, Sweden.
Karl Norrman
joined Ericsson
Research in 2001 to work
in the area of security. His
main focus is security
protocols and architectures, software
security and security assurance. He is
currently Ericsson’s standardization
coordinator for security in 3GPP (SA3
working group) and is the main
delegate for the work on SECAM. He
holds an M.Sc. in computer science
from Stockholm University.
Mats Nilsson
is the director for
Product Security within
the CTO office. He
coordinates the
technology- and product-related
security activities within Ericsson,
including regulatory aspects. In this
role, he initiated the 3GPP activities on
security assurance and the SECAM
standardization. Nilsson is a well-
known industry veteran, having held a
series of front-line positions within
Ericsson since the 1990s, as well as
serving as CEO for the Open Mobile
Terminal Platform initiative.
Keijo Mononen
is the Head of the
Ericsson Network
Security Competence
Center. His Competence
Center is responsible for driving and
supporting network security activities
across all of Ericsson’s Business Units.
Mononen has been with Ericsson for 23
years in various positions both in RD,
the business line and service delivery.
For the past 10 years he has worked
with security in both RD and services.
He holds an M.Sc. in computer science
and engineering from Chalmers
University of Technology, Gothenburg,
Sweden.
6
ERICSSON REVIEW • JANUARY 29, 2014
Building trust
To bring you the
best of Ericsson’s
research world, our
employees have been
writing articles for
Ericsson Review –
our communications
technology journal
– since 1924. Today,
Ericsson Review
articles have a two-to-
five year perspective
and our objective is to provide you with up-to-
date insights on how things are shaping up for
the Networked Society.
Address :
Ericsson
SE-164 83 Stockholm, Sweden
Phone: +46 8 719 00 00
Publishing:
Ericsson Review articles and additional material
are pub ished on www.ericsson.com/review.
Use the RSS feed to stay informed of the latest
updates.
Ericsson Technology Insights
All Ericsson Review articles are
available on the Ericsson Technology
Insights app available for Android
and iOS devices. The link for your
device is on the Ericsson Review
website:www ericsson.com/review. f you are
viewing this digitally, you can:
download from Google Play or
download from the App Store
Publisher: U f Ewaldsson
Editorial board:
Håkan Andersson, Hans Antvik,
Ulrika Bergström, Joakim Cerwall,
Deirdre P. Doyle, Dan Fahrman, Anita Frisell,
Jonas Högberg, U f Jönsson, Magnus Karlsson,
Cenk Kirbas, Sara Kullman, Kristin Lindqvist,
Börje Lundwall, Hans Mickelsson, Ulf Olsson,
Patrik Regårdh, Patrik Roséen and
Gunnar Thrysin
Editor:
Deirdre P. Doyle
deirdre.doyle@jgcommunication se
Chief subeditor:
Birgitte van den Muyzenberg
Contributors:
Paul Eade, Nathan Hegedus and
Ian Nicholson,
Art director and layout:
Jessica Wiklund and Carola Pilarz
Illustrations:
Claes-Göran Andersson
ISSN: 0014-0171
Volume: 91, 2014
Ericsson
SE-164 83 Stockholm, Sweden
Phone: + 46 10 719 0000
ISSN 0014-0171
284 23-3221 | Uen
© Ericsson AB 2014

Contenu connexe

Similaire à Ericsson Review: Setting the standard: methodology counters security threats

Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenSecurityGen1
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecurity Gen
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecurity Gen
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenSecurity Gen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen1
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies Security Gen
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdfSecurity Gen
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 

Similaire à Ericsson Review: Setting the standard: methodology counters security threats (20)

An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Mobile Application Security Service.pdf
Mobile Application Security Service.pdfMobile Application Security Service.pdf
Mobile Application Security Service.pdf
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 

Plus de Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

Plus de Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Dernier

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Ericsson Review: Setting the standard: methodology counters security threats

  • 1. The communications technology journal since 1924 Setting the standard: methodology counters security threats January 29, 2014 2014 • 1
