F5 5G WP BuildingBetter5GSecurity Final 120720
F5 5G WP BuildingBetter5GSecurity Final 120720
Building Better
5G Security
How to harness and adapt IT best practices to protect 5G core networks
IN THIS WHITE PAPER, As Mobile Network Operators (MNOs) implement standalone 5G core
WE PROVIDE AN OVERVIEW networks, they will implement service-based architectures that use IT
OF THE KEY SECURITY
concepts and protocols like HTTP/2, APIs, and microservices, relying on data
CONSIDERATIONS IN EACH
centers at the edge of the network to support responsive connectivity.
OF THE FOUR PLANES
THAT MAKE UP A 5G This will give MNOs much greater flexibility and scalability than they have had in the past,
CORE NETWORK.
giving them the versatility they need to support many more use cases and applications, and
opening up new business opportunities. 5G also will extend the threat landscape and the
attack surface that operators need to defend.
In this white paper, we provide an overview of the key security considerations in each of the
four planes that make up a 5G core network:
• In the data plane, the N6 Interface, which sits between the UPF (user plane function)
and the Internet, needs to employ an array of security tools, such as a N6 firewall,
carrier-grade network address translation, protection against distributed denial-of-
service (DDoS) attacks, domain name system security, and, increasingly, dedicated
IoT firewalls. Pioneering 5G operators have found that employing a unified platform
encompassing all of these security tools is more efficient and effective than sourcing
them from individual vendors. Similarly, deploying DDoS mitigation capabilities on a
SmartNIC (network interface card with an integrated field-programmable gate array)
installed on a standard x86 server can be a cost-effective way to fend off attacks
designed to overwhelm the computing resources in the data plane.
MNOs need to rigorously ensure that their 5G core network’s service-based architecture fully
accounts for the challenges inherent in operating a telecoms network that is broadly exposed
to the outside world and handles large volumes of traffic from many different sources.
However, with a considered approach and the right partners, it is feasible to secure all four
planes of a 5G core network in an effective and cost-efficient way.
Drawing on F5’s extensive expertise in IT and telecoms, we will explore how to combine best
practices from the IT and telecom worlds to help secure the four planes of a 5G network.
S6a
S1 - MME (Diameter) N1 N2
HSS PCRF N4 (CUPS)
MME
EDGE
Gx (Diameter)
REGIONAL
N3 CENTRAL
S1-U (GTP)
5G-AN
S5/S8
4G SGW PGW Data UPF
Network Non 3gpp N31WF
Access
User Data and Data
Package Gateway Network
For example, in an industrial plant, the machinery may be generating massive amounts of
usage and performance data, requiring near real-time analysis by an application located
either on-site or in a MNO’s edge data center. Using applications that reside inside the cellular
network avoids the latency of round-trips to conventional public cloud infrastructures.
Many mobile operators have the ambition to run telco cloud architectures in which both
network functions and applications coexist on the same infrastructure. 5G networks will have
a multi-cloud approach encompassing central, edge and far-edge data centers (see Figure 2).
Both the 5G network and the applications it delivers will be containerized and embedded in
the same architecture.
Telco Cloud
vCloud NFV - Core - Edge - RAN
Infrastructure
PUBLIC CLOUDS CORE NETWORK SITES EDGE NETWORK SITES EDGE / DEVICES
5G Core
5G NETWORK UPF
vRAN
Telco Cloud
The telco architecture that runs a 5G network can be divided into a data plane (also known as
Figure 3: The flexibility of 5G
networks could also make them
the user plane), the control and signaling plane, the management plane, and the application
more vulnerable infrastructure. Each of these planes is vulnerable from both the inside and the outside
(see Figure 4).
• The data plane, which carries the network user traffic, is connected to the Internet and
the world of external applications, making it vulnerable to attack.
• In the management plane, MNOs will expose APIs to external MNO partners to make
use of, or to even program, some aspects of their 5G network for specific purposes,
such as IoT use cases that employ network slices.
