Discover how we transform IT and strengthen the security of the top companies in the market.
Integrated security to detect, prevent, and respond to threats.
Continuity and recovery to keep your business always running.
Compliance and security culture to elevate your company’s cyber maturity.
Take control of your company’s IT with integrated and secure management tools.
Hybrid and integrated infrastructure to support the evolution of your business.
Use hybrid cloud with the security of having the support of one of the most important players in the market.
Specialized services to operate and evolve your IT efficiently.
Provide your company with Private Network solutions that only an end-to-end integrator can offer.
Outsource efficiently, maintaining control over everything your company needs.
Handle payment and invoice issuance with credibility, efficiency, and data security.
Articles, events, and information to go beyond and dive deep into each technology. Be inspired to transform your company.
Learn about technological innovations and how they can benefit your company.
5G internet has arrived in Brazil, in capitals and large cities, bringing greater bandwidth and lower latency to enable a range of new business applications. This latest generation of cellular technology was designed to be more robust than its 3G and 4G predecessors. However, the security of 5G mobile networks also brings a new challenge for companies and new users.
5G can potentially represent security threats, partly because there are more vectors through which adversaries can attack. The technology is configured to allow a large number of connected devices, known as IoT. IoT devices act as threat agents because they can be controlled to form what is known as a botnet (a network of infected machines that can be controlled remotely) to carry out distributed denial-of-service, or DDoS, attacks to paralyze networks. The challenge is amplified by 5G use cases, such as connected cars and healthcare, which bring specific industry-critical security requirements.
The good news is that there is protection too! 5G is based on the 3GPP SBA architecture, being built on VNFs and CNFs, operating in virtualized networks that are typically governed by robust protocols. The figure below shows a high-level overview of the SBA architecture, composed of several layers:
In a multi-layered environment, some attack vectors can hit a layer left without sufficient protection, giving the attacker a vantage point in the environment and opening the doors for lateral movement to compromise other layers. Thus, protection and security assurance must span all network layers, from the Core to the gNodeBs.
The security of 5G networks creates an urgent need for the ecosystem — mobile operators, infrastructure providers, vertical sectors, and regulators — to work together.
Fundamentally, 5G security is important now because it is becoming essential for many other parts of our lives, not just for traditional internet connectivity and voice calls, but for entire industrial and commercial operations.
Before entering into the new security challenges that 5G brings, it is important to establish that 5G networks are much more secure than 3G and 4G. Security issues — from the RAN to the network Core, passing through the various aggregation stages — were addressed and mitigated during the standardization process by the 3GPP (3rd Generation Partnership Project) teams.
Within 3GPP, the area that handles 5G network security is the 3GPP TSG SA WG3/SA3 (Security Assurance Specification). SA3 is responsible for defining the security requirements for 5G networks and developing the corresponding security standards. The SA3 team works closely with other 3GPP teams to ensure that security aspects are considered in all phases of the 5G network lifecycle, from conception to deployment and maintenance.
Several organizations join their efforts to offer standards regarding security in mobile networks.
Therefore, 5G security started from a much more advanced baseline than existing mobile systems. However, security threats are a constantly evolving arms race. New technologies and new ways of using them will create additional vulnerabilities.
Some of the security improvements introduced by 3GPP in the 5G network architecture include:
First, 5G security challenges need to be recognized and addressed. The threats below stand out as the main dangers:
The Enterprise sector is moving rapidly toward Digital Transformation, despite successive economic crises, the pandemic, and geopolitical problems that have plagued the world. Large companies with significant presence in their field are undergoing unprecedented changes, driven by the adoption of cloud services, IIoT, Data Analytics, AI, AR/VR, Edge, and Blockchain. Although the degree of implementation of these technologies varies in each vertical, there is a common factor: the need for connectivity in a fast, secure, and manageable network.
A Private 5G Network is a corporate network that provides communication connections for users belonging to a private organization, with specific application services tailored to each business’s needs. For industrial applications, the ability to deploy mobile networks to meet the reliability, latency, and security requirements of critical applications is fundamental for the new wave of cyber-physical systems known as Industry 4.0.
These networks can be implemented in various modes, much more flexible than previous 3G and 4G generations. One can use both equipment totally separate from public networks or implement Private Networks in varying degrees of sharing with operators.
For RAN sharing, the two most used solutions are known as MOCN (Multi Operator Core Network) and MORAN (Multi Operator RAN):
In addition to the existing solutions above, Private Networks can be implemented using a sharing part of the public operators’ Core, in various formats, as shown in the figure below:
Currently, equipment for independent 4G/5G Private Networks is supplied in a small rack, with a server running the Core — implemented entirely in SW (VNF/CNF) — and with macro and/or small cells at the locations (on premises). If necessary, local processing capacity can be implemented via Edge Computing.
Today’s cyberattacks can already bypass mobile network security, and 5G, with billions of attack points, only makes things worse. Old protection approaches are not scaled or will not be able to adequately prevent successful attacks on 5G networks. We must always remember that 5G radio network deployments include tens of thousands of small cells, device-to-device communications, and devices connected to several cells at the same time.
This evolution expands the threat landscape by increasing the number of intrusion points. With billions of connected devices and critical industrial applications depending on 5G networks, operators will have to deal with more frequent attacks and security incidents than in 4G. Given this scenario, it is important to adopt a comprehensive end-to-end security strategy that includes:
With these security features deployed, operators will be able to protect their network elements and subscribers, while providing differentiated network security services so that companies can transform their businesses, with confidence in the new 5G applications.
Is 5G Security a Shared Responsibility?
In many ways, 5G is a “shared responsibility model,” much like cloud services:
It is important that these groups are aligned and collaborating to ensure end-to-end security.
Our team of experts is ready to support your company with solutions that enhance performance and security.