  • 2. Setting the standard: methodology counters security threats Security has become a central question for network operators and the global telecommunications industry. This is largely due to a shift to more open IP networks, as well as a diminishing dependence on obscure telecom protocols and isolated infrastructure to provide security. The concerns that arise from these developments need to be addressed holistically throughout product development life cycles from creation to termination. changers have been the availability of open source implementations of 3GPP radio protocols and the use of common platforms.Astheworldmovestowarda futureinwhichtheimpactofthesefac- tors becomes even greater, security has become a primary consideration of the telecommunicationsindustry. To preserve interoperability among products, existing 3GPP telecommuni- cations standards have been developed with a focus on protocols and equip- mentbehavior.Thesecurityelementsof thesestandardspreventattackersfrom misusing systems through the defined protocolsandinterfaces. However, the existing standards do not cover how to securely implement protocols and associated functionality in a product, or how to test any given implementation for vulnerabilities. Neither do the standards specify how to secure the proprietary interfaces of aproductorhowsecurity-relatedissues should be managed throughout the product life cycle. In other words, secu- rity assurance is not part of the 3GPP standards. As demands for tougher security measures now tend to be discussed on a national level, the risk that different countrieswilldevelopdivergingcollec- tions of security requirements is high. This kind of fragmentation may not only make networks more expensive, but it jeopardizes interoperability and threatens subscriber access to network servicesandcapabilities. As this new threat landscape has become more evident and clearer to both governments and the telecom- munications industry, the demand for strongersecurityrequirementsoncom- municationsequipmenthasrisen,with specific emphasis on telecommunica- tionsequipment. Ideally,thestandardsthatgovernthe telecommunications industry should provide sufficient security functional- itytocombatanynewthreats.However, traditional telecom networks have offered a limited set of functionality, whichhasineffectprovidedthemwith protection.Devicesrunningonisolated infrastructurearebynaturelessvulner- able than networked ones. Mobile tele- com networks have an additional layer of protection provided by the many and very detailed telecom specifica- tions. This situation has now changed dramatically. In parallel with the transition to IP technology, the game KARL NORRMAN, PATRIK TEPPO, KEIJO MONONEN AND MATS NILSSON BOX A Terms and abbreviations CCRA Common Criteria Recognition Agreement eNodeB evolved NodeB IEC International Electrotechnical Commission ISO International Organization for Standardization MME Mobility Management Entity RNC radio network controller SCAS Security Assurance Specification SECAM Security Assurance Methodology SRM security reliability model USIM Universal Subscriber Identity Module Over the past decade, the number of attacks on IT and communications systems has risen drastically. This increase has gone hand in hand with a massive rise in the use of communications systems for everything from utilities and public health, to transportation and everyday communication. Ericsson refers to this as the Networked Society, and within it, networks serve as critical infrastructure that is fundamental for economic and social development. However, it also leaves society more vulnerable to cyber threats, both malicious and those arising from carelessness and a lack of awareness – it is this situation that needs to be addressed. 2 ERICSSON REVIEW • JANUARY 29, 2014 Building trust
  • 3. Tocounteractthesepotentialthreats to operator revenue, the best approach to addressing security issues is one that isglobalandrootedinstandardization. Standardizationactivities In mid-2012, Ericsson initiated a 3GPP initiative to stay ahead of the new secu- ritychallenges.Theobjectiveofthisini- tiative was to develop a set of security assurance requirements better suited for a world of ubiquitous connectivity, including a methodology to create the requirements, and a process to ensure that commercial products meet the desiredlevelofsecurity. For the methodology part, the ini- tial idea was to reuse the ISO/IEC 15408 ­standard Common Criteria1 . This approach is often used in conjunc- tion with product certification pro- cesses, such