Managing Risk in Artificial Intelligence Systems-A Practitioners Approach 2025
Overview of AI security frameworks and recommendations for practitioners
13 min read
Palindrome Technologies
:
May 27, 2025 7:17:30 AM
The Evolving Threat Landscape
Welcome, to the ever-evolving world of 5G security! The GSMA has once again graced us with an updated roadmap, the "5G Security Guide," Version 3.0, dated July 16, 2024. As someone who spends their days in the trenches, translating these comprehensive (and often dense) documents into tangible security measures, the goal of this article is to cut through the complexity and highlight what this latest iteration means for us on the ground.
5G isn't just an incremental upgrade; it's a foundational shift promising to power Enhanced Mobile Broadband (eMBB), massive Machine Type Communications (mMTC), and Ultra-Reliable Low-Latency Communications (URLLC). This expansion opens the door for a diverse range of industries to build upon and operate 5G services. However, this bright future comes with a significantly expanded and more intricate attack surface.
The way we build, secure, and manage networks is undergoing a revolution. We're grappling with virtualization, containerization, Network Function Virtualization (NFV), the pervasive use of Open-Source Software (OSS), the rise of Open RAN (O-RAN) interfaces, dynamic network slicing, multi-access edge computing (MEC), and the agile methodologies of DevOps. While these technologies offer unprecedented flexibility and agility, they also introduce a host of new attack vectors that bad actors are keen to exploit.
The good news is that considerable thought has gone into the security enhancements for 5G, with contributions from a wide array of industry stakeholders and government agencies. The GSMA guide underscores several principled-based concepts and methodologies that form the bedrock of 5G security:
This document, as the GSMA states, aims to discuss various aspects of 5G security that require attention. It primarily refers to capabilities supported by 3GPP Release 17, with the understanding that future updates will reflect subsequent releases like Release 18. For us practitioners, this means continuous learning and adaptation as the standards mature. The shift in 5G towards technologies common in the broader IT world (like HTTP/2, TLS, JSON) brings both advantages and fresh challenges. While it allows leveraging existing knowledge and tools, it also means vulnerabilities discovered in the wider IT ecosystem can have a more immediate and potentially higher impact on telecom networks. The days of security through obscurity with proprietary telecom protocols are fading. This necessitates a more proactive and rapid approach to security patching, a topic the guide rightly emphasizes.
In the pages that follow, We'll delve into some of the specific features and innovations highlighted in the guide, always with an eye on what they mean for those of us responsible for securing these next-generation networks. Let's navigate this labyrinth together.
Key Security Features Demystified - Part 1
Having set the stage with the evolving landscape, let's now dissect some of the core security features and enhancements outlined in the GSMA's July 2024 guide. From a practitioner's standpoint, understanding the "why" and "how" of these features is crucial for effective implementation.
Unified Authentication Framework & Access-Agnostic Authentication
One of the significant strides in 5G is the move towards a unified authentication framework. The Authentication Server Function (AUSF) now enables a common approach for both 3GPP and non-3GPP access types. Release 15 laid the groundwork for 3GPP and untrusted non-3GPP access, and Release 16 extended this to all access types, crucially including trusted non-3GPP access. This is a welcome simplification, moving away from disparate authentication silos.
What this means for us:
Increased Home Control
A pivotal change is that the AUSF, residing in the home network, now terminates the authentication procedure. This is a departure from LTE, where this occurred in the visited network's Mobility Management Entity (MME). This shift gives the home network greater control and visibility. The home network receives confirmation of successful UE authentication and the Unified Data Management (UDM) is informed. Final device authentication in a visited network is only completed after the home network has verified the device's authentication status in that visited network.
Practically speaking:
Enhanced Subscriber Privacy (SUPI & SUCI)
Subscriber privacy sees a major boost with the introduction of the Subscription Concealed Identifier (SUCI). The SUCI is a privacy-preserving identifier that conceals the permanent Subscription Permanent Identifier (SUPI), which is the 5G equivalent of the IMSI. The SUCI is typically generated using Elliptic Curve Integrated Encryption Scheme (ECIES) based on the home operator's public key.
Key considerations for practitioners:
RAN Security Highlights
The Radio Access Network (RAN) also receives notable security upgrades:
These are just some of the foundational enhancements. Implementing them correctly and consistently is where the real work lies for us practitioners, ensuring that the theoretical security benefits translate into a genuinely hardened 5G infrastructure.
Key Security Features Demystified - Part 2
Continuing our practitioner's journey through the GSMA 5G Security Guide, this page focuses on the security of the Service Based Architecture (SBA), the critical aspects of roaming, and interworking scenarios. These areas are undergoing significant transformation in 5G, introducing both powerful new security mechanisms and new complexities we need to manage.
Service Based Architecture (SBA) Security
The 5G core’s SBA is a paradigm shift, and its security is built on modern IT principles:
The guide presents an overview of the security architecture encompassing several domains: network access security, network domain security, user domain security, application domain security, SBA domain security, and visibility/configurability of security. For us, this means a holistic view is essential, ensuring each domain's specific security requirements are met and integrated.
Roaming Security: The SEPP Takes Center Stage
Roaming is a critical service, and 5G significantly bolsters its security, primarily through the Secure Edge Protection Proxy (SEPP).