• In the application infrastructure, third parties can deploy their applications inside the
network, potentially introducing vulnerabilities.
Internet
5G Data Plane & Apps
IT Workloads 5G Eco-system
5G Application Plane
Partners
Far Edge (MEC) Near Edge (MEC) Regional POP Central POP
Telco Cloud
User
Internet
The sections that follow outline some of the key architectural and related security
Figure 4: The four planes in the telco
cloud that need to be secured considerations in each plane.
S E C U R I N G T H E N 6 I N T E R FAC E
The traffic flowing through a traditional mobile network is managed by the S/GI-LAN interface.
In a 5G network, this role is performed by the N6 Interface, which sits between the UPF (user
plane function) and the Internet.
This interface provides a number of security services, such as the N6 firewall, carrier-grade
network address translation (CGNAT), protection against DDoS attacks, DNS security and,
increasingly, dedicated IoT firewalls. In the latter case, a firewall is used to provide very
granular level control as to which IoT device can communicate with which server in the back
end. That ensures the traffic doesn’t leak between different IoT use cases and eliminates
leakage to the public Internet.
To give themselves greater scalability and flexibility, many mobile operators are now using a
virtual architecture, rather than a physical architecture, to provide these services. They hope
that a virtual architecture will make it easier to deploy new network functions and launch new
services without any network downtime, boosting service agility. If each of these functions is
In contrast, employing a single vendor to cover a wide range of different services simplifies
the integration into higher-level automation or distribution tools (see Figure 5). Deploying a
unified platform also reduces the initial capital outlay because fewer CPUs are required to run
a suite of software than an array of separate network functions. A study by one of F5’s MNO
customers concluded that using a single VNF (virtual network function) instance for S/Gi-LAN
services results in a 60% reduction in the total cost of ownership of the necessary computing
infrastructure.
TCP & Video Application CGNAT IoT Subscriber Gi Firewall DDoS Secure
Optimization Identification Firewall Security Protection DNS Cache
Reporting Services
Figure 5: How a unified platform can help secure the data plane
D E A L I N G W I T H D D O S AT TA C K S
One of the biggest security challenges in the data plane is presented by DDoS attacks.
Historically, operators have deployed a purpose-built platform for DDoS mitigation with
two major components—a FPGA (field-programmable gate array), which provides hardware
acceleration for some functions, and CPUs for very granular processing. The FPGA is
programmed to process network traffic and mitigate large volumetric attacks, which use a
barrage of malformed packets to consume network bandwidth and large numbers of CPU
cycles to bring the CPUs down.
These dedicated platforms are no longer necessary with the arrival of the SmartNIC from
Intel. A SmartNIC, installed on a standard x86 server, enables F5 to leverage Intel’s FPGAs,
providing hardware-accelerated DDoS mitigation capabilities in a fully virtual environment
(see Figure 6).
Figure 6: Deploying SmartNICs to FPGA L3-L4 volumetric (UDP, TCP, flood,...) CPU CPU
help protect CPUs from DDoS attacks
L7 app specific (HTTP, DNS,...)
CPU DDoS mitigation
Purpose-built Purpose-built
DDoS Platform DDoS Platform SmartNIC
TIME
This new architecture helps prevent edge computing CPU resources from being
overwhelmed by DDoS attacks that seek to consume network bandwidth and disrupt low
latency applications, such as video surveillance, machine vision, and remote control systems.
Always on, inline DDoS protection offered by this new architecture is critical to protect real-
time, latency sensitive applications.
Kubernetes ingress
Sidecar Sidecar
Proxy Proxy
POD
Within the application cluster, the different microservices talk together using a standardized
service mesh. This mesh allows the company to observe the traffic flows between these
different microservices and, if necessary, protect this traffic using mTLS (mutual transport layer
security) encryption.
• Pre-encryption tapping
Sidecar Sidecar
Proxy Proxy
• Leverage existing packet broker
infrastructure SEPP IPX
HTTP/2 REST API
Diameter Security Edge
Teleco Roaming
• Reduce SSL load on brokers 4G & 5G GTP
Ingress Protection Proxy Partners
Core Sidecar
Proxy
SERVICE MESH
AMF
5G CORE POD
But there are a few differences, as some specific functionality is required to make these
solutions work well in a telecom environment:
As applications in the control and signaling plane can be exposed to the outside world,
security measures will be required. A GTP tunnel, for example, is used to connect the core
network of one operator to the core network of another operator to enable end users to
roam from one network to another. A malicious attack on the roaming partner’s network could
compromise the host network.
In the telco service mesh, you could have a core access and mobility management function
(AMF) and a session management function (SMF) talking to each other, for example. These
interactions can be secured using F5’s Carrier-Grade Aspen Mesh solution, which is based on
Istio open source technology (see Figure 9).
Aspen Istio
Mesh
TAP Notification
(HTTP Stream)
Packet Broker
Translator API
NETWORK SHARING MARKET. third parties to assume more control over some network expressions. One notable example is
slicing: the MNO separates out a portion of its network and dedicates it to a specific use case.
The customer can access this slice via an API. While this capability enables new business,
these APIs are also opening up new security risks, just as roaming opens up new risks related
to roaming partners. Therefore, securing these APIs is extremely important.
To effectively protect applications and the users accessing them, identity and access
management and an anti-bot enabled web application firewall are required as a minimum.
For microservices applications, API security is needed at the back end to eliminate risk. See
Figure 10 for overview of the necessary security components.
As telco architectures change with the advent of 5G, it is important that these application
security measures are multi-cloud and multi-platform capable. Applications residing in a
private data center might move to a public cloud. Later, the MNO might bring them back to
their own data center or move them to another cloud.
Therefore, relying on the specific security capabilities provided by these different cloud
platforms is not advisable. They may be easy to deploy, but the level of protection will be
inconsistent and migrating applications to a new environment could be time consuming
and problematic.
Installing cloud- and platform-agnostic security measures allows a MNO to move the solution
from one environment to the other without sacrificing security functionalities, minimizing
disruption to operation, visibility, and compliance.
CLIENT CLIENT PROTECTION DDOS PROTECTION APP INFRASTRUCTURE PROTECTION WEB APPLICATION AND API PROTECTION APPS
Anti-fraud DDoS Intelligent Secure Bot Credential Identity & API WAF
Prevention DNS TLS/SSL Defense and Fraud Access Protection
(Visibility) Protection Management
Conclusion
Although the standards body 3GPP has effectively leveraged IT technology and security
mechanisms in the 5G standards, its focus has been on the signaling and control and data
planes. In these planes, MNOs can further improve security in a cost-effective way using
specialist tools developed at F5.
F5 IS A WELL- Application infrastructure falls outside the traditional remit of 3GPP. Yet as applications coexist
ESTABLISHED PROVIDER with network functions on the same telco architecture, application security is a key part of 5G
OF INFRASTRUCTURE, security as a whole. As they deploy the telco cloud, operators need to draw on best security
USER, AND APPLICATION practices from the IT sector.
SECURITY BOTH FOR ON-
PREMISES AND CLOUD At the same time, MNOs need to be careful that their approach to application security does
DEPLOYMENTS IN THE not mean they are locked into a specific cloud provider. The public cloud market in the
ENTERPRISE MARKET. telecoms sector is very fluid; MNOs are forging new alliances to deploy the edge computing
infrastructure required for 5G.
F5 is a well-established provider of infrastructure, user, and application security both for on-
premises and cloud deployments in the enterprise market. F5 has also been a core provider
of infrastructure solutions to MNOs for many years. With the advent of 5G, F5 can help MNOs
adapt to the new paradigm and deliver 5G-based services reliably and securely.
2
The GTP protocol is used to transmit user and control traffic on 2G, 3G, and 4G networks
©2020 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc.
GUIDE-SP-553726646