Most operators plan to deploy 5G by relying on previous-generation 4G LTE networks with Non-Standalone architecture. The problem is that this approach will leave 5G subscribers with all the security issues of previous-generation networks.
Learn how to safely and systematically bring mobile networks up to 5G. In this webinar, Pavel Novikov, Head of the Telecom Security Research Team, discusses:
- Which new risks will appear with 5G deployment
- Why the 5G security architecture by itself is not enough to keep networks safe
- Why any 5G-only security efforts will be pointless
- How to protect 5G networks
2. 18 years
of experience
in R&D for enterprise
cybersecurity services and
products
9 years
of dedication to telecom
cybersecurity
2 R&D
centers in EU
41countries
where we have done projects
60 assessments
per year
are performed by our experts
for telecom companies
5G leader
for cybersecurity
Positive Technologies is a leading global provider of
cybersecurity solutions for telecom & mobile operators.
PT is a pioneer in signaling security research and active
contributor to industry standards.
1
telecom
cybersecurity vendor
We are the only company in the
world focused on end-to-end
cybersecurity for mobile operators
Company profile
PT is present at the most valuable security and telecom
industry conferences
3. Positive evolution
2002 2014 2016 20182012 2019 2020
Started as
enterprise
cybersecurity
services
company
Telecom
cybersecurity
services launched
World’s first
fundamental SS7
security research
released
Second
R&D
center
opened
in Brno
Portfolio extended with
cutting-edge 5G services
Service portfolio extended with
IoT security, anti-fraud, and
monitoring offerings
Telecom
Network Attack
Discovery
IP network
traffic analysis
solution released
Telecom
Attack Discovery
NGFW
Next Generation
Signaling Firewall
released
#1 Signaling
Firewall Award
Telecom
Attack Discovery
Included in
market guide
Telecom
Attack Discovery
IDS
Signaling IDS
released
Starting as a cybersecurity services company, PT has enhanced its service portfolio with
products that help to continuously deliver expertise and intelligence
4. Bio
Pavel Novikov
Lead of telecom security research team
GTP security
Diameter security
RAN security
SIP security
IoT security
5G security
5. Introduction
MNOs are paying close attention to the network
architecture changes coming with the 5G
migration.
This evolutionary advance over fourth-generation
(4G/LTE) networks is expected to enable a new
level of service and features for clients.
Most 5G subscribers will actually be Internet of
Things (IoT) devices.
6. But how to deploy 5G?
image: Freepik.com
Non-standalone
Standalone
Slicing
MEC
7. 2G 3G 4G 5G
NSA
Early
IoT
Dual mode
packet core
Pure 5G SA
and IoT
What is about security in 5G?
New protocols (HTTP/2, PFCP)
New architecture (Service-based)
New functions
https://blog.logsign.com/it-security-vs-cyber-security-what-is-the-difference/
9. How to build 5G ASAP
The current approach to 5G by most operators and
vendors consists of relying on previous-generation
4G LTE networks with the Non-Standalone
architecture and opting for Option 3 NSA.
This is a rapid way for operators to provide
subscribers with 5G access, since they do not need to
build a new core network and can instead focus on
the 5G radio area network (RAN).
19. Migration
4G subscribers in old part of network
5G subscribers in new network with 5G benefits and possibility to connect via 4G
network to 5G core (interconnect)
20. Migration
4G & 5G subscribers in hybrid network with 5G benefits and interconnect
21. What is about security?
https://blog.devolutions.net/2019/08/gartner-publishes-top-10-security-projects-for-2019
23. 5G security – user plane
UPF – User Plane Function
IPUPS – Inter-PLMN User Plane Security
24. Old and new function aggregation
Misconfiguration
Accessibility to new functions via old
networks
https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks
Possible security issues
29. PT SECURITY APPROACH
The trend nowadays is that telecom industry is
changing rapidly. A convergence of the telco and IoT
technologies starts to spread. The former and current
IT security teams are step by step taking
responsibility for the telecom security assets.
However, for a smooth transformation, telecoms
require help from security experts to perform a test
and trial approach – to assess network security,
evaluate the current signaling network protection
level and ensure that core network security is fully
compliant with the best practices and guidelines.
33. How does it work
Onboard telecom security monitoring
Train staff to monitor security posture of
telecom infrastructure
Develop and apply security controls for
network elements
Deploy security measures and verify
compliance
Conduct regular security assessments
Assess
Monitor
Protect
Auditing provides essential
visibility to fully understand your
ever changing network risks.
Continuous real
time monitoring is
essential to
measure network
security efficiency
and provide rapid
detection and
mitigation.
Secure your network completely by
addressing both generic vulnerabilities
(GSMA) and threats that actually affect
you as an ongoing process.
34. Thank you
@positive-tech.com Positive Technologies
Pavel Novikov, Lead of Telecom Security Research Team
Pavel.Novikov@positive-tech.com
Contact@positive-tech.com