as the Common Criteria Recognition Agreement (CCRA), under which product evaluations and protec- tion profiles are performed to high and consistentstandards. However, 3GPP perceived the Common Criteria methodology to be toocomplexanddecidedtodesignanew andlighterone,whichwouldbetailored to meet the needs of the telecom indus- try – but borrowing from Common Criteriawhenappropriate. The new approach goes under the name of Security Assurance Methodology (SECAM), and its study phase has been completed and ­documented in a 3GPP Technical Report2 .Theformalizationofthemeth- odology is documented in the 3GPP TechnicalReport3 . Thenewmethodology The aim of any security assurance methodology–andSECAMisnoexcep- tion–istoprovideuserswiththeassur- ance that commercial products fulfill the security goals defined by the prod- uct’s intended use, at a predetermined levelofsecurity. Manufacturers,purchasersandusers often refer to products as being secure. Thetruemeaningofsuchastatementis thataproductmeetsagivensetofsecu- rity requirements, which in the worst case are implicit. But even if a product explicitly fulfills a defined set of secu- rity requirements, it may still contain vulnerabilities–itissimplynotpossible todefineeverysinglewayaproductcan bemisused.Securityrequirementscan be defined in a negative manner, for example: it shall not be possible for an unauthorized agent to modify the sys- temconfiguration. However,thereisnowaytoprovethat a product meets such a requirement. There may be ways for an unauthor- ized agent to modify system configu- ration that are not known at the time ofevaluation. SECAM differs from previous 3GPP standards in that it establishes security requirements not just for products but alsoforthedevelopmentprocessusedto manufacturethem. The methodology applies the follow- ing concept of assurance: an accreditor verifies that a manufacturer is capable of producing products to a given set of security requirements, thus eliminat- ing the need to issue certificates on a per product basis. This approach is in contrasttotheoneadoptedbyCommon Criteria, in which each product is typi- cally evaluated and certified by a third party,andwhereaccreditationrequire- ments relate to the evaluation process and thus fall on the third party and not themanufacturer. Roles,trustrelationships andrequirements SECAM includes a number of different roles, such as manufacturers and pur- chasers, and covers a number of trust relationships. Manufacturers build productsbasedonspecifications,while purchasers – in almost all cases opera- tors–trustthemanufacturertoadhere totheagreedsecurityrequirements. With SECAM, purchasers should be able to trust an accreditor’s indirect verification of a manufacturer’s devel- opment process. As the accreditor only verifies the development process, not the product itself, an additional role is needed to verify that products actually meetgivensecurityrequirements.This istheroleoftheevaluator,whichcould betakenonbyathirdparty.However,it is anticipated – and allowed by SECAM – that manufacturers will assume this role themselves once they have been verifiedbyanaccreditor. These roles and processes are illus- trated in Figure 1, and once all roles have been verified, purchasers will be abletotrustthesecurityofthedelivered commercialproducts. Theaccreditorwillreassesstheman- ufacturer’s product development Product specifications Product specifications ManufacturerManufacturer AccreditorAccreditor EvaluatorEvaluator PurchaserPurchaser Security assurance specifications Security assurance specifications Development Evaluation Purchaser acceptance decision FIGURE 1 SECAM process and roles 3 ERICSSON REVIEW • JANUARY 29, 2014
  • 4. for eNodeBs as well as the group of plat- form and physical security require- ments. A product that provides both RNC and NodeB functionality can apply the specific requirement groups for these 3GPP functions, as well as the same platform and physical security requirementsastheeNodeB. Groups of requirements are brought together under the umbrella of a Security Assurance Specification (SCAS),which roughlycorresponds to a Protection Profile in Common Criteria. An SCAS is used as input to the product development process (see Figure 1), and asseveralrequirementgroupscanapply to a product, more than one SCAS may beappropriate. Along with the actual security requirements, an SCAS includes tests to ensure that these requirements are correctly implemented. So, a product thatpassesallofthetestsmeetsthecor- responding requirement. It