Security considerations in the 5G era - An exploration of mobile edge computing and how to be ready for the transition to 5G - SAM Seamless Network

Page created by Cory Thomas
 
CONTINUE READING
Security
considerations
in the 5G era
An exploration of mobile edge
computing and how to be ready
for the transition to 5G

www.securingsam.com
Mobile edge computing (MEC)
  is an emerging concept introduced
  to bring cloud services and
  resources closer to the user by
  positioning them at the edge of
  the network.
  MEC helps achieve desired outcomes of low latency,
  location awareness, and mobility. In this paper, we discuss
  the cybersecurity aspects of mobile edge computing in
  the context of the 5G transition and how it facilitates two
  important results:

  Delivers secure                       Creates safe digital environments
  infrastructure                        for consumers and machines

  Mobile Edge Security for Consumers
  While telecom providers have been deploying 5G networks prior to last year,
  2020 was the year that the world was introduced to a hands-on experience with 5G with
  new smartphones from multiple manufacturers including Samsung and Apple. The iPhone
  12 was the first model with support for 5G, including both mmWave and Sub-6GHz 5G,
  the two types of 5G, and it set a record for sales.1

  The term 5G is often associated with IoTs, VR and autonomous cars; however, today,
  smartphones dominate the 5G market. Out of 715 devices certified by the Global
  Certification Forum last year, 71% were smartphones. 2 And, according to estimates from
  Ericsson’s latest Mobility Report, the number of 5G smartphone subscriptions worldwide
  is expected to rise to 600 million by the end of this year, almost tripling the 2020 total.3

SAM | Mobile Edge Security                                                                       1
5G Certifications by Type                                                                                         Other
                                                                                                                    2.1%

                                                                                                Platform
  Considering the increasing and                                                                2.0%
                                                                                    Tablet
  widespread adoption of such                                                       2.0%
  innovative technology, its’s critical                            WLAN Router
                                                                   4.7%
  to examine two key considerations:
                                                            Other
  1. How to ensure the technology                           (personal comms)
                                                            4.7%
  infrastructure and supply chain
  are safe and do not increase the
                                                                    Module
  attack surface.                                                   13.4%

  2. How to utilize the technology
  to protect subscribers from risks
  in the application layer.

                                                                    Smartphone
                                                                    71.1%

  Safe 5G
  Infrastructure
  The 5G transition enables new services riding on           Current 5G deployments leverage legacy
  top of 5G and it brings tremendous promise in              infrastructure and untrusted components
  capabilities and innovation. However, only investing in    as it builds upon previous generations
  functionalities and turning 5G deployment into a race
                                                             of wireless networks; they are currently
  while not simultaneously securing the infrastructure,
                                                             being integrated with 3G/4G networks
  dangerously leaves the door open for security
                                                             and contain legacy vulnerabilities.
  compromises.
                                                             Vendors, service providers, and integrators MUST push to
  Roll outs of both the hardware and software
                                                             upgrade the legacy components; delaying this to save money
  components of 5G deployments require standards that
                                                             today will cause tremendous costs in the future. According
  emphasize security and resilience to prevent attempts
                                                             to IBM System Science Institute, addressing security issues
  by threat actors that may influence the design, hijack
                                                             during design is 15 times less expensive than during testing,
  software, or control traffic.
                                                             and 100 times cheaper than during maintenance. 4
  It’s critical to fully understand the risks and how to
  remediate them prior to any breach or threat occurs.

SAM | Mobile Edge Security                                                                                                   2
SDN (Software Defined Networking)                                      The barriers to entry as an infrastructure
  will play a crucial role in the design of 5G                           provider within the 5G marketplace today
  wireless networks. However, like any other                             are very high; only a few vendors (e.g. Nokia,
  software-based solution, ongoing remote                                Ericsson, Samsung and Huawei) are invested
  updates are the most notable advantage                                 in building the core infrastructure, which
  and the most challenging risk.                                         creates limited competition, resulting in
  Consider similar software-based products; it seems that
                                                                         proprietary solutions.
  the SaaS Application Development Lifecycle is well defined             The ability of the community to audit proprietary solutions is
  to handle innovative technology while limiting the possibility         challenging, so programs like “bug-bounty”* cannot be fully
  of vulnerability in production. However, assuming that                 leveraged. Limited competition means that once a hacker
  5G is an isolated network increases the attack surface                 discovers a vulnerability in one component, it has a worldwide
  dramatically.                                                          impact.

  Therefore, vendors, service providers, and integrators must            These two risks alone could potentially damage the
  adopt secured cloud development methodologies that                     reputation of the entire 5G industry. Vendors, service
  assume that everyone is accessible, but no one is trusted.             providers, and integrators MUST leverage open
                                                                         architectures like O-RAN* and OpenRAN.
  According to IBM, organizations can
  cut costs by 15X if they address security
  during design.

