TM Forum Community

  • 1.  5G System security

    TM Forum Member
    Posted Feb 19, 2018 03:13
    Hello Team,

    We are architect  the 5G System security , have drafted the white paper but some how ETSI SA3 work seems focus only on narrow line of Telco like TR.33401 /TR33.501 .

    Our main idea is how to deliver Security as a service not something like a guideline as is used today . In future in Telco there must be ways or systems to check Security assessment of system not only the application but the Pipe as a one system and in addition the Ops team must be able to test and exploit it on the fly .

    I want to explore if any organization /Team working on it . Till now we find even in the SDO's less material that can help us and traditionally big Telco vendors are also too naive in building the framework .

    Cyber security is key dimension we want include will like to explore and if in TMforum some community working on it . Do let me know

    Regards

    ------------------------------
    Saad Ullah Sheikh
    Chief Architect - Consultant NFV , SDN and Telco Cloud
    Saudi Telecom Company
    ------------------------------


  • 2.  RE: 5G System security

    TM Forum Member
    Posted Feb 20, 2018 12:35
    Hi Saad Ullah Sheikh

    Thanks for sharing this information. 

    A few thoughts come to mind:
    • Regarding different security requirements from different industries, could this be addressed by different network slices (each with its own security requirements)? This would seem to be one advantage of having network slices. On the down-side, it would be absolutely critical that the network slices are isolated so that a security breach in one network slice could not affect another. 
    • In terms of NFV / SDN and 5G, how to you see the relationship? For example, would 5G itself be virtualized (a collection of VNFs and Network Services) with SDN as the transport among NFVIs? Another view would be that 5G serves as a transport underlying NFV. There could also be a recursive relationship, i.e., 5G features are implemented via NFV and 5G also serves as a transport for NFV. 
    • What about offensive security such as honey pots and other aggressive techniques that are designed to catch malefactors? It seems that the focus is always on defensive approaches and after the fact fixes. 

    Steve

    ------------------------------
    Stephen Fratini
    The Art of Managing Things
    ------------------------------