may not alwaysbenecessaryforaproducttopass all tests in an SCAS, though all results shouldbereported. It is assumed that management of an SCAS will follow normal 3GPP pro- cedures. In other words, corrections or updates are handled by submitting a change request to 3GPP. Under the cur- rent 3GPP meeting schedule, updates canbeproposeduptofourtimesayear. Productdevelopmentprocessand evaluation Intheory,theproductdevelopmentand evaluation process consists of four lin- earsteps.Inthefirststep,theproductis developed, and then it is tested in steps two to four. Security assurance, how- ever, tends to be executed in an itera- tiveandpartiallyoverlappingfashion. To enable purchasers to reevaluate a product, manufacturers must provide thetestresultsfromtheevaluationpro- cessandthedocumentationdescribing the product in the context of the appli- cableSCASs.Ifaproductfailsatest,this shouldbedocumentedandclearlycom- municated to the purchaser. An over- view of the four steps of the product development and evaluation process is showninFigure 2. Throughouttheinitialproductdevel- opment, manufacturers should docu- ment how the requirements of each applicable SCAS correlate to specific processes at regular intervals to ensure that approved procedures continue to be followed. During these assessments, theaccreditorwillalsoverifythatman- ufacturersareabletofulfillthesetsecu- rity assurance requirements, and that theevaluatoriscapableofperforminga properevaluationoftheproduct. The specific security requirements that should be set for product develop- ment processes have yet to be decided. It has, however, been agreed that these requirements will be set by GSMA – which also acts as an accreditation authorityfor(U)SIMmanufacturers4 . Selfdeclaration Oncetheevaluationofaproductiscom- plete, manufacturers can issue a self declaration, which can be used by pur- chasers for guidance during their buy- ing process. A self declaration includes the results of product evaluations, as well as information about whether the manufacturer and the evaluator are accreditedornot. Usingthesecurityrequirementsand test results defined in the self declara- tion, purchasers can carry out their own product evaluation. If the results of such a reevaluation are not consis- tent with the self declaration, the pur- chasermayinitiateadisputeresolution process with the accreditor. Should the accreditor conclude that the accredited manufacturer and evaluator have not acted according to the requirements for the product development process, disciplinary action could be taken, the outcome of which could be the revoca- tionofaccreditationlicenses. Securityassurancerequirements There are two main types of security assurance requirements in SECAM; these two types are also part of the CommonCriteria.Thefirsttyperelates tothedevelopmentprocessandthesec- ondtoproducts. Some examples of requirements relating to the development process includethatthemanufacturershall: useappropriatedevelopment-site protection; deploysufficientversionand configurationmanagement; applysecurecodingguidelines;and ensurethatasuitablepatch managementprocessisinplace. Requirements related to products are definedby3GPPandcollectedingroups. Several different requirement groups could apply to one and the same prod- uct.Forexample,requirementsthatare specific to a particular 3GPP function, such as an RNC, a NodeB, or an eNodeB maybecollectedintoonegroup. Other requirements, such as those related to platform security and physi- cal protection of the implementation may be put into another group. The purpose of this separation is that same requirement groups may be applicable to several different products and can thereforebereused.Forexample,abase station that provides eNodeB function- ality can apply the requirement group Product specifications Product specifications Security assurance specifications Security assurance specifications Development Enhanced vulnerability analysis SCAS compliance testing Basic vulnerability testing FIGURE 2 Product development and evaluation process (according to SECAM) 4 ERICSSON REVIEW • JANUARY 29, 2014 Building trust