  O-RAN                                                                  Bug-Bounty
  O-RAN Alliance is an operator defined open radio access                Bug-bounty refers to specific programs organizations and
  network that works to transform the industry to an open,               websites have developed that offer compensation and recognition
  intelligent, virtualized, and fully interoperable RAN.                 for reporting bugs, particularly if they are related to security
                                                                         breaches and/or vulnerabilities.

  True Seamless Security                                                 5G connectivity
                                                                         is 600X faster than current
  5G promises to offer speeds of approximately 10 gigabits
                                                                         4G mobile phones
  per second to your phone. That's more than 600 times faster
  than the today’s 4G speeds on mobile phones—fast enough
  to download a 4K high-definition movie in 25 seconds.

  The evolution of mobile connectivity

                                   3G                          4G                            5G

            Development year       2004 -2005                  2006 - 2010                   2020 and beyond

            Bandwidth              2 mbps                      200 mbps                      > 1 Gbps

            Latency                100 - 500 Milliseconds      20 - 30 Milliseconds          10 Milliseconds

            Average Speed          144 Kbps                    25 Kbps                       200 - 400 Mbps

SAM | Mobile Edge Security                                                                                                                  3
Reaching 10 gigabit per second and 1 millisecond latency requires offloading cloud
  computing into the edge, known as Mobile Edge Computing (MEC). It helps reduce
  congestion on mobile networks to enhance the quality of experience (QoE), and this routing
  reduces costs which is essential in mass production technologies.

  MEC will also change the way consumers are protected. Today, consumers primarily
  use endpoint software like Antivirus to defend themselves. MEC releases the chains
  of download, installs and maintains endpoint software, damages the battery, and requires
  dedicated flavor for each operation system missing the advantages of Cloud Applications.

  Leveraging MEC changes the game
  in the following areas:

  User privacy                                                        Digital safety
  VPN is a great tool to protect user privacy; it masks IP            Being anonymous is just a part of the equation for
  addresses, so your online actions are virtually untraceable.        information security. Another more important factor
  Even more importantly, VPN services establish secure and            is filtering malicious content like malware, phishing, and
  encrypted connections. One of the well-known drawbacks              spyware, that are delivered in email, websites, and social
  of VPN is the slow internet caused by the doubled                   media.
  roundtrip of traffic.
                                                                      Today, mobile devices are protected against these scenarios
  Before the mobile device traffic arrives at its destination,        mostly by endpoint security software. However, most
  it is redirected via the VPN server, which might be located         consumers lack the awareness to ensure this is implemented
  far away from the user or the destination.                          on their devices.

  Increase efficiency and save bandwidth costs by installing          Having a safe browsing module in the edge will provide
  VPN servers closer to the endpoint.                                 agentless, network-based security that can protect mass
                                                                      production users.

  Remote work
  As 5G networks allow users to send large amounts of data
  to cloud-based applications, it will require the traffic to
                                                                      SASE
  go directly into the cloud without passing through their
                                                                      Secure Access Service Edge is a term coined by Gartner
  organization's private networks. However, CISOs will want
                                                                      in August 2019. It refers to a new network security model
  to enforce advanced security controls such as Zero Trust
                                                                      that combines different functions of network and security
  Network Access (ZTNA), Cloud Access Security Brokers
                                                                      solutions into a unified cloud security platform to be delivered
  (CASB), and Secure Web Gateways (SWG).
                                                                      as a service.
  Applying these security controls without redirecting the
  traffic via the organization’s private networks will require
  an extension of the SASE5 solutions into the Mobile Edge.

SAM | Mobile Edge Security                                                                                                               4
Mobile Edge
  Enterprise Security

                                                                               Branch

                               Edge                                           SDWAN
                               Node
  Smartphone                                                                                       Headquarters
                                                             Packet
                                                             Core

                               Edge
                               Node
  PC with
  5G Module

                                                                                             Enterprise Cloud Apps

          CASB          ZTNA

          SWG            IPS

     Advanced Security Controls                               WWW

  Mobile Edge Security for IoTs
  Although there is a higher adoption rate of 5G smartphones versus IoT devices today,
  billions of dollars are spent on enabling access machines to connect to the 5G network
  via cutting-edge technologies like eMTC, NB-IoT, NR-Light, and eMBB. Imagine being able
  to wear smart glasses outdoors, without any WiFi Hotspot around, or text your vehicle
  to drive itself from the parking garage to pick up your children from the school. Today,
  IoT security solutions are focused on protecting local managed networks such as homes,
  offices, and enterprises.

  However, the 5G transition requires IoT security solutions to deep dive into distributed
  unmanaged assets like cars, solar panels, wearable devices, and smart cities to ensure
  they’re properly secured.

SAM | Mobile Edge Security                                                                                           5
Distributed IoT Security
  Unlike enterprise networks, where the CISO or IT team control which devices have access
  to the network, in mass production IoT, the user needs a SIM card to gain access and
  create damage. Mass production IoT security solutions have cloud-native architecture that
  leverages MEC to identify the devices, enforce security policies and detect anomalies.

