版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
GSMA
MobileTelecommunicationsSecurityLandscape
February2024
GSMAMobileTelecommunicationsSecurityLandscape
ThisisaninformationpaperoftheGSMA
SecurityClassification:Non-confidential
Accesstoanddistributionofthisdocumentisrestrictedtothepersonspermittedbythesecurityclassification.Thisdocumentissubjectto
copyrightprotectionandistobeusedonlyforthepurposesforwhichithasbeensuppliedandinformationcontainedinitmustnotbedisclosedorinanyotherwaymadeavailable,inwholeorinpart,topersonsotherthanthose
permittedunderthesecurityclassificationwithoutthepriorwrittenapprovaloftheAssociation.
CopyrightNotice
Copyright©2024GSMAssociation
Disclaimer
TheGSMAssociation(“Association”)makesnorepresentation,warrantyorundertaking(expressorimplied)withrespecttoanddoesnotacceptanyresponsibilityfor,andherebydisclaimsliabilityfortheaccuracyor
completenessortimelinessoftheinformationcontainedinthisdocument.Theinformationcontainedinthisdocumentmaybesubjecttochange
withoutpriornotice.
AntitrustNotice
TheinformationcontainhereinisinfullcompliancewiththeGSMAssociation’santitrustcompliancepolicy.
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
Contents
GSMACTOForeword
1
GSMAFraudandSecurityGroupChair
2
Chair,GSMAFraudandSecurityGroup&CEO,CopperHorseLtd
2
1.KeyPoints
3
2.Introduction
5
3.AttacksonOperators
7
Analysis
8
4.Attacksonvirtualisedinfrastructure
10
Analysis
10
5.SupplyChains
12
Analysis
12
6.GlobalTitleAbuseandInterconnect
14
Analysis
15
7.Malware&Ransomware
16
Analysis
17
8.Spyware
18
Analysis
18
9.MobileAppSecurity
20
Analysis
21
10.NewandRepackagedFraudTypes
22
Analysis
23
11.Theemergingsecurityoperatingcontext
24
AForwardLook
26
Summary
29
12.Finalthoughts
30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
GSMACTOForeword
As5Gusagegatherspaceinbothconsumerandenterprisesettings,itsbenefitswillspreadacrosstheglobaleconomy.Wereachedmorethan1.4billion5Gconnectionsworldwideat
theendofQ32023.And,today,over270mobileoperatorsinmorethan100marketshave
launchedcommercial5Gservices.5Gmobileconnectivityisexpectedtoaddnearly$1trilliontotheglobaleconomyby2030,withalmosthalfofthiscomingfromnewenterpriseservicesandapps,acrosssectorsincludingfinance,healthcare,andeducation.
5Gnetworksdeliveraspartofamulti-generationalevolutionofmobileinfrastructure.2G,3Gand4Gnetworkscontinuetodeliverservicesacrossthe
globeandsuchconnectivitybecomesevermorefundamentaltoourdailylives.Assuch,thecybersecurityofthosenetworksisafundamental
technologyenablerthatisincreasinglymandated
bygovernmentsandrequiresconstantscrutinyandinvestmenttokeeppacewiththechangingthreat
naturedescribedinthis,andprevious,GSMAmobiletelecommunicationsecuritylandscapereports.
Thisthreatlandscapereportplaysakeyrolein
communicatingtheongoing,evolvingand
escalatingnatureofthethreatsfacingourindustry.Importantly,thereportdrawsonbothpublicsources
andreportsfromwithintheGSMAsecurity
community.Pleasetakethetimetoreadthisreportandgetinvolvedinourteamefforttoincreasetheprotectionofoperatordeployedtechnologyand
infrastructure,customeridentity,securityand
privacy.ExistingGSMAmemberscancontinueto
contributetooursecurityworkandareencouragedtoapplyGSMAsecurityguidelinesand
recommendationswithintheirbusinesses.
Otherinterestedstakeholdersarewelcometoget
involved:theycandosobyjoiningtheGSMA,whichwillensureaccesstoabreadthofsecurityadvice
andbestpractices.
AlexSinclair-ChiefTechnologyOfficer,GSMA
1/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
GSMAFraudandSecurityGroupChair
Thepastyearhasbeenanothereventfuloneinthemobilesecurityworld.Conflictsaroundtheglobehaveoftenfocusedontelecomstechnologiesandservices,eitherasadirecttargetorasaroutetoanothertarget.Inaddition,criminalattackscanandhavebeendevastating;ransom-wareisaconstantanxietyandthetechniquesforcompromisingbusinesseshavebecome
increasinglyeffective,oftenfocusingonindividualemployeesandsocialengineering.