  • 5. functions, assets or properties of the product.Thisdocumentationisreferred to as the SCAS instantiation and is SECAM’sclosestequivalenttoaSecurity Target in Common Criteria. The pri- marypurposeoftheSCASinstantiation istoprovidesufficientdetailtocarryout the required test activities: compliance testingandbasicandenhancedvulner- abilitytesting. Tests should be specified in such a waythataproducteitherpassesorfails –partialfulfillmentisnotanoption. Compliance testing includes, for example, verification that security configuration documentation exists, and that roles for operation and main- tenance personnel are properly docu- mented. Tool-driven and manual tests (in which a tester interacts with the product), such as verifying that access to the operations and maintenance function is authenticated, can also be includedintheSCAS. Basic vulnerability testing of a prod- uct consists of running a set of security testing tools. Port scanning is one such tool, and this test identifies open ports that should be closed. The testing pro- cess could also include the use of tools that exploit known vulnerabilities in both open and closed source software included in the product, as well as fuzz testingofprotocolimplementations. Enhanced vulnerability testing is a more thorough analysis and requires thatthetesterpossessesadeeperunder- standing of threat analysis and risk assessment than is needed for the pre- viousteststeps. Bynature,thistypeofanalysisishard to standardize, and 3GPP has decided to exclude it from the first stages of SECAM.Itmay,however,beincludedat a later stage, when SECAM has reached agreaterlevelofmaturity. SecurityassuranceatEricsson To ensure the correct level of security existsinitsproducts,Ericssonhasdevel- oped a security reliability model (SRM). This model provides a method to set ambition levels for security features and to ensure that an assigned level is achieved in the implementation of a product. SRM consists of three differ- ent areas, as shown in Figure 3. The processofsettingthesecurityambition levelisbasedonriskassessment. Within the SRM, security measures arefunctionalrequirementsdefinedfor products and are divided into different areas. Each area is further subdivided into levels, depending on the risks and threats associated with the product, so that an appropriate security level can besetforit. In the SRM, a standard set of secu- rity assurance activities – such as risk assessment – act to secure design rule compliance, adherence and vulnera- bility analysis, and configuration and patchmanagement.Theseactivitiesare a mandatory part of Ericsson’s process for product life cycle and are applied to allproductsindevelopment.Riskassess- mentisperformedearlyinthedevelop- mentphaseofaproduct,theoutcomeof whichdetermineswhatassuranceactiv- itiesneedtobeappliedlaterintheprod- uct-developmentprocess. The configuration and operation of security functions is documented in the customer product information. This documentation is also tested dur- ingthefunctionaltestingofthesecurity functions. Instructions and guidelines to support users on how to harden the productisalsopartoftheproductdocu- mentation,aswellasadescriptionofthe product environment (network, physi- cal and operational) and how it should be designed and implemented. All of this forms key parts of the documenta- tionrequiredbySCASsin3GPPSECAM. For Ericsson, the SRM is vital in our RD processes and provides us with a documentedapproachtoassurethatwe developsecureproducts.Allofwhichis in line with the self declaration that is includedintheSECAMprocess. Wayforward Thefirststepin2014intermsofSECAM developmentwillbefor3GPPtodevelop an SCAS for an MME5 and formally record the SECAM process in a perma- nent 3GPP document3 . In parallel with this activity, GSMA will begin to define therequirementsfortheproductdevel- opmentprocess,aswellasestablishthe accreditationauthority. Once these two activities have been completed,vendorsandGSMAwillrun apilottestcaseofSECAMevaluations. Ericsson engineers will continue to use their experience of working with the SRM to provide input to SECAM, andconversely,theSRMwillbealigned withSECAM.Andperhapsmostimpor- tantly,Ericssonwillcontinuetodevelop its SRM as a core feature to combat the constantly evolving threats to the ­communicationsindustry. Conclusions SECAM provides a framework to set security requirements that are appli- cable on a global scale. It also encom- passes security requirements and models for evaluating the quality of product development processes, as well as indirectly evaluating the qual- ity of commercial products. In addi- tion, the framework includes tests FIGURE 3 Three areas of an SRM Security reliability modelSecurity reliability model Security functions Security functions Security assurance Security assurance Security documentation Security documentation 5 ERICSSON REVIEW • JANUARY 29, 2014