  Using MEC as part of its architecture enables better user privacy and safety, without impact
  on the customer experience, and offers the service provider a new way to monetize 5G
  after investing billions of dollars in the architecture.

  Mobile Edge Consumer
  and IoT Security

  Consumer IoT
  & Wearables

                                                                 User                             User
                                                                 Plane                            Plane
                                                   VNFs         Function                         Function      VNFs
  Critical IoTs                                    CNFs                                                        CNFs

                                                        Packet Core                                  Mobile Edge

  Distributed
  Assets
                                                                     Hot
                                                  Fingerprint
                                                                     Patching

                                                    Isolation        Dynamic
                                                                     Firewall

                                                 Advanced Security Controls                            WWW

SAM | Mobile Edge Security                                                                                            6
The following technologies are the building blocks
                      of Mass Production IoT Security solutions

  Device Fingerprint
  Again, without a CISO as a gatekeeper for the network,             The ability to identify devices down to the specific device
  nobody knows which devices are connected along with the            level in seconds requires leveraging machine learning
  vulnerabilities they bring with them. Identifying the devices      algorithms trained on real-world data sets that operate in
  based on their network signature is core functionality that        the edge, so that all the required data is visible.
  every IoT security solution should have.

  Smart Device Policies
  Once the connected devices are identified, it becomes possible to enforce device security policies. These policies cover both
  prevention and remediation, and they are built on top of two enterprise-grade technologies:

  (a) Virtual patching: Attackers can access IoTs as they are        (b) Dynamic firewall: By leveraging device classification, it
  connected directly into the mobile network. If devices have        allows IoT devices to communicate only with the intended
  any vulnerability, this technology patches the devices over        internet addresses. For example, based on thousands of
  the network remotely to block the exploits and reduce the          nest smoke alarm devices connected to the mass IoT security
  possibility of compromising the device.                            solution, we can map the communication pattern of each nest
                                                                     smoke alarm model and enforce the correct communication
                                                                     path for each one of them.

                                                                             Hostnames *.nestcom
                                                                             Any port

                                                                             Hostnames *google.com
      Whitelisted                                                            Ports 123, 443
      Access                                              SAM
      Condnonal                                           Mobile             Hostnames *googleusercontent.com
      Access                                                                 1e100. net Port 443
                                                          Edge
                                                                             Hostnames *compute-1.amazonaws.com
                                                                             Port 443

  Network Isolation
  Slicing is the most crucial component for implementing the         Isolation of each network slice helps service providers and
  personalization of mobile networks for unmanaged devices.          organizations enhance their products' privacy and security
  By the definition of 5G network slicing, logical networks can      while not impacting other network slices. This can be
  be virtually represented by a single network. Every network        implemented in various ways – by device classification, risk
  slice will have specific network functions to provide tailored     score, identity, and required functionality.
  services for different requirements, offering better agility,
  flexibility, and cost-efficiency.

SAM | Mobile Edge Security                                                                                                           7
Make it happen!
While crafting and reviewing this paper, we became even more convinced about how many different aspects just
from a security perspective must be covered and maintained in parallel to all the great opportunities 5G brings.

Enabling 5G is a mission that MUST involve every part of the supply chain, from the physical antenna
manufacturer to Cloud-Native Function (CNF) vendor, which provides VR streams.

Service Providers, vendors, and integrators, we at SAM Seamless Network are here to help you establish
reliable and secure 5G connectivity in the following areas:

Review of your 5G                                 Mobile Edge Security                        Consumer networks
security infrastructure                           for enterprises                             and IoTs
attack vectors and ensure                         using a combined solution of the            using the SAM Platform
a secured environment.                            SAM Platform together with our              to create new ways to monetize
                                                  technology partners.                        the 5G advantages.

References
1.   https://www.livemint.com/companies/company-results/apple-records-strongest-quarter-ever-with-iphone-
     sales-up-by-17-11611793957072.html

2.   https://www.lightreading.com/5g/5g-device-trends-mmwave-standalone-iot-gain-ground/d/d-id/768307

3.   https://www.ericsson.com/4adc87/assets/local/mobility-report/documents/2020/november-2020-ericsson-
     mobility-report.pdf

4.   https://www.researchgate.net/figure/IBM-System-Science-Institute-Relative-Cost-of-Fixing-Defects_
     fig1_255965523

5.   SASE - Coined by Gartner in August 2019, is a new network security model that combines different functions
     of network and security solutions into a unified cloud security platform to be delivered as a service.

Contact us
For more information about SAM Seamless Network, visit our website,
securingsam.com or contact us at info@securingsam.com

                            Israel - Headquarters             New York Office                           Berlin Office
                            Totseret Ha'arets 7, Tel Aviv     488 Madison Ave, 11th Floor, NY 10022     5, Schinkelpl, 10117 Berlin
You can also read