起飛的5G網路與資安挑戰
- Dr. Yeali S. Sun (孫雅麗), Commissioner
Taiwan National Communications Commission (NCC)
全國資安大會, August 12, 2020
5G Dr. Yeali S. Sun ( , Commissioner Taiwan National - - PowerPoint PPT Presentation
5G Dr. Yeali S. Sun ( , Commissioner Taiwan National Communications Commission (NCC) , August 12, 2020 Outline 5G developments in Taiwan 5G Security Issues Concluding
Taiwan National Communications Commission (NCC)
全國資安大會, August 12, 2020
2 YLSUN 2020
YLSUN 2020 4
R16 R15
eMBB 增強行動寬頻 URLLC 超可靠低延遲通訊
mMTC 大規模機器通訊
目標:「拓展」5G 支持垂直場域邁向 數位轉型下智能化 生產、製造與運作 的模式;達到數位 國家、數位經濟與 數位社會的目標。 從NSA架構轉移到 SA架構; 真正5G網 路的建設與部署, 速度會加快。
YLSUN 2020 5
這對於拉升Average Return per User (ARPU) 動能有限。
Source: 3GPP
Prague 5G Security Conference 2019
transform the way we communicate and the way we live substantially.
underpinned by an appropriate level of security.
8
Cyber security NOT only a
technical issue
Both technical and NON-
TECHNICAL nature of cyber threats
Possible serious effects of
Nation-wide approach Proper risk assessment
essential
Broad nature of security measures
No universal solutions
Ensuring security while supporting INNOVATION
Supply chain security
9
10
Digital Nation, Innovative Economic Development Program(DIGI+ 2017-2025) To accelerate Industrial Innovation and Economic Prosperity
5G
Constructing a beneficial infrastructure for digital innovation
5+2 產業
services.
(NFV), network slicing, edge computing, etc.
that the 5G network and services rely on are sufficiently trustworthy.
11 YLSUN 2020
12 YLSUN 2020
YLSUN 2020 13
寬頻業務管理規則)(Article 40)
review and approval by NCC.
during the review whenever necessary.
specify the reason and report it to NCC for approval.
14 YLSUN 2020
bidder is required to submit such a document.
focused and address all the important cybersecurity issues.
understand, manage, and reduce the cybersecurity risks.
15 YLSUN 2020
practices.
networks in a globally digitalized world,” Prague 5G Security Conference, May 2019.
2019.
must be addressed in the document.
16 YLSUN 2020
17
業務、範圍、安全維護程序與流程
product design, development, operation and maintenance
(prevent, detect, protect, recovery)
Trusted HW/SW & Supply Chain Secure Network Secure Operati
Mgmt. Governance
Integration
with Operations
技術面
5G Security
(control plane & user plane)
YLSUN 2020
18
Protect
9 Cybersecurity Protect and Control Measures 13 Performance Evaluation of Personnel with Job Assignment Involved 5G Security 14 Continual Improvement and Review of 5G Network Protection Plan 16 Security Measures for Subscriber Data Protection in terms
Identify
1 Policy & Goals 2 Core Business & Significance 3 Scope of Protection 4 Cybersecurity Executive Organization 5 Dedicated Personnel and Budget Allocation 6 Chief Security Officer 7 Identification of Information and Communications Systems (including Equipment in Compliance with ITU or 3GPP Regulations 8 Cybersecurity Risk Assessment 12 Outsourcing Management 17 Formal Certification of Cybersecurity Management
Recover
10 Notification, Incident Response, and Cybersecurity Exercises 11 Cybersecurity Threat Intelligence Evaluation and Response
Respond
10 Notification, Incident Response, and Cybersecurity Exercises 11 Cybersecurity Threat Intelligence Evaluation and Response
Detect
15 The Detect and Protect Measures (Including the architecture, defense in-depth and timetable)
Secure, Reliable & Resilient
NIST Cybersecurity Framework
YLSUN 2020
1)
Secure Software Development Quality Control (安全軟體開發品質控管)
2)
Software Update Management (軟體更新管理)
3)
Supply Chain Security Management (供應鏈安全管理)
4)
Integration of Cybersecurity measures with Network Operations (ICT+OT) (資安落實於OT)
5)
Cybersecurity Capability Building (資安能力的建立)
6)
Multi-access Edge Computing (邊緣運算)
7)
Privacy (隱私保護)
8)
Signal interference – a form of DoS (訊號干擾)
YLSUN 2020 19
process, and quality control”
20 YLSUN 2020
1 2 3 4 5
Risk Assessment Privacy Impact Assessment Secure Coding Vulnerability Analysis Vulnerability Watch Hardening Guideline
Source: Ericsson
During operations
update process”
(timeliness)、品質 (執行程序及人員管控)和一致性 (uniformity))
YLSUN 2020 21
maintaining supply chain visibility, not only for security but for regulatory compliance.
Ban of Chinese-made equipment; world wide trend. How about the elements inside including software?
Network function softwarization: complex systems consisting of a number of components
from chips, processors, firmware, OS, libraries, to various software modules including open source software
YLSUN 2020 22
Software com in China
Gov. project
institute Software com
subcontract subcontract subcontract
Q2: How can 5G network operators establish and maintain supply chain visibility, both for security and regulatory compliance?
components
(including coding practices, technical capability to conduct appropriate reviews, and management of its software supply chain risks)
development, configuration/deployment, operations/maintenance, and disposal.
YLSUN 2020 23
with internal roles and external partners, as well as network
YLSUN 2020 24
YLSUN 2020 25
Operations & Mgmt.
Network Operator 5G equipment, systems, database & apps.
Product Providers
vendors
design, architecture, and implementation of hardware/firmware/software of the product.
to conduct security assurance test and evaluation
the entire network elements and
5G network operators.
Authority Agency
such as real-time AR/VR applications, network
YLSUN 2020 26
YLSUN 2020 27
Concerns of
about who is doing what
microtargeting) etc.
5G is an enabling technology of new services. It is Transformational ! (數 位轉型)
spawn an intelligent ecosystem of connected devices, harvesting massive amounts of data that will change the way we live and work.”
Networks (5G)
Source: Ericsson
Subscriber database Control plane functions 5G service User plane gateway
Non-public Network (defined premises)
URLLC - 低延遲、高 可靠性 (Time-sensitive Communications)
Source:5G-ACIA
29
MEC
端(控制 面控制 信令與 用戶面 資料傳 輸)
低軌道 衛星通 訊匯流
業者)
Design)
3.監理能量與能力:建置可驗證符合通傳法規之網路資通安全檢測實驗室
行動通 信系統 資通安 全維護 計畫參 考框架
寬頻 系統 審驗 技術 規範
確保我國 5G網路之 安全、可 靠,且具 韌性
管理 法
管理 法
NSA
共網
Wire- Wireless Conver- gence (WWC)
資通 安全 管理
2019 2020 2021 2022 2023 2024
兩個目標對象
兩大平台
(DevSecOps)」
30
4大聚焦議題
3大產出
框架、指引文件與機制
能量與能力
實務培訓
固網 (backhaul)
政策、法規、監理、技術規範、審驗、檢驗、稽核
31
regulation.
security issues, especially software security, update security, supply chain security, integration of cybersecurity with operations, governance, privacy, etc.)
service providers and regulatory government agency.
Norms
32 YLSUN 2020