  • 6. toensurethatproductsfulfilltheset requirements. The SRM model puts Ericsson in a good position to fulfill the require- ments and help keep future networks secureastheytakeanevermorecentral roleinsociety. 1. ISO/IEC 15408-1, 2009, Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model, available at: http://www.iso. org/iso/home/store/catalogue_ ics/catalogue_detail_ics. htm?csnumber=50341 2. 3GPP, Technical Report 33.805 V12.0.0, Study on security assurance methodology for 3GPP network products, available at: http://www.3gpp.org/ DynaReport/33805.htm 3. 3GPP, Technical Report 33.916, Security Assurance scheme for 3GPP Network Products for 3GPP network product classes, available at: http://www.3gpp.org/ DynaReport/33916.htm 4. GSMA, Security Accreditation Scheme,IncreasingU(SIM)security, lowering business risks, available at: http://www.gsma.com/ technicalprojects/fraud-security/ security-accreditation-scheme 5. 3GPP, Technical Report 33.116, Security Assurance Specification for 3GPP network product classes, available at: http://www.3gpp.org/ DynaReport/33116.htm References Patrik Teppo joined Ericsson in 1995 and is currently working as a security consultant and systems manager in the Network Security Competence Center at Ericsson Finland. He is the driver of Ericsson’s security reliability model (SRM) and provides back office support for 3GPP SECAM standardization. He holds a B.Sc. in software engineering from Blekinge Institute of Technology, Sweden. Karl Norrman joined Ericsson Research in 2001 to work in the area of security. His main focus is security protocols and architectures, software security and security assurance. He is currently Ericsson’s standardization coordinator for security in 3GPP (SA3 working group) and is the main delegate for the work on SECAM. He holds an M.Sc. in computer science from Stockholm University. Mats Nilsson is the director for Product Security within the CTO office. He coordinates the technology- and product-related security activities within Ericsson, including regulatory aspects. In this role, he initiated the 3GPP activities on security assurance and the SECAM standardization. Nilsson is a well- known industry veteran, having held a series of front-line positions within Ericsson since the 1990s, as well as serving as CEO for the Open Mobile Terminal Platform initiative. Keijo Mononen is the Head of the Ericsson Network Security Competence Center. His Competence Center is responsible for driving and supporting network security activities across all of Ericsson’s Business Units. Mononen has been with Ericsson for 23 years in various positions both in RD, the business line and service delivery. For the past 10 years he has worked with security in both RD and services. He holds an M.Sc. in computer science and engineering from Chalmers University of Technology, Gothenburg, Sweden. 6 ERICSSON REVIEW • JANUARY 29, 2014 Building trust
  • 7. To bring you the best of Ericsson’s research world, our employees have been writing articles for Ericsson Review – our communications technology journal – since 1924. Today, Ericsson Review articles have a two-to- five year perspective and our objective is to provide you with up-to- date insights on how things are shaping up for the Networked Society. Address : Ericsson SE-164 83 Stockholm, Sweden Phone: +46 8 719 00 00 Publishing: Ericsson Review articles and additional material are pub ished on www.ericsson.com/review. Use the RSS feed to stay informed of the latest updates. Ericsson Technology Insights All Ericsson Review articles are available on the Ericsson Technology Insights app available for Android and iOS devices. The link for your device is on the Ericsson Review website:www ericsson.com/review. f you are viewing this digitally, you can: download from Google Play or download from the App Store Publisher: U f Ewaldsson Editorial board: Håkan Andersson, Hans Antvik, Ulrika Bergström, Joakim Cerwall, Deirdre P. Doyle, Dan Fahrman, Anita Frisell, Jonas Högberg, U f Jönsson, Magnus Karlsson, Cenk Kirbas, Sara Kullman, Kristin Lindqvist, Börje Lundwall, Hans Mickelsson, Ulf Olsson, Patrik Regårdh, Patrik Roséen and Gunnar Thrysin Editor: Deirdre P. Doyle deirdre.doyle@jgcommunication se Chief subeditor: Birgitte van den Muyzenberg Contributors: Paul Eade, Nathan Hegedus and Ian Nicholson, Art director and layout: Jessica Wiklund and Carola Pilarz Illustrations: Claes-Göran Andersson ISSN: 0014-0171 Volume: 91, 2014
  • 8. Ericsson SE-164 83 Stockholm, Sweden Phone: + 46 10 719 0000 ISSN 0014-0171 284 23-3221 | Uen © Ericsson AB 2014