Star Path
Animated Circle

How we secured a 5G CORE network

main-bg-image

Key benefits of our service

Breaking down the 5G Core

In depth analysis of all the services and infrastructure provided by the 5G core network

Achieving compliance

The client ensured compliance with regulatory requirements, minimizing the risk of penalties and enhancing their reputation in the market.

Enhancing network security

The audit provided the client with valuable insights into the efectiveness of their IDS/IPS implementation, enabling them to strengthen their network security measures.

Proactive risk mitigation

Risk mitigation by identifying and addressing vulnerabilities early in the implementation process

The Client

Spanish Telecom Operator

Our client is one of the leading telecom operators in Spain, renowned for its innovative approach and cutting-edge implementation of a standalone 5G network.

With a commitment to delivering high-speed connectivity and advanced services, the client sought to enhance the security of its new 5G core network, where complexity and heterogeneity challenged the process of assessing and confguring such infrastructure.

main-imageback-image

Scope

Implementing a 5G core network is inherently complex, involving various architectures and technologies.

In this project, the client's 5G network infrastructure encompassed a combination of Containers as a Service (CaaS), Network Functions Virtualization (NFV), and CaaS over NFV. This diverse infrastructure, with multiple vendors, created a challenging environment for assessing and verifying the security confgurations of the network.

side-bg-imageside-bg-image

Key Challenges

The intricacies of microservices and container orchestration added another layer of complexity, necessitating a comprehensive security strategy that could adapt to the dynamic nature of the 5G ecosystem. Additionally, the integration of both legacy and modern protocols such as SCTP and HTTP/2 required thorough evaluation to ensure robust security measures were in place.

Given the complexity of 5G networks, where various teams were responsible for diferent aspects of the infrastructure, a coordinated approach was necessary to ensure that all stakeholders were aligned and that their specifc concerns were thoroughly addressed. By fostering an environment of open dialogue and collaboration, Ethon Shield was able to create a comprehensive security strategy that refected the diverse needs of the organization and enhanced the overall efectiveness of the project.

side-bg-image

Services Provided

Ethon Shields' team developed a unique methodology tailored to assess the security confgurations across all facets of the 5G infrastructure.

Recognizing the critical role of Kubernetes and containers in this technology landscape, we focused on the NFV/CaaS paradigm to ensure that security was embedded at every virtualization level.

Furthermore, our approach also included a thorough assessment of both new and legacy protocols, such as the emerging HTTP/2, to verify the confdentiality and integrity of messages transmitted across the network.

We meticulously evaluated essential parameters specifc to the telecommunications industry, including encryption algorithms and visibility confgurations, to ensure compliance with industry standards and best practices.

side-bg-image

Facing similar challenges?