Tocircumventdefensivemeasures,attackersoftenseektocompromiseotherpartsofthesupplychainandabusethetrustrelationshipsbetweenorganisa-tions.Thisissomethingthatwe’llneedtocontinue
toaddressasanindustry,alongwithothersupply
chainconsiderationssuchasdealingwithdeployed,commonvulnerabilitiesinsoftwarelibrariesinan
effectiveandswiftmannersuchthattheexposureofattacksurfacesisminimal.
Wecontinuetoseelargeamountsoffraudglobal-
ly,usingmanydifferenttechniques.Inalmostallof
these,includingwheresocialengineeringisinvolved,thereareunderlyingtechnicalvulnerabilitiesthat
havebeendiscoveredandthenexploitedassome
partoftheattackchain.Ourindustryneedsto
ensurethattheintelligenceaboutnewandemergingfraudsissharedanddisseminatedquicklyandmostimportantly–actedupon,inordertoeffectivelytakethefighttothefraudsters,leavingthemverylittle
opportunitytoexploitsystemsandsubscribers.
Ourjobindefendingagainstthethreatstomobile
iswhatIcallthe‘Janusproblem’.Wearerequired
tobothlookbackatallthelegacysystemsthatwe
needtoprotectagainstoldandnewattacks,but
alsotolookforwardandprotectnew5Gnetworks
thatarebeingdeployed,whilethinkingaboutwhatfuturenetworksecuritylookslikeandwhatattackswemayface.Akeyareaoffocusthisyearforuswasaddressingcommercialspywarevectors,whichoftenuseacombinationofoldandnewtechnologies.Wewillcontinuetoidentifythetechniques,tacticsandproceduresofthesethreatactorsinordertomake
themobilenetworkahostileenvironmentforthemtooperatewithin.
Thereisanincreasingrecognitionoftheimportanceofmobiletelecomssecurityinprotectingcritical
systemsandtheconsequencesoffailurefor
individualsthroughtobusinesses.Thesecurity
actionsthatwe’vetakenasanindustryandthe
recommendationsthatwehavedevelopedarebothmirroredin,andinformcybersecuritypolicy
developmentbygovernmentsaroundtheworld.
Thereisabroadcommitmentbyalltomeetthe
challengesfaced,butitisalsogettingmoreonerousforbusinesseswhomaynothavetheresourcesto
fixallthemanyissues,particularlywithlegacy
technologies.Thiscanseemanimpossible
challenge,howevertheseproblemswillnotgoawayandthereisnohidingfromattack–theymustbe
addressed.TheGSMAFraudandSecurityGroup(FASG)isaglobalcommunityofexpertsinmobiletechnologiesthatcanhelpyourcompany,so
pleasejoinusandgetinvolved.
DavidRogersMBE-Chair,GSMAFraudandSecurityGroup&CEO,CopperHorseLtd
2/30
GSMAMobileTelecommunicationsSecurityLandscape
Thetopicareasreportareshownin
year’s
GSMAMobileTelecommunicationsSecurityLandscape
KeyPoints
1.0
KeyPoints
Themaintopicareasidentifiedinthisyear’sreportareshowninthisdiagram.
Figure1
SupplyChain
Attacksonsupplychainscontinueandcanhaveaforcemultipliereffect
Attacksonvirtualisedinfrastructure
Attacksonvirtualmachinesandcontainersolutions
Attackson
virtualised
infrastructure
Interconnect
attacks
MobileApp
Security
New&
re-packagedfraud
Supplychain
GlobalTitleAbuse
Globaltitleabuseispartoftheongoingchallengetoprotectinterconnect&signallingnetworks
MobileOperatorAttacks
•Databreaches
•Ransomwareattacks
•Supplychainattacks
•Reconnaissanceandinitialaccess
•Directattacksonservicedelivery
•DDOSattacks
•Socialengineering
•Compromising‘theedge’
Attackson
Operators
Spyware
MobileAppSecurity
Deviceandapplicationsecurityareimportantindeliveringrobustdevicesecurityoperation
Ransomeware
New&Re-packagedFraud
Fraudattackscontinueandareoftenre-inventionsandre-packagedversionsof
previoustechniques
Spyware
Spyware,aparticulartypeofmobiledevicemalware,cancompromiseend-userprivacy
Ransomwareattacks
Malwareandransomwarepointstoanaccelerationinpatching&other
mitigations
3/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
KeyPoints
Malwareandransomwarerepresentasignificant,
enduringandongoingthreattothemobileindus-
try,itscustomersandwiderserviceprovidersupplychains.Themobileindustry(alongwithallothers)
hastosignificantlyaccelerateitsabilitytopatchandmitigatevulnerabilities.
