2 Overview

Deployment Environment

The 5G Cloud Native Core provides a variety of possible configuration and deployment environments:

Table 2-1 Deployment Environment

Type Host CNE Description
Bare Metal CNE-Supported Infrastructure CNE In this environment, a Kubernetes Cloud Native Environment is hosted directly on the bare metal hardware, while some other elements (DB or Bastion) are hosted using virtualized servers.
vCNE (Virtualized CNE) Customer Hypervisor (KVM/VMware ESXi) CNE In this environment, all the system elements are hosted in virtualized servers deployed on a customer provided Openstack environment. The CNE is deployed on the openstack infrastructure.
Cloud Customer CNE Customer CNE In this environment, the customer provides the CNE and deploys the 5G NFs directly into the environment. The Oracle provided common services and cnDBTier are used; equivalent functionality is provided by the customer.

Note:

  • Oracle Communications CNE provides basic CNE environment for on-premise deployment.
  • Customer CNE provides CNE environment for running not just 5G microservices but also any kind of service, not just 5G. For example- observability frameworks or 4G microservices.
  • With Customer CNE, a customer is responsible for ensuring the security of a Customer CNE.

Note:

The cloud environment security recommendations and procedures focus on the CNE reference environment. Customers providing their own CNE must have security procedures already in place.

2.1 Cloud Native Core Network Functions

Network Function security is prescribed by the relevant 4G and 5G standards. This document details the administrative steps required to ensure secure 5G network operations.

Table 2-2 4G and 5G Network Functions

Network Functions Abbreviation Description 3GPP Standard
Network Repository Function NRF NRF provides registration, discovery, and authorization services to all the Network Functions (NF) in the 5G core network.
  • 3GPP TS 29.510 v15.5
  • 3GPP TS 29.510 v16.3.0
  • 3GPP TS 29.510 v16.7
Service Communication Proxy SCP SCP provides a 5G-aware service mesh.
  • 3GPP TS 29.500 R16 v16.6.0

Network Slice Selection Function NSSF NSSF works with the Access and Mobility Function (AMF) to select the network slice to be used by the User Equipment (UE).
  • 3GPP TS 29.531 v15.5.0
  • 3GPP TS 29.531 v16.5.0
  • 3GPP TS 29.531 v16.8.0
  • 3GPP TS 29.501 v16.10.0
  • 3GPP TS 29.502 v16.10.0
Security Edge Protection Proxy SEPP In the roaming architecture, the home and visited networks are connected via the Security Edge Protection Proxy (SEPP) to manage the control plane of the inter-network interconnect.
  • 3GPP TS 23.501 v17.6.0
  • 3GPP TS 23.502 v17.6.0
  • 3GPP TS 29.500 v17.8.0
  • 3GPP TS 29.501 v17.7.0
  • 3GPP TS 29.573 v17.6.0
  • 3GPP TS 29.510 v17.7.0
  • 3GPP TS 33.501 v17.7.0
  • 3GPP TS 33.117 v17.1.0
  • 3GPP TS 33.210 v17.1.0
Unified Data Repository UDR/UDSF UDR is a repository of subscriber information, and is used by various NFs (including UDR, PCF, and NEF). The UDSF is a part of the Unified Data Management Function (UDF) and is used to store state information for Network Functions (NF).
  • 3GPP TS 29.505 v15.4.0
  • 3GPP TS 29.504 v16.2.0
  • 3GPP TS 29.519 v16.2.0
  • 3GPP TS 29.511 v17.2.0
Unified Data Repository (UDR) as Subscriber Location Function (SLF). SLF SLF supports the storage and retrieval of subscriber information through the nudr interface. NA
Network Exposure Function NEF Securely exposes network capabilities and events to Application Functions (AF).
  • 3GPP TS 29.338 v 17.1.0

  • 3GPP TS 23.040 v 17.2.0

  • 3GPP TS 29.122 v 16.10.0 , 17.10.0
  • 3GPP TS 23.222 v 16.9.0
  • 3GPP TS 23.501 v 16.10.0
  • 3GPP TS 23.502 v 16.10.0
  • 3GPP TS 29.514 v 16.10.0
  • 3GPP TS 29.521 v 16.10
  • 3GPP TS 29.503 v 16.14.0
  • 3GPP TS 29.515 v 16.7
  • 3GPP TS 29.222 v 16.5.0
  • 3GPP TS 29.500 v 16.6.0
  • 3GPP TS 29.501 v 16.6.0
  • 3GPP TS 29.522 v 16.10.0, 17.10.0
  • 3GPP TS 29.510 v 16.6.0
  • 3GPP TS 29.591 v 16.3.0
  • 3GPP TS 29.518 v 16.14.0
  • 3GPP TS 33.501 v 17.7.0
  • 3GPP TS 29.504 v 16.10.0
  • 3GPP TS 29.519 v 16.11.0
  • 3GPP TS 29.508 v 16.11.0
  • 3GPP TS 23.682 v 16.9.0
  • 3GPP TS 29.337 v 16.1.0
  • 3GPP TS 29.214 v 16.7.0
  • 3GPP TS 32.291 v16.14
  • 3GPP TS 32.290 v16.10.0
  • 3GPP TS 32.254 v16.6.0
Policy Control Function PCF Implements a unified policy framework for implementing control plane rules.
  • 3GPP TS 23.501
  • 3GPP TS 23.502
  • 3GPP TS 23.503
  • 3GPP TS 29.500
  • 3GPP TS 29.504
  • 3GPP TS 29.510
  • 3GPP TS 29.507
  • 3GPP TS 29.512
  • 3GPP TS 29.513
  • 3GPP TS 29.514
  • 3GPP TS 29.519
  • 3GPP TS 29.521
  • 3GPP TS 29.525
  • 3GPP TS 29.594
  • 3GPP TS 29.214
Binding Support Function BSF Provides PCF binding (mapping and selection) for User Equipment (UE).
  • 3GPP TS 23.501 v17.7.0
  • 3GPP TS 23.502 v17.7
  • 3GPP TS 23.503 V17.7
  • 3GPP TS 29.500 v17.7.0
  • 3GPP TS 29.510 v17.7
  • 3GPP TS 29.513 V17.7
  • 3GPP TS 29.521 v17.7.0
  • 3GPP TS 33.501 V17.7.0
Oracle Communications Cloud Native Core, Certificate Management OCCM Supports automation of certificate lifecycle management.
  • 3GPP TS 33.310-h30
  • 3GPP TR 33.876 v.0.3.0
Cloud Native Core Console CNC C Configuration and Operations portal and proxy for CNC NFs and components. NA