5GS-EPS Interworking Security
As we transition, interworking between 5G Systems (5GS) and the Evolved Packet System (EPS) is unavoidable. Key considerations include:
Non-Public Networks (NPN) Security
NPNs, whether Standalone (SNPN) or Public Network Integrated (PNI-NPN), have specific security needs:
Implementing these features—particularly the SEPP and its associated protocols—requires significant effort and careful configuration. The promise of truly secure roaming hinges on the correct deployment and diligent management of these new entities and interfaces. For practitioners, this means deep-diving into specifications like TS 33.501, FS.37 for N9 interface traffic, and understanding the nuanced roles of each new security function.
Innovations, Challenges, and Practical Implications
The GSMA's July 2024 5G Security Guide not only details enhanced features but also introduces new architectural elements and highlights innovations within the 5G core. For practitioners, these changes bring both opportunities for stronger security and significant new challenges, especially concerning the underlying technologies and the speed of potential threats.
New Elements and Functions in the 5G Security Architecture
Several new or significantly evolved functions play critical roles:
Innovations in the 5G Core & The Protocol Shift
The 5G core embraces a suite of protocols widely used in the IT industry:
This shift is a double-edged sword. On one hand, it allows leveraging mature technologies and a broader talent pool. On the other, these common protocols have a larger and more actively probed attack surface. Vulnerabilities are often discovered and exploited more quickly than with the more obscure, proprietary protocols of older 2G/3G/4G core networks. This reality, as the guide points out, demands increased and rapid security patching. We can no longer afford lengthy patch cycles.
Intra-PLMN SBA Security: The Certificate Conundrum
Securing the dynamic, virtualized SBA within a PLMN presents unique certificate management challenges. With NFs potentially spinning up and down rapidly, dynamically creating and managing certificates (and their keys) for TLS is complex. The guide notes that some vendors propose wildcard certificates to simplify this, but this approach, while supporting transport encryption, undermines the ability to validate the specific identity of an endpoint. Given that a key threat in virtualized cores is an attacker creating false NFs, identity authentication is crucial. The GSMA's advice is pertinent: MNOs should consider reusing the robust key management procedures specified for inter-PLMN security (GSMA PRD FS.34) for their intra-PLMN SBA environments.
The Impact of Cloud on 5G Security
5G is inextricably linked with cloud technologies:
These innovations and technological shifts demand a new mindset from security practitioners. We must be as agile and adaptable as the networks we're trying to secure, embracing automation and continuous security validation.
Network Slicing, O-RAN, Open Source, NESAS & Palindrome's Expertise
Our final section explores some of the more specialized yet increasingly critical areas of 5G security: network slicing, Open RAN (O-RAN), the use of open-source software, and the vital role of security assurance schemes like NESAS. These elements represent the cutting edge of 5G's capabilities and, consequently, new frontiers for security practitioners.
Network Slicing Security: Dedicated Networks on Shared Infrastructure
Network slicing allows multiple logical networks to run as virtually independent operations on a common physical infrastructure. This is a game-changer for offering tailored services but introduces complex security considerations.
O-RAN Security: Openness and Its Challenges
O-RAN represents a significant shift towards disaggregated, virtualized, and open-interface RAN architecture.
Security of Open-Source Software (OSS)
OSS is ubiquitous in 5G, from vendor solutions to community-driven projects.
Security Assurance for 5G: The Role of NESAS
With complex multi-vendor environments, security assurance becomes indispensable.
From Standards to Strengths with Palindrome Technologies
The GSMA's July 2024 5G Security Guide is an invaluable resource for us practitioners. It maps out a complex terrain of new threats, enhanced defenses, and evolving architectures. However, the journey from understanding these standards to implementing robust, practical, and resilient security is where the real challenge—and the real expertise—lies. The sheer breadth of considerations, from the intricacies of SUCI generation and SEPP deployment to the nuances of cloud-native security and O-RAN's open frontiers, can be daunting.
This is precisely where specialized expertise becomes not just beneficial, but critical.
At Palindrome Technologies, we live and breathe these complexities. Our world-leading cybersecurity expertise is dedicated to helping organizations like yours navigate the intricate 5G security landscape with confidence. We understand that security is not just a checklist; it's a continuous process of assessment, adaptation, and assurance.
Whether it's providing in-depth consulting services to help you align your 5G deployments with GSMA guidelines, 3GPP specifications, and global best practices, or delivering rigorous product security testing services, including evaluations for NESAS compliance, Palindrome is your trusted partner. We help you dissect the standards, identify the risks relevant to your specific environment, and implement security measures that are both effective and pragmatic.
Our deep understanding of telecom protocols, cloud security, virtualization, and emerging threats allows us to ensure that your 5G journey is not just innovative, but also secure and resilient from the ground up. Let Palindrome Technologies help you turn the comprehensive standards outlined in the GSMA 5G Security Guide into your organization's tangible strengths, safeguarding your network, your customers, and your future in the 5G era.
Overview of AI security frameworks and recommendations for practitioners
You're deploying private 5G to revolutionize your operations – faster speeds, lower latency, enhanced reliability. But are you really prepared for...
The recently published ETSI TS 104 223 V1.1.1 document, "Securing Artificial Intelligence (SAI), Baseline Cyber Security Requirements for AI Models...
The increasing connectivity of medical devices has revolutionized healthcare, offering unprecedented benefits in patient monitoring, diagnosis, and...