Home 5G, EDGE, MIOT CYBERSECURITY

5G, EDGE, MIOT CYBERSECURITY

OIC-CERT
OIC-CERT is the the Computer Emergency Response Team of The Organisation of Islamic Cooperation. I've been following their excellent efforts around 5G security for a while and was glad to see how seriously they are taking it. For example, about a year ago OIC-CERT published "Achieving 5G Security through Open Standards". The organization also recently held a 5G Security Framework Workshop And now it has started rolling-out of the OIC-CERT 5G Security Framework Adoption at GISEC, the Middle East and Africa’s most influential and connected cybersecurity event. The framework (in progress) is available here: https://www.oic-cert.org/members/index.php/cyber-security-landscape/feeds/10-cyber-threats/32-5g-security-wg I will continue monitoring their efforts with...
ENISA NFV Security in 5G
The EU Agency for Cybersecurity (ENISA) continues its excellent effort on 5G security by issuing a report with suggested good practices for the secure deployment of Network Function Virtualisation (NFV) in 5G networks. The report identifies some 60 security challenges for NFV, which it groups in seven categories: Virtualisation or containerisation; Orchestration and management; Administration and access control; New and legacy technologies; Adoption of open source or COTS; Supply chain; Lawful interception (LI). It analyses the relevant security controls and recommends 55 best practices to address these challenges, across technical, policy and organisational facets. Some of the main issues identified are ensuring...
Vodafone Portugal
The attack, discovered on Monday night, impacted the 4g/5g network, TV, voice services, and SMS services provided to more than seven million people. While the company was able to restore 3G services, others remained impacted. It even affected the ATM network of some large banks connected to the Vodafone 4g network. Vodafone called the incident "a deliberate and malicious attack intended to cause damage." Mário Vaz, CEO of Vodafone Portugal, said in a statement that "our absolute priority is the restoration of our services. Our technical teams have been working non-stop from the moment this attack was found to reset the...
FCC
The US Federal Communications Commission (FCC) Chairwoman is asking $5.6B from Congress seeks to reimburse carriers for removing and replacing insecure 5G networking equipment - those made by banned Chinese vendors Huawei and ZTE. Congress had initially set aside $1.9B for the replacement program under The Supply Chain Reimbursement Program created by the Secure and Trusted Communications Networks Act. However, after FCC received 181 applications from carriers, the total cost has been estimated to $5.6B revealing a shortfall of $3.7B. For more information see the FCC press release : CHAIRWOMAN ROSENWORCEL NOTIFIES CONGRESS OF DEMAND TO PARTICIPATE IN THE SECURE AND...
5G EU Report
The EU Court of Auditors issued a special report "5G roll-out in the EU: delays in deployment of networks with security issues remaining unresolved" in which EU auditors are raising an alarm. According to the report, 5G services are seen as essential for a wide range of innovative applications which have the potential to transform many sectors of our economies and improve citizens’ daily lives. 5G is therefore of strategic importance for the entire single market. However, the majority EU member states are not on track with the deployment of their 5G networks and lack a common approach to...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This final release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part IV: Ensure integrity of Cloud Infrastructure with...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This third release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part III: Data Protection with the focus...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This second release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part II: Securely Isolate Network Resources with...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This first release in the series is titled Security Guidance for Cloud Infrastructures Part I: Prevent and Detect Lateral Movement and is...
Syniverse is a critical part of the global telecom infrastructure. It connects 300+ cell phone networks globally and acts as an intermediary for billing records and text messages sent between cell phone networks. In the Securities and Exchange Commission filing Syniverse published last week the company disclosed that in May 2021 it "...became aware of unauthorized access to its operational and information technology systems by an unknown individual or organization." It also revealed that the security breach first started in May 2016 giving the attacker five years of access. Syniverse claims to process more than 740 billion text messages per year...
NSA CISA
Cybersecurity Infrastructure Agency (CISA), National Security Agency (NSA), and the Office of the Director of National Intelligence (ODNI) published a new 5G security related paper - “Potential Threat Vectors to 5G Infrastructure”. The report outlines three major potential threat vectors to the 5G infrastructure: policy and standards, supply chain, and 5G systems architecture. Each are described together with a number of sub-vectors. The report also stresses that not implementing optional security controls can be damaging because it could make networks more vulnerable to cyberattacks. The paper is available here: https://www.cisa.gov/sites/default/files/publications/potential-threat-vectors-5G-infrastructure_508_v2_0%20%281%29.pdf
Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges. The concept encompasses Industry 4.0, Fourth Industrial Revolution, Smart-Everything World and other buzzwords of the moment. In the society of the future the more the cyber and physical worlds are combined, the greater the benefits...
Security in 5G Specifications - Controls in 3GPP
The European Union Agency for Cybersecurity (ENISA) released its Security in 5G Specifications Report about key security controls in the Third Generation Partnership Project (3GPP), the main body developing technical specifications for fifth generation of mobile telecommunications (5G) networks. As vendors, system integrators and operators build, deploy and manage 5G networks, the ENISA publication underlines the need for cybersecurity and for the national regulatory authorities in charge of cybersecurity policy development and implementation to have a good understanding of these controls. This new ENISA report is directly driven by the objectives set in the EU toolbox for 5G security - mainly...
NIST 5G Cybersecurity Draft
National Cybersecurity Center of Excellence (NCCoE) of the U.S. National Institute of Standards and Technology (NIST) just published a preliminary draft of Special Publication SP 1800-33A, "5G Cybersecurity," - Volume A: Executive Summary. This practice guide can benefit organizations operating or using 5G networks, as well as network operators and equipment vendors, and may be of particular interest to the telecommunications and public safety communities. The public comment period is open through March 4, 2021 The guide is available here: https://www.nist.gov/news-events/news/2021/02/5g-cybersecurity-preliminary-draft-nist-cybersecurity-practice-guide-sp EDIT (26 April 2022): The SP 1800-33A draft guide mentioned here was moved to Legacy Files and is now available here :...
National Strategy to Secure 5G Implementation Plan
The National Telecommunications and Information Administration (NTIA) released National Strategy to Secure 5G Implementation Plan, a government-wide plan to lead the world in the development and deployment of secure and resilient fifth generation (5G) wireless communications infrastructure. The implementation plan lists specific actions the federal government will take as well as lead agencies responsible for implementing each effort. The implementation plan also lists a number of potential new research and development (R&D) efforts and priorities that agencies may undertake relating to 5G. Despite the plan being released in the final daysof the Trump Administration, it is expected that 5G...