Table 2-3 5G Common Services

Network Function Abbreviation Description
Ingress Gateway, Egress Gateway, Alternative Routing Service APIGW Ingress and Egress Gateways for NFs
Automatic Test Suite ATS Automated Test Suite
Oracle Communications Certificate Manager OCCM Certificate Management
Network Repository Function - Client NRF-Client Product: Oracle Communications Cloud Native Core - 5G and Subcomponent: NRF-Client
Mediation Mediation Mediation modifies 5G Service Based Interface (SBI) message content, which includes HTTP2 header values and JSON message body, based on the user-defined mediation rule sets
Oracle Communication Cloud Native Core OCI Adapter OCI Adaptor Oracle Communications Cloud Native Core OCI Adapter
Oracle Communications DBTier cnDBTier Containerized deployment and automation of MySQL Cluster database technology

2.2 Secure Development Practices

Given below are the practices followed for a secure development environment:

2.2.1 Vulnerability Handling

For details about the vulnerability handling, refer Oracle Critical Patch Update Program. The primary mechanism to backport fixes for security vulnerabilities in Oracle products is quarterly Critical Patch Update (CPU) program.

In general, the CNC Software is on a quarterly release cycle, with each release providing feature updates and fixes and updates to relevant third party software. These quarterly releases provide cumulative patch updates.

You should have procedures in place to deploy security updates for each release cycle. For more information, see Implementing Security Recommendations and Guidelines.

2.3 Trust Model

The following Trust Model depicts the reference trust model (regardless of the target environment). The model describes the critical access points and controls site deployment.

While the model shows a single 5G NF microservice deployed, several NFs are also deployed in individual clusters.

2.3.1 Context diagram

img/context.png

2.3.2 Key Trust Boundaries

Trust Boundaries identify areas at a similar level of trust and isolate them from other areas at a different level of trust. Following are the key trust boundaries:

Table 2-4 Key Trust Boundaries

Trust Boundary Includes Access Control
Site Trust Boundary All the NFs and other supporting elements for a given site. Cluster Access Policies are implemented using some kind of Access Control Group (or Security Group) mechanism.
Cluster Trust Boundary All the compute elements for a given cluster Network Policies control traffic ingress and egress. Pod Security Policies manage the workloads allowed in the cluster (For example, no pods requiring privilege escalation).
DB Trust Boundary All the cnDBTier elements for a given cluster Firewall Policies control traffic ingress and egress. DB grants access and other permission mechanisms that provide authorization for users.
Orchestrator Trust Boundary (Orch Trust Boundary) The orchestration interface and keys Firewall Policies control the access to a Bastion server which provides orchestration services. Access to the Bastion host uses Secure Socket Shell (SSH) protocol. The cluster orchestration keys are stored on the Bastion host.
CS Trust Boundary The common services implementing logging, tracing, and measurements. Each of the common services provides independent Graphical User Interfaces (GUIs) that are currently open. The customer may want to introduce an api-gateway, implement authentication and authorization mechanisms to protect the OAM (Operations, Administrations, and Maintenance) data. The common services can be configured to use Transport Layer Security (TLS). When TLS is used, certificates must be generated and deployed through the orchestrator.
NF Trust Boundaries A collection of 5G Network Functions deployed as a service.

5G NF microservices provide Signaling access through a TLS protected HTTP2 interface. The certificates for these interfaces are managed via the certificate manager.

2.3.3 External Data Flows

The following are external data flows:

Table 2-5 External Data Flows

Data Flow Protocol Description
DF1: Configuration SSH The installer or administrator accesses the orchestration system hosted on the Bastion Server. The installer or administrator must use ssh keys to access the bastion to a special orchestration account (not root). Password access is not allowed.
DF2: Logs, Measurements, Traces HTTP/HTTPS The administrator or operator interacts with the common services using web interfaces.
DF3: 5G Signaling HTTP2 (w/TLS) All signaling interaction between NFs at a site and NFs at an external site is sent through TLS protected HTTP2.
DF4: Alerts SNMP (Trap) Alerting is performed using SNMP traps.
The complete list of network flows including service types and ports are available in Port Flow Appendix.