Skip navigation
5G security for public and hybrid cloud deployments

5G security for public and hybrid cloud deployments

5G: raising the cloud security bar

Cloud security must evolve to combat the realities of today’s threat landscape and the reduced risk tolerance due to the impact of an exploit or attack.

Ericsson helps mobile network operators (MNOs) to manage their four main cloud security responsibilities.

  • select the cloud service provider through due diligence
  • purchase the required security controls after a detailed risk analysis
  • configure the cloud service provider’s security tools and validate configurations
  • maintain the MNO’s security posture

Find out more in our report.

Download the report
Two people looking at charts on multiple screens

What is required to secure 5G network functions in the cloud?

Ericsson has identified 20 security categories that are relevant for the deployment of cloud-based network functions for 5G networks. Together, they represent a comprehensive set of security categories that provide maximum protection.

We consider these 10 cloud security categories to be a mandatory baseline for securing 5G network deployments with a zero-trust architecture on any cloud infrastructure:

  • continuous monitoring, logging, and alerting
  • micro-segmentation and micro-perimeters
  • principle of least privilege
  • Automated Identity and Access Management (IAM)
  • Multi-Factor Authentication (MFA)
  • PKI-based Mutual Authentication
  • sensitive data encryption
  • Threat Detection and Response (TDR)
  • SIEM/SOAR integration
  • DevSecOps and Continuous Integration/Continuous Deployment (CI/CD)
Cloud Security graph

These four additional recommended security controls for 5G network functions and are available from public cloud providers:

  • key management and hardware-based key storage
  • secure APIs and API gateway
  • compliance audit to regulations and industry standards • cloud security posture management

The 14 categories listed, represent the largest subset MNOs can expect for 5G network functions on a public cloud infrastructure.

With an additional 6 areas explored in the report, these represent the ideal target that MNOs should aspire to deploy all of these in order to achieve the maximum protection level.

Ericsson Intelligent Automation Platform

Ericsson is investing in service management and orchestration for RAN automation, which also facilitates a secure migration to public and hybrid clouds. Ericsson Intelligent Automation Platform (EIAP) implements SMO for Open RAN, and extends it to take openness and automation forward with multi-vendor and multi-technology RAN support.

As 5G critical infrastructure migrates to hybrid and public cloud deployments, it is necessary to build-in zero-trust architecture to protect the expanded attack surface from internal threats.

We invite MNOs to engage with Ericsson to set a clear and executable strategy for secure mobile networks deployed in public and/or hybrid clouds. Ericsson can facilitate three party conversations with cloud providers to achieve the desired outcomes.

Ericsson Intelligent Automation Platform

Related content

Why SMO provides an ideal platform for intelligent Open RAN security

The cloud introduces security advantages for 5G Open RAN deployments, but it also expands the attack surface. The visibility and intelligence of the service management and orchestration (SMO) make it an ideal platform to enhance the security posture of Open RAN cloud deployments, aligning with a zero trust architecture (ZTA).

Read more

How to enable security in Cloud RAN

The virtualization and automation of network functions enable cloud-based deployments of 5G Core Networks which creates exciting opportunities for cloud-native deployments of Radio Access Networks (RAN). While cloud-based deployments are important steps towards more open RAN architectures, they also introduce new security risks. In this post, we discuss how to secure cloud-based deployments of open 5G RAN.

Read more

Security Manager

Ericsson Security Manager addresses the needs of next generation security operations by making security visible and automating the security processes.

Read more

Stay updated

News and press releases

Blog posts

White papers