The Client
Our client is one of the leading telecom operators in Spain, renowned for its innovative approach and cutting-edge implementation of a standalone 5G network.
With a commitment to delivering high-speed connectivity and advanced services, the client sought to enhance the security of its new 5G core network, where complexity and heterogeneity challenged the process of assessing and confguring such infrastructure.
Implementing a 5G core network is inherently complex, involving various architectures and technologies.
In this project, the client's 5G network infrastructure encompassed a combination of Containers as a Service (CaaS), Network Functions Virtualization (NFV), and CaaS over NFV. This diverse infrastructure, with multiple vendors, created a challenging environment for assessing and verifying the security confgurations of the network.
The intricacies of microservices and container orchestration added another layer of complexity, necessitating a comprehensive security strategy that could adapt to the dynamic nature of the 5G ecosystem. Additionally, the integration of both legacy and modern protocols such as SCTP and HTTP/2 required thorough evaluation to ensure robust security measures were in place.
Given the complexity of 5G networks, where various teams were responsible for diferent aspects of the infrastructure, a coordinated approach was necessary to ensure that all stakeholders were aligned and that their specifc concerns were thoroughly addressed. By fostering an environment of open dialogue and collaboration, Ethon Shield was able to create a comprehensive security strategy that refected the diverse needs of the organization and enhanced the overall efectiveness of the project.
Ethon Shields' team developed a unique methodology tailored to assess the security confgurations across all facets of the 5G infrastructure.
Recognizing the critical role of Kubernetes and containers in this technology landscape, we focused on the NFV/CaaS paradigm to ensure that security was embedded at every virtualization level.
Furthermore, our approach also included a thorough assessment of both new and legacy protocols, such as the emerging HTTP/2, to verify the confdentiality and integrity of messages transmitted across the network.
We meticulously evaluated essential parameters specifc to the telecommunications industry, including encryption algorithms and visibility confgurations, to ensure compliance with industry standards and best practices.