Thesecurityofvirtualisedandcloudinfrastructureis,andwillcontinuetobe,vital.Asuccessfulattackonsuchinfrastructurecanhavewidespreadeffectsatsignificantscale.
Securingartificialintelligence/machinelearning
(AI/ML)platforms,dataandalgorithmsarekey
protectivemeasures.Beyondthat,thereissignif-
icantpotentialforgenerativeAIsecurityapplica-
tionstospotadvancedandcomplexattacktypes
andtocounterfraudtechniquesthroughadvancedanalytics.Maliciousactorsarealsohighlylikelyto
useAI/MLtogenerateadvancedattacktechniques,pointingtoarequirementfordefensiveteamsof
generativeagentscapableofengagingincomplexreal-timedefence.Significantandrapidprogressisbeingmadeinthisfield,makingitakeyareaoffocus.
Thereportalsodescribeshowattacktypes,suchasflubotsandphishing,reportedinthepreviouseditionsofthisreportareevolving.Atthesametime,itexploresthewidersecurityoperating
context,whichshouldbealliedtothethreattopicareasshowninthediagramabove.
Near-termactionsandinvestmentdecisionsshouldbeinformedbyboththecurrentthreatsandby
theemergingwidercontext.Thisapproachwill
helpensureinvestmentsareefficientandgeneratelonger-termstrategicbenefits.
4/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
Introduction
2.0
Introduction
ThisistheGSMA’ssixthannualMobile
TelecommunicationsSecurityLandscape
report.Buildingonanumberofpreviousreports1,itreflectsdevelopments
during2023.
Asthesecuritylandscapechangesrapidly,theongoingchallengeisto‘tipthebalance’of
securityinfavourofthedefenders.Someofthe
opposingforces-illustratedinthediagrambelow-aredescribedinthisreport,although,ofcourse,theydonotrepresentallofthedifferenttypesofattackstheindustryhastodealwith,norallofitsdefences.
Figure2
卧Securityattacks
Securebydesign
Threatintelsharing
Strongexistingsecuritycontrols
Securityculture
Proactivesecuritytesting
Securitydefences
Inreasingattacksophistication
Newguidelinesandstandards
Newattacktypes
Riskmanagement
Morecomplexityopeningnewattackvectors
Lowertechnicalbarriers
Newsecuritycontrols
Multi-layereddefences
Lifecyclesecurityappooach
Re-inventionofoldattacktechniques
Supplychainattacks
Humanthreat
Expandedattacksurface
Increasingvolumes
1See
GSMA|Publications-Security
5/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
Introduction
Thismobilesecuritylandscapereportdoesnotexistinisolation.Otherhighly-relevantsecuritylandscapereportsinclude:
❚TheEuropeanUnionAgencyforCybersecurity(ENISA)ThreatLandscape2
❚TheCrowdstrike2023GlobalThreatReport3
❚TheANSSIStateofthethreattargetingthetelecommunicationssector4
❚IBMSecurityX-ForceThreatIntelligenceIndex20235
❚TheETISSecurityLandscape20236
❚TheZimperiumGlobalTelecomThreatReport20237
2
ENISAThreatLandscape2023—ENISA(europa.eu)
3
/global-threat-report
4
https://www.cert.ssi.gouv.fr/uploads/CERTFR-2023-CTI-010.pdf
5
/reports/threat-intelligence
6
/sites/default/files/content-files/ETIS-Papers/telco_sec_landscape_2023_published.pdf
7
/2023-global-mobile-threat-report
GSMAMobileTelecommunicationsSecurityLandscape6/30
GSMAMobileTelecommunicationsSecurityLandscape
3.0
AttacksonOperators
AttacksonOperators
Inordertoestablishandoperateeffective
securitydefences,itisnecessarytounder-standtheassetsthatmakeupthenetwork’sattacksurface.Thisincludesallthesystems(developmentandoperational),people
andprocessesusedtooperate,design
andmaintainthenetwork.Networkattack
surfacesareexpanding.Thereareincreasingnumbersofconnecteddevices(forexample,connectedvehiclesandIoTequipment),new
5Gstandalonecores,networkapplication
programminginterfaces(APIs),open-radioaccessnetwork(RAN)architecturesandnewartificialintelligence-enabledservices.Thediagrambelow,whichillustratesahigh-levelviewofatypicalmobilenetwork,provides
contextforthefollowingsectionsofthisreport.
>
>
<
\
\
OpenGatewayAPIs
RoamingHub
RVAS
Message
Aggregation
Hosted/OutsourcedSignalling
>
IPX
Internet
Figure3
OSS
AI/ML/XApps
HostedServices
BSS
Dedicated
Infrastructure
access
Network(s)
core
Network(s)
networkservices
Networking
NTN
VirtualisedCU
Software
COTSHardware
Dedicated&VirtualisedInfrastructure
Staff
devices
CustomerDevices
Corporatesystems
IT
VirtualisedInfrastructure
BaseBandUnit
IntegratedSoftware&Hardware
VirtualisedDU
Software
COTSHardware
OpenAPIs
OpenAPIs
OpenAPIs
Opertornetwork
Corporatepartners
Managed
Service
Providers
Interconnectpartner
Interconnectpartner
(incIoT)
7/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
AttacksonOperators
Theoperationalattacksurfaceiswideandcomplex.Attackscanbelaunchedatmanydifferentpoints
externallyandfromwithinthenetwork.Mobile
networkoperators(MNOs)havebeentargetedformanyyearsandtheseattackscontinuedin2023.Wecangrouptheseattacksintoeighttypes:
❚Databreaches
❚Ransomwareattacks
❚Supplychainattacks
❚Reconnaissanceandinitialaccess
❚Directattacksonservicedelivery
❚DDOSattacks
❚Socialengineering
❚Compromising‘theedge’
Asignificantnumberofattackshaveprimari-
lytargetedcustomerandstaffdatathatcanbe
furtherexploited,soldorleveraged.Ransomware
attackscanimpactaccesstoessentialnetwork
resourcesanddata,internalserversandcommuni-cationssystemsandcanresultintheunauthorisedextractionofdatafromITsystems.Directattacks8,includingDDoSattempts,cancompromisethe
availabilityofservicesonatemporaryorprolongedbasis9.Operators’employeeshavebeentarget-
edandmanipulatedintogivingattackersaccess
tosensitivesystems.Threatactorsalsoseekto
compromise‘theedge’ofenablingsystems(see
moreonthislater).AsMNOshavestrengthened
networksecuritycontrolsandimprovedend-pointdetectionandresponse,attackershavepivotedtotargetdevicesthatsupporttheunderlyingnetworkinfrastructure10.
Analysis
Theattractivenessofbothcustomerandstaff
dataandinformationmakesitanobviousongoingtargetforprospectiveattackers.Otherattacksseektoobtainreconnaissanceinformationoraninitial
networkaccessfromwhichtolaunchlaterattacksorgainfurtheraccessthroughprivilegeescala-
tionandlateralmovement(infactthefullrangeofMITREATT&CK®adversarytactics11).
DDoSattacks12aimtooverwhelminternetservices
withmoretrafficthantheycanhandle,withthegoaltodisruptthemandmakethemunavailableto
legitimateusers.Suchattackshavebeenlaunched
(oftenwithhighfrequencyandlargebandwidths13)againstMNOs14.DDoSattackscanbelaunchedviaavarietyofprotocols,includingtheapplicationlayer,networklayers,suchasIP,transportlayers,suchasUDP,andviasignallingroutes.ServicesareemergingthatseektomakelaunchingaDDoSattack
easier15.DefensiveDDoStoolsformanimportant
partofnetworkdefenceandshouldkeeppace
withtheincreasingrangeandmethodsofattacks.Acommondefensivecontrolistodroppacketsbyroutingthemtoa‘sinkhole’(i.e.thetrafficroutingis
changedsuchthatthepacketsaredropped
ratherthanallowingonwardconnectiontothetargetnetwork).
Securitycontrols,suchascustomisationofdefensivetoolsandproactivesecuritytesting,canallplayanimportantroleinmountingasuccessfuldefence.
Attacksviathirdpartieshighlighttheneedtoconsiderthetotalattacksurfaceforboth
insourcedandoutsourcedproductsandservices.
8Eg
/section/europe-s-east/news/russian-hackers-were-inside-ukraine-telecoms-giant-for-months-cyber-spy-chief/
9Forexample,theFrenchCybersecurityagencyANSSIobservedan“increaseincompromisesaffectingequipment,particularlyroutersatthecoreofoperators’networks.Theseattacks,ofahighlevelofsophistication,areoftencarriedoutoveralongperiodoftimeandaredifficulttodetect.”Seefullreportat
https://www.cert.ssi.gouv.fr/uploads/CERTFR-2023-CTI-010.pdf
10Exploredmorefullyin
/news-events/directives/binding-operational-directive-23-02
11
MITREATT&CK®
12
/resources/resource-library/reports/ddos-threat-landscape-report-2023/
13
DDoSthreatreportfor2023Q3()
14Forexample
Ukraine’sbiggestmobileoperatorsuffersmassivehackerattack-statement()
15
GermanPoliceRaidDDoS-FriendlyHost‘FlyHosting’–KrebsonSecurity
GSMAMobileTelecommunicationsSecurityLandscape8/30
GSMAMobileTelecommunicationsSecurityLandscape
AttacksonOperators
Theextendedsupplychaincontinuestobean
attractivetarget(asdiscussedinalatersection)forthoseintentoninflictingdamage.
Attacksthatseektocompromise‘theedge’caninvolvetargetingdevicessuchasVPNs,firewalls,Citrixenvironments,‘jump’boxes,loadbalancers,proxies,end-pointsandout-of-bandserver
managementinterfaces;especiallywheretheir
managementinterfacesareconnecteddirectlytopubliclyaccessibleinternetconnectivity.These
attacktypeshighlighttheongoingneedtobuildstrongsecuritydefences,includingsupporting
infrastructureandthoseprovidedbythirdpartiesandmanagedserviceproviders,andacrossthe
wholeattacksurfaceandserviceinventory.
Itisvitaltobuildandmaintainanaccurateand
completeinventoryofassetsandservicesinordertodefendthefullattacksurface.Resources,suchastheCybersecurity&InfrastructureAgency(CISA)
KnownExploitedVulnerabilityCatalogue16,canprovideusefulintelligenceonattackvectorsthathaveactuallybeenexploited,ratherthanmore
theoreticalattackmethods.
Morebroadly,thereareextensiveexistingsecuritydefenceguidelinesavailablefromtheGSMA’sFraudandSecurityGroup(FASG).TheGSMAhasrecentlycomprehensivelyupdateditsbaselinecontrols
documentFS.3117,whichdescribesasetof
effectiveandprovensecuritycontrolsthathavebeendevelopedbyGSMAmembers.
Morebroadly,someinterestingnewtoolscanhelpdesignthesecuritydefenceposture.Forexample,MITREhasreleased18a‘Navigator’tooltoassistinthedesignofcyberresilientsystemsandthe
’Decider’tooltohelpanalystsmapadversarybehaviourtotheMITREATT&CKframework.
16
/known-exploited-vulnerabilities-catalog
17
GSMA|FS.31GSMABaselineSecurityControls-Security
18
MITREReleasesTooltoDesignCyber-ResilientSystems()
&
/navigator
GSMAMobileTelecommunicationsSecurityLandscape9/30
GSMAMobileTelecommunicationsSecurityLandscape
Attacksonvirtualisedinfrastructure
4.0
Attacksonvirtualised
infrastructure
Withtherolloutof5G,theindustryismigrat-ingtocloud-basednetworkelementsand
infrastructure.Thisvirtualisedinfrastruc-
turecanbeimplementedthrough‘virtual
machines’and‘containers’.Containerscanprovideaprocess-levelseparationbetweenworkloadsthatmakethemquickandcheaptodeploy.
Asproductandfunction-relatedsoftwarecannowrunonarangeofnon-proprietaryplatforms,opera-torsensurethatwhatevercombinationofhardwareandsoftwaretheyuse,itstayssecure.Thisincludesensuringthatthesoftwareisuptodate,isrunningonoriginalandauthentichardwareandthatithasn’tbeenalteredbyanunauthorisedparty.
Herearesomerecentexamplesofattacksonvirtualisedinfrastructure.
❚Mandiantreported19anincidentinMicrosoftAzurewherebytheattackeremployed
malicioususeoftheSerialConsoleonAzureVirtualMachines(VM)toinstallthird-partyremotemanagementsoftwarewithinclientenvironments.
❚SentinelLabsreported20athreatactivity,
labelled‘WIP26’,targetingtelecommunicationprovidersintheMiddleEast.WIP26was
characterisedbytheabuseofpubliccloudinfrastructure–Microsoft365Mail,
MicrosoftAzure,GoogleFirebase,andDropbox–formalwaredelivery,data
exfiltrationandcommand&control(C2)purposes.
❚TheErmeticresearchteamreportedthreevulnerabilitiesintheAzureAPI
Managementservice21:twoServer-Side
RequestForgery(SSRF)vulnerabilitiesand
afileuploadpathtraversalonaninternal
Azureworkload.Asthevulnerabilitieswere
sharedviacoordinateddisclosure,theyhave
beenfullypatched.TheGSMAencourages
disclosureofvulnerabilitiestoCVDschemestoenablethemtobeassessedandpatched
(whererequired)beforethevulnerabilitiesaremorewidelydisclosed.TheGSMA’sCVD
scheme22providesamechanismforreportingandaddressingindustry-widevulnerabilities
thatdonotaffectasinglevendororcompany.
Analysis
5Gisdesignedtobecloud-nativeand6Gis
likelytofurtherrelyoncloudandvirtualisednetworkinfrastructure.Assuch,virtualisedinfrastructureis
animportantandgrowingcomponentofmobilenetworks,asdemonstratedby:
❚Thespecificationforemerging5Gstandalonecorenetworksrelyingoncloudandvirtualisedinfrastructure
❚TheO-RANAlliancespecifications23includetheconceptofsupporting‘O-Cloud’
infrastructure.
❚MobileEdgeCompute(MEC)solutions,whichmovecorefunctionsclosertothenetwork
edge,usuallyentailingtheuseofvirtualisedinfrastructure.
19
/cloud/microsoft-azure-vms-highjacked-in-cloud-cyberattack
20
/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/
21TheAzureAPIManagementserviceisafullymanagedplatformthatenablesorganizationstocreate,manage,secureandanalysetheirAPIsacrossallenvironments
22
GSMA|CVDProgramme
23
O-RANSpecifications
10/30
GSMAMobileTelecommunicationsSecurityLandscape
GSMAMobileTelecommunicationsSecurityLandscape
Attacksonvirtualisedinfrastructure
Correspondingly,somenationaltelecom
securityregulationshaveprioritisedincreased
securitycontrolsforvirtualisedandcloudimplemen-tations.Thecloudprovidersarerespondingtotheseregulationsbyreleasingpublicdocuments24that
demonstratehowtheirservicesmeetsomeofthenewgovernmentmandates.
Forcontaineriseddeployments,theunderlying
kernelandresourceschedulingissharedbetweeneverycontainerrunningonthehostwithin
thesametrustdomain.However,asingle
kernel-levelvulnerabilitymightallowanattacker
toimpacttheunderlyinghostand,therefore,all
concurrentcontainers.Thisforce-multipliermeansthatidentifiedvulnerabilitiesmustberemediatedasquicklyaspossibletominimisetheattackwindowandtheattackimpact.2023sawreports25from
hostingprovidersandtheFrenchComputer
EmergencyResponseTeam(CERT-FR)warnthatattackerswerecontinuingtotargetVMware
ESXiserversthatwereunpatchedagainsta
two-year-oldremotecodeexecutionvulnerabilitytodeployransomware.
Avirtualised,multi-vendorsolution-stackmayresultinsecurityconsiderationsmovingfrombeingthe
responsibilityofthenetworkvendortobeingtheresponsibilityoftheMNO.Forexample,inthecaseofanintegratedproductfromasinglevendor,theinternaldesignandintegrationofthehardware
platform,virtualisationandsoftwaremodulesarethesoleresponsibilityofthevendor.Witha
disaggregatedapproach,theunderlyingvirtualised
platform,virtualisationcodeandapplication
codemaybesourcedfromdifferentvendors.
Theresponsibilityforthesecomponentsworkingtogetherinasecuremannerwillrestwiththe
operator(oritssystemsintegrator/leadvendor).
Thesecurityofvirtualisedandcloudinfrastructureis,andwillcontinