2 Overview
Deployment Environment
The 5G Cloud Native Core provides a variety of possible configuration and deployment environments:
Table 2-1 Deployment Environment
Type | Host | CNE | Description |
---|---|---|---|
Bare Metal | CNE-Supported Infrastructure | CNE 1 | In this environment, a Kubernetes Cloud Native Environment is hosted directly on the bare metal hardware, while some other elements (DB or Bastion) are hosted using virtualized servers. |
Cloud | Customer Cloud | CNE 1 | In this environment, all the system elements are hosted in virtualized servers deployed on a customer provided Openstack environment. The CNE is deployed on the openstack infrastructure. |
Cloud | Customer CNE | Customer CNE 2 | In this environment, the customer provides the CNE and deploys the 5G NFs directly into the environment. The Oracle provided common services and cnDBTier are used; equivalent functionality is provided by the customer. |
Note:
- Oracle Communications CNE provides basic CNE environment for on-premise deployment.
- Customer CNE provides CNE environment for running not just 5G microservices but also any kind of service, not just 5G. For example- observability frameworks or 4G microservices.
- With Customer CNE, a customer is responsible for ensuring the security of a Customer CNE.
Note:
The cloud environment security recommendations and procedures focus on the CNE reference environment. Customers providing their own CNE must have security procedures already in place.2.1 Cloud Native Core Network Functions
Network Function security is prescribed by the relevant 4G and 5G standards. This document details the administrative steps required to ensure secure 5G network operations.
Table 2-2 4G and 5G Network Functions
Network Functions | Abbreviation | Description | 3GPP Standard |
---|---|---|---|
Network (function) Repository Function | NRF | NRF provides registration, discovery, and authorization services to all the Network Functions (NF) in the 5G core network. |
3GPP TS 29.510 v15.5 3GPP TS 29.510 v16.3.0 3GPP TS 29.510 v16.7 |
Service Communication Proxy | SCP | SCP provides a 5G-aware service mesh. |
3GPP TS 29.500 v16.6.0 3GPP TS 29.501 v16.5.0 |
Network Slice Selection Function | NSSF | NSSF works with the Access and Mobility Function (AMF) to select the network slice to be used by the User Equipment (UE). |
3GPP TS 29.531 v15.5.0 3GPP TS 29.531 v16.5.0 3GPP TS 29.531 v16.8.0 3GPP TS 29.501 v16.10.0 3GPP TS 29.502 v16.10.0 |
Security Edge Protection Proxy | SEPP | In the roaming architecture, the home and the visited network are connected through Security Protection Proxy (SEPP) for the control plane of the internetwork interconnect. |
3GPP TS 23.501 v16.7.0 3GPP TS 23.502 v16.7.0 3GPP TS 29.500 v16.6.0 3GPP TS 29.501 v16.5.0 3GPP TS 29.510 v16.6.0 3GPP TS 29.573 v16.3.0 |
Unified Data Repository | UDR/UDSF | UDR is a repository of subscriber information, and is used by various NFs (including UDR, PCF, and NEF). The UDSF is a part of the Unified Data Management Function (UDF) and is used to store state information for Network Functions (NF). |
3GPP TS 29.505 v15.4.0 3GPP TS 29.504 v16.2.0 3GPP TS 29.519 v16.2.0 3GPP TS 29.511 v17.2.0. |
Unified Data Repository (UDR) as Subscriber Location Function (SLF). | SLF | SLF supports the storage and retrieval of subscriber information through the nudr interface. | NA |
Network Exposure Function | NEF | Securely exposes network capabilities and events to Application Functions (AF). | 3GPP TS 29.122 v16.10.0, 17.10.0
3GPP TS 23.222 v16.9.0 3GPP TS 23.501 v16.10.0 3GPP TS 23.502 v16.10.0 3GPP TS 29.514 v16.10.0 3GPP TS 29.521 v16.10 3GPP TS 29.503 v16.14.0 3GPP TS 29.515 v16.7 3GPP TS 29.222 v16.5.0 3GPP TS 29.500 v16.6.0 3GPP TS 29.501 v16.6.0 3GPP TS 29.522 v16.10.0, 17.10.0 3GPP TS 29.510 v16.6.0 3GPP TS 29.591 v16.3.0 3GPP TS 29.518 v16.14.0 3GPP TS 33.501 v17.7.0 3GPP TS 29.504 v16.10.0 3GPP TS 29.519 v16.11.0 3GPP TS 29.508 v16.11.0 3GPP TS 23.682 v16.9.0 3GPP TS 29.337 v16.1.0 3GPP TS 29.214 v16.7.0 3GPP TS 32.291 v16.14 3GPP TS 32.290 v16.10.0 3GPP TS 32.254 v16.6.0 |
Networks Data Analytics Function | NWDAF | Assists in collecting and analyzing data in a 5G network. |
3GPP TS 23.288 v16 3GPP TS 23.288 v17.4.0 3GPP TS 29.520 v17.6.0 3GPP TS 29.508 v17.5.0 3GPP TS 29.518 v17.5.0 3GPP TS 23.501 v17.5.0 3GPP TS 23.502 v17.4.0 3GPP TS 33.521 v17.1.0 |
Policy Control Function | PCF | Implements a unified policy framework for implementing control plane rules. |
3GPP TS 23.501 3GPP TS 23.502 3GPP TS 23.503 3GPP TS 29.500 3GPP TS 29.504 3GPP TS 29.510 3GPP TS 29.507 3GPP TS 29.512 3GPP TS 29.513 3GPP TS 29.514 3GPP TS 29.519 3GPP TS 29.521 3GPP TS 29.525 3GPP TS 29.594 3GPP TS 29.214 |
Binding Support Function | BSF | Provides PCF binding (mapping and selection) for User Equipment (UE). |
3GPP TS 23.501 3GPP TS 23.502 3GPP TS 23.503 3GPP TS 29.500 3GPP TS 29.504 3GPP TS 29.510 3GPP TS 29.514 3GPP TS 29.521 3GPP TS 29.214 |
2.2 Secure Development Practices
Given below are the practices followed for a secure development environment:
2.2.1 Vulnerability Handling
For details about the vulnerability handling, refer Oracle Critical Patch Update Program. The primary mechanism to backport fixes for security vulnerabilities in Oracle products is quarterly Critical Patch Update (CPU) program.
In general, the CNC Software is on a quarterly release cycle, with each release providing feature updates and fixes and updates to relevant third party software. These quarterly releases provide cumulative patch updates.
2.3 Trust Model
The following Trust Model depicts the reference trust model (regardless of the target environment). The model describes the critical access points and controls site deployment.
While the model shows a single 5G NF microservice deployed, several NFs are also deployed in individual clusters.
2.3.2 Key Trust Boundaries
Table 2-3 Key Trust Boundaries
Trust Boundary | Includes | Access Control |
---|---|---|
Site Trust Boundary | All the NFs and other supporting elements for a given site. | Cluster Access Policies are implemented using some kind of Access Control Group (or Security Group) mechanism. |
Cluster Trust Boundary | All the compute elements for a given cluster | Network Policies control traffic ingress and egress. Pod Security Policies manage the workloads allowed in the cluster (For example, no pods requiring privilege escalation). |
DB Trust Boundary | All the cnDBTier elements for a given cluster | Firewall Policies control traffic ingress and egress. DB grants access and other permission mechanisms that provide authorization for users. |
Orchestrator Trust Boundary (Orch Trust Boundary) | The orchestration interface and keys | Firewall Policies control the access to a Bastion server which provides orchestration services. Access to the Bastion host uses Secure Socket Shell (SSH) protocol. The cluster orchestration keys are stored on the Bastion host. |
CS Trust Boundary | The common services implementing logging, tracing, and measurements. | Each of the common services provides independent Graphical User Interfaces (GUIs) that are currently open. The customer may want to introduce an api-gateway, implement authentication and authorization mechanisms to protect the OAM (Operations, Administrations, and Maintenance) data. The common services can be configured to use Transport Layer Security (TLS). When TLS is used, certificates must be generated and deployed through the orchestrator. |
NF Trust Boundaries | A collection of 5G Network Functions deployed as a service. | Some 5G NF microservices provide OAM access through a GUI.
5G NF microservices provide Signaling access through a TLS protected HTTP2 interface. The certificates for these interfaces are managed via the certificate manager. |
2.3.3 External Data Flows
Table 2-4 External Data Flows
Data Flow | Protocol | Description |
---|---|---|
DF1: Configuration | SSH | The installer or administrator accesses the orchestration system hosted on the Bastion Server. The installer or administrator must use ssh keys to access the bastion to a special orchestration account (not root). Password access is not allowed. |
DF2: Logs, Measurements, Traces | HTTP/HTTPS | The administrator or operator interacts with the common services using web interfaces. |
DF3: 5G Signaling | HTTP2 (w/TLS) | All signaling interaction between NFs at a site and NFs at an external site is sent through TLS protected HTTP2. |
DF4: Alerts | SNMP (Trap) | Alerting is performed using SNMP traps. |