{"id":3214,"date":"2021-08-30T04:00:26","date_gmt":"2021-08-30T04:00:26","guid":{"rendered":"https:\/\/www.tantraanalyst.com\/ta\/?p=3214"},"modified":"2023-01-02T10:32:16","modified_gmt":"2023-01-02T10:32:16","slug":"how-to-secure-cloud-native-5g-virtual-and-open-ran-infrastructure","status":"publish","type":"post","link":"https:\/\/www.tantraanalyst.com\/ta\/how-to-secure-cloud-native-5g-virtual-and-open-ran-infrastructure\/","title":{"rendered":"How to secure cloud-native 5G virtual and Open RAN infrastructure"},"content":{"rendered":"<figure id=\"attachment_3366\" aria-describedby=\"caption-attachment-3366\" style=\"width: 702px\" class=\"wp-caption alignright\"><a style=\"color: #808080;\" href=\"https:\/\/bit.ly\/2Ybt8w4\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3366 size-full\" src=\"https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/08\/Secure_Cloud-native_5G_Virtual_OpenRAN_Infrastructure_02.jpg\" alt=\"5G\" width=\"702\" height=\"336\" srcset=\"https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/08\/Secure_Cloud-native_5G_Virtual_OpenRAN_Infrastructure_02.jpg 702w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/08\/Secure_Cloud-native_5G_Virtual_OpenRAN_Infrastructure_02-300x144.jpg 300w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/08\/Secure_Cloud-native_5G_Virtual_OpenRAN_Infrastructure_02-700x336.jpg 700w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/08\/Secure_Cloud-native_5G_Virtual_OpenRAN_Infrastructure_02-20x10.jpg 20w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/a><figcaption id=\"caption-attachment-3366\" class=\"wp-caption-text\">RCR Wireless News, August 30, 2021<\/figcaption><\/figure>\n<h6><span style=\"color: #808080;\">Ever since the cloud-native virtual RAN (vRAN) and Open RAN architectures have started gaining popularity, one key question both proponents and adversaries have been asking is \u201cWhat about security?\u201d Considering the massive number of services and critical applications that 5G will connect, security risks couldn\u2019t be higher.&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\">Some contend that any disaggregated, virtualized, multi-vendor system will naturally have security vulnerabilities. Others challenge that assertion and suggest that an expansive open ecosystem with many large players will make the system inherently more robust.&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\">No matter which view you hold, the best approach is to have a dedicated hardware-based, AI-powered onboard security. Let\u2019s explore why and what it takes to bring such security.<\/span><\/h6>\n<h6 id=\"h-basics-of-cloud-native-virtual-and-open-ran-architecture\"><span style=\"color: #000000;\"><strong>Basics of cloud-native virtual and Open RAN architecture<\/strong><\/span><\/h6>\n<figure class=\"aligncenter size-full\"><span style=\"color: #808080;\"><img decoding=\"async\" src=\"https:\/\/b432460.smushcdn.com\/432460\/wp-content\/uploads\/2021\/08\/unnamed.png?size=512x261&amp;lossy=1&amp;strip=1&amp;webp=1\"><\/span><\/figure>\n<h6><span style=\"color: #808080;\">The security mechanism in traditional RAN networks is relatively straightforward because all the software and hardware in the baseband is proprietary and supplied by a single vendor. But it is not so in new architectures.&nbsp;&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\">In vRAN, the software is disaggregated and runs on off-the-shelf hardware, and in Open RAN that software comes from many different vendors. In a cloud-native approach, the software is containerized, that is, the monolithic RAN baseband software is divided into many containerized microservices: PHY, RLC, MAC, transport, and other functions. These microservices are orchestrated in a Kubernetes cluster. The 5G infrastructure providers have realized that the cloud-native approach used in data centers by cloud service providers (CSPs) is the best architecture to leverage for scalability and efficiency. So, using that same infrastructure and the same Kubernetes architecture saves them from reinventing the wheel. That being said, they must deal with the same issues the CSPs do regarding security, disaggregation, and latency with a focus on those aspects as they pertain to 5G use cases.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">Microservices must securely communicate with each other to function. This communication is usually managed by a cloud-native entity called \u201cservice mesh\u201d such as&nbsp;<em>Istio<\/em>. There are two parts in a service mesh: (1) the control plane that sets up the communication channels between the microservices, and (2) the data plane, that manages the transfer of actual data. For our discussion here, we focus on the control plane, as it is much more crucial from a security point of view.&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\">Microservices are heterogeneous and highly distributed. They can run on multiple different servers that are geographically and logically separated, and they might be supplied by different vendors, each providing different baseband functions. Additionally, if vRAN is hosted on the public or shared cloud, microservices from different cellular operators or even non-operators could be running on the same cloud infrastructure. In such a case, one could imagine the complexity of the implementation and the large attack security surface involved.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">Another important dimension of this cloud-native architecture is latency. Microservices are transient entities that are created and broken down in terms of milliseconds. Further, the microservices activity in telco clouds is magnitudes higher than other clouds, mainly because of user mobility. For that reason, securing the microservices while managing the latency is even more crucial, especially for 5G URLLC (Ultra Reliable Low Latency Communications) applications and services. So, the timing involved in the creation, as well as the communication between microservices directly impacts the system performance.&nbsp;<\/span><\/h6>\n<h6><strong><span style=\"color: #000000;\">Securing cloud-native virtual and Open RAN<\/span><\/strong><\/h6>\n<h6><span style=\"color: #808080;\">Service mesh enforces policies upon the microservices the Kubernetes cluster manages, including where they are running and how they are connected. Service mesh uses certificates to authenticate the microservices and crypto keys to encrypt the communication between them.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">The traditional approach is to run the service mesh in the software, on the underlying layers, say, in the operating system. In that case, the certificates and keys are generated, stored, and managed locally. Letting the security reside in software makes the whole RAN network extremely insecure, and highly susceptible to attacks.&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\">The best and most comprehensive option to secure cloud-native RAN networks is to relegate all the key security functions, including the service mesh, to a dedicated purpose-built ruggedized processor. A good example of such a processor is the&nbsp;<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/axiado.com\/#products\" target=\"_blank\" rel=\"noopener\">Trusted Control\/Compute Unit<\/a><\/span>&nbsp;(TCU\u2122) offered by a leading security solutions company&nbsp;<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/bit.ly\/3gHkb40\" target=\"_blank\" rel=\"noopener\">Axiado<\/a><\/span>.&nbsp;<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/bit.ly\/2WzHIwE\" target=\"_blank\" rel=\"noopener\">Gopi Sirineni<\/a><\/span>, CEO of Axiado, explains \u201cTCU is a state-of-the-art secure processor with hardware root-of-trust (based on its immutable hardware ID), secure boot, secure storage, and Trusted Execution Environment (TEE). He adds, \u201cSuch a processor will be tamper-resistant, it can store and manage keys certificates safely, and provide a holistic security cover for the whole system.\u201d&nbsp;<\/span><\/h6>\n<h6><span style=\"color: #808080;\"><strong><em>Side note<\/em><\/strong><em>: You can read more about this approach in this article that Gopi and I have cowritten-&nbsp;<\/em><span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/www.gsaglobal.org\/forums\/ai-powered-hardware-based-preemptive-security-is-a-game-changer\/\" target=\"_blank\" rel=\"noopener\"><em>AI-powered, hardware-based preemptive security is a game-changer<\/em><\/a><em>.<\/em><\/span><\/span><\/h6>\n<h6><span style=\"color: #808080;\">Some cloud-native systems utilize a third-party cloud-based service mesh. But that adds latency to the system. To meet the stringent latency requirements of 5G RAN, especially for URLLC applications, a secure processor must be onboard and within proximity to where the microservices are being run.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">Some might suggest that most of the vRAN microservices, such as PHY, RLC, and MAC, are always running, and may not require frequent authentication. Hence service mesh can be run remotely on the cloud. However, the biggest promise of cloud-native architecture is enabling extreme RAN scalability\u2014instantly upscale and downscale capacity where and when needed. Running microservices round-the-clock significantly degrades this benefit.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">As is true in the non-telco ecosystem, security in the 5G ecosystem is often reactive with pre-defined rules based on known threat behaviors. A robust service mesh system must not only facilitate secure communications but also observe and identify suspicious behavior. Hence the dedicated security processor should also have AI capabilities so that any potential security threat can be proactively identified and stopped before any damage. AI capability also helps in continuously learning and adapting to the constantly changing security risk landscape. This critical supplement to more traditional security measures will be recognized as a necessity moving forward as the growth of the vRAN footprint attracts an equally growing opportunity for bad actors.<\/span><\/h6>\n<h6><strong><span style=\"color: #000000;\">In closing&nbsp;<\/span><\/strong><\/h6>\n<h6><span style=\"color: #808080;\">While the cellular industry is moving toward cloud-native, vRAN, and Open RAN architectures, security is one of the fundamental challenges. With software and hardware disaggregated, being supplied by many different vendors, it is extremely risky to rely on the security of each of the components or only on a software-based approach.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">The best option is to utilize a dedicated hardware-based, on-board, AI-powered approach that can provide holistic, future-proof security.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">If you would like get more articles like this, and an up-to-date analysis of the latest mobile and tech industry news, sign-up for our monthly newsletter at&nbsp;<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"http:\/\/bit.ly\/TA-Newsletter\" target=\"_blank\" rel=\"noopener\">TantraAnalyst.com\/Newsletter<\/a><\/span>, and listen to our&nbsp;<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/www.tantraanalyst.com\/ta\/podcast\/\" target=\"_blank\" rel=\"noopener\">Tantra\u2019s Mantra podcast<\/a><\/span>.<\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Ever since the cloud-native virtual RAN (vRAN) and Open RAN architectures have started gaining popularity, one key question both proponents and adversaries have been asking is \u201cWhat about security?\u201d Considering the massive number of services and critical applications that 5G will connect, security risks couldn\u2019t be higher.&nbsp; Some contend that any disaggregated, virtualized, multi-vendor system [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"mc4wp_mailchimp_campaign":[],"footnotes":""},"categories":[6,97],"tags":[],"class_list":["post-3214","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-5g","category-openran-vran","post_format-post-format-image"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts\/3214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/comments?post=3214"}],"version-history":[{"count":0,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts\/3214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/media\/3366"}],"wp:attachment":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/media?parent=3214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/categories?post=3214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/tags?post=3214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}