Containers

 

 
Home ] Up ] Competences ] Competence Center ] Partners ] About ] Views ] Site Map ] Search ]
 
M-5G ] Synchronization ] [ Containers ] 5g Core ] Airspan ] Ericsson ] 5G-Health ]


 

Up

How to secure cloud-native 5G virtual and Open RAN infrastructure

Basics of cloud-native virtual and Open RAN architecture

Basics of cloud-native virtual and Open RAN architecture

Ever since the cloud-native virtual RAN (vRAN) and Open RAN architectures have started gaining popularity, one key question both proponents and adversaries have been asking is “What about security?” Considering the massive number of services and critical applications that 5G will connect, security risks couldn’t be higher.

Some contend that any disaggregated, virtualized, multi-vendor system will naturally have security vulnerabilities. Others challenge that assertion and suggest that an expansive open ecosystem with many large players will make the system inherently more robust.

No matter which view you hold, the best approach is to have a dedicated hardware-based, AI-powered onboard security. Let’s explore why and what it takes to bring such security.

The security mechanism in traditional RAN networks is relatively straightforward because all the software and hardware in the baseband is proprietary and supplied by a single vendor. But it is not so in new architectures.

In vRAN, the software is disaggregated and runs on off-the-shelf hardware, and in Open RAN that software comes from many different vendors. In a cloud-native approach, the software is containerized, that is, the monolithic RAN baseband software is divided into many containerized microservices: PHY, RLC, MAC, transport, and other functions. These microservices are orchestrated in a Kubernetes cluster. The 5G infrastructure providers have realized that the cloud-native approach used in data centers by cloud service providers (CSPs) is the best architecture to leverage for scalability and efficiency. So, using that same infrastructure and the same Kubernetes architecture saves them from reinventing the wheel. That being said, they must deal with the same issues the CSPs do regarding security, disaggregation, and latency with a focus on those aspects as they pertain to 5G use cases.

Microservices must securely communicate with each other to function. This communication is usually managed by a cloud-native entity called “service mesh” such as Istio. There are two parts in a service mesh: (1) the control plane that sets up the communication channels between the microservices, and (2) the data plane, that manages the transfer of actual data. For our discussion here, we focus on the control plane, as it is much more crucial from a security point of view.

Microservices are heterogeneous and highly distributed. They can run on multiple different servers that are geographically and logically separated, and they might be supplied by different vendors, each providing different baseband functions. Additionally, if vRAN is hosted on the public or shared cloud, microservices from different cellular operators or even non-operators could be running on the same cloud infrastructure. In such a case, one could imagine the complexity of the implementation and the large attack security surface involved.

Another important dimension of this cloud-native architecture is latency. Microservices are transient entities that are created and broken down in terms of milliseconds. Further, the microservices activity in telco clouds is magnitudes higher than other clouds, mainly because of user mobility. For that reason, securing the microservices while managing the latency is even more crucial, especially for 5G URLLC (Ultra Reliable Low Latency Communications) applications and services. So, the timing involved in the creation, as well as the communication between microservices directly impacts the system performance.



Securing cloud-native virtual and Open RAN

Service mesh enforces policies upon the microservices the Kubernetes cluster manages, including where they are running and how they are connected. Service mesh uses certificates to authenticate the microservices and crypto keys to encrypt the communication between them.

The traditional approach is to run the service mesh in the software, on the underlying layers, say, in the operating system. In that case, the certificates and keys are generated, stored, and managed locally. Letting the security reside in software makes the whole RAN network extremely insecure, and highly susceptible to attacks.

The best and most comprehensive option to secure cloud-native RAN networks is to relegate all the key security functions, including the service mesh, to a dedicated purpose-built ruggedized processor. A good example of such a processor is the Trusted Control/Compute Unit (TCU™) offered by a leading security solutions company Axiado. Gopi Sirineni, CEO of Axiado, explains “TCU is a state-of-the-art secure processor with hardware root-of-trust (based on its immutable hardware ID), secure boot, secure storage, and Trusted Execution Environment (TEE). He adds, “Such a processor will be tamper-resistant, it can store and manage keys certificates safely, and provide a holistic security cover for the whole system.”

Some cloud-native systems utilize a third-party cloud-based service mesh. But that adds latency to the system. To meet the stringent latency requirements of 5G RAN, especially for URLLC applications, a secure processor must be onboard and within proximity to where the microservices are being run.

Some might suggest that most of the vRAN microservices, such as PHY, RLC, and MAC, are always running, and may not require frequent authentication. Hence service mesh can be run remotely on the cloud. However, the biggest promise of cloud-native architecture is enabling extreme RAN scalability—instantly upscale and downscale capacity where and when needed. Running microservices round-the-clock significantly degrades this benefit.

As is true in the non-telco ecosystem, security in the 5G ecosystem is often reactive with pre-defined rules based on known threat behaviors. A robust service mesh system must not only facilitate secure communications but also observe and identify suspicious behavior. Hence the dedicated security processor should also have AI capabilities so that any potential security threat can be proactively identified and stopped before any damage. AI capability also helps in continuously learning and adapting to the constantly changing security risk landscape. This critical supplement to more traditional security measures will be recognized as a necessity moving forward as the growth of the vRAN footprint attracts an equally growing opportunity for bad actors.



In closing

While the cellular industry is moving toward cloud-native, vRAN, and Open RAN architectures, security is one of the fundamental challenges. With software and hardware disaggregated, being supplied by many different vendors, it is extremely risky to rely on the security of each of the components or only on a software-based approach.

The best option is to utilize a dedicated hardware-based, on-board, AI-powered approach that can provide holistic, future-proof security.

Prakash Sangam - Principal Analyst at Tantra.
   

 

 
 

About TACS

TACS is one of the leading consultancies in the field of information, communication and energy technologies (ICET).

The heart of our consulting spectrum comprises strategic, organizational, and technology-intensive tasks that arise from the use of new information, communication and energy technologies. 
 
The major emphasis in our work is found in innovative consulting and implementation solutions which result from the use of modern information, communication and energy technologies.

   
   
   

TACS 

  • Delivers the insight and vision on technology for strategic decisions
  • Drives innovations forward as part of our service offerings to customers worldwide 
  • Conceives integral solutions on the basis of our integrated business and technological competence in the ICET sector 
  • Assesses technologies and standards and develops architectures for fixed or mobile, wired or wireless communications systems and networks
  • Provides the energy and experience of world-wide leading innovators and experts in their fields for local, national or large-scale international projects.

   
 
   
 
 

 


 

   
 

TACS

 

 
 

Home ] Up ] Competences ] Competence Center ] Partners ] About ] Views ] Site Map ] Search ]

M-5G ] Synchronization ] [ Containers ] 5g Core ] Airspan ] Ericsson ] 5G-Health ]

 

 

Challange TACS - Solution TACS

 

 

The Best Networks Start with the Best Consultants - TACS

 

 

Copyright © 2023 TACS
Last modified: September 20, 2023