RELATED CONTENT
5g Survey: Telco Industry Prioritizing 5G Network Security
Learn more about telcos’ 5G security challenges and priorities.
In this synopsis of Heavy Reading’s 5G survey of security priorities, we review which security strategies are being prioritized prior to commercial launch and what additional steps telcos plan to take in the 12 months following commercial launch of their 5G networks.
Heavy Reading 5G survey reveals operators’ priorities as they move to mitigate new threats
Telcos will implement a wide array of measures in 2021 to secure the next wave of 5G connectivity according to Heavy Reading’s global survey of service provider employees.1 As operators begin to roll out standalone 5G networks, they are moving swiftly to secure core network configuration services like slice management. Services like these enable 5G operators to provide highly customized connectivity.
By the end of 2021, 67% of respondents expect to have implemented security measures for their core network configuration services. This is only slightly less than the 75% who plan to have secured the radio access network (RAN). Most telcos are also taking steps to secure other key aspects of their 5G networks. Approximately two-thirds of respondents plan to implement security measures for roaming network signaling, network slicing, APIs, the Internet of Things (IoT), and edge computing (MEC) by the end of 2021. Many respondents also hope to make inroads into container security to support microservices (61%) and enterprise mobility (58%).
67% of respondents expect to have implemented security measures for their core network functions by the end of 2021.
“It is heartening to see the speed and urgency with which service providers are moving to secure the many different facets of their 5G networks,” said Bart Salaets, Senior Director of Solutions Engineering at F5. “These measures will be critical to the credibility and success of 5G, particularly in the enterprise market, where businesses across a wide variety of industry verticals are looking for 5G connectivity and services that are ubiquitous, flexible and highly secure.”
Created by Heavy Reading and F5 Networks, the survey was distributed by email to Heavy Reading's global list of service provider employees in the fourth quarter of 2020. It attracted 104 global respondents in technical functions for converged and mobile operators.
What needs to be done before commercial launch?
One of the key attributes of 5G networks will be their ability to expose various capabilities to third parties using APIs. Although APIs open up new avenues of attack for malicious actors, there are a number of measures telcos can take to protect their networks. One-third of respondents said they will implement network DDoS protection before commercial launch, 28% plan to implement identity and access management systems, and 22% will stand up next-generation firewalls (NGFWs) before going live.
Within a year of commercial launch, the top three network security priorities are web application firewalls (44% of respondents), NGFWs (38%), and application delivery controllers (35%). A significant group (31%) also plan to deploy a dedicated API gateway within this 12 month window.
The research also indicates that it will be important for telcos to fully secure the control plane in their new 5G core networks. In this respect, the top priorities are to implement a network repository function (NRF), which maintains a repository of available network service elements, and a secure edge protection proxy (SEPP), which secures and filters internetwork messaging. Among the respondents, 27% plan to implement a NRF and a SEPP before commercial launch. Many also plan to implement a network exposure function (NEF) to secure the interactions between network functions and application functions—22% of respondents said they would implement a NEF before commercial launch.
Mixing and matching security platforms
Pragmatically, many telcos plan to employ multiple platforms to implement their 5G security measures. One of the most popular approaches among the survey respondents is to use a mixture of vendor appliances, virtual network functions (VNFs), and cloud native network functions (CNFs). Some 28% selected this option as their preferred approach. The same number of respondents said they prefer to employ VNFs, while CNFs (the most futuristic option) are the preferred approach for 19%. Some 12% chose vendor appliances and 8% SmartNIC-based VNFs/CNFs.
Notably, all five approaches attracted strong support as “viable secondary options” reflecting a sense of realism among operators; they need to quickly employ the most cost-effective measures to protect each element of their network, rather than taking a one-size-fits-all approach.
43% of respondents now view secure access service edge (SASE) as an integral part of their 5G security strategy
The survey also found that the concept of a secure access service edge (SASE) is gaining traction among 5G operators—43% of respondents now view SASE as an integral part of their 5G security strategy. The remaining respondents are divided into two groups: those who are still formulating a SASE strategy (25% of respondents) and those who view SASE as independent of their 5G security strategy (24%). This enthusiasm reflects the position of SASE as the first cloud-native software implementation to combine a number of existing capabilities, such as WAN support, with security capabilities, such as Firewall-as-a-Service and content inspection.
Bringing it all together
“This research highlights the judicious and multifaceted approach telcos are taking to the often complex task of securing cloud-native 5G networks that rely on microservices, API exposure and slice-based services,” Salaets concluded. “Threat mitigation in the rich, diverse and dynamic 5G service arena will be a fine art. But telcos can now call upon a growing range of powerful security tools to secure their 5G networks and services, including WAFs, anti-DDOS, NG-FWs and API gateways to SASE, as well as SEPP and NEF functions. These can be deployed in either, VNF or CNF form factors, with some security functions accelerated with SmartNIC technology.”
1Created by Heavy Reading and F5, the survey was distributed by email to Light Reading's global list of service provider employees in the fourth quarter of 2020. It attracted 104 global respondents in technical functions for converged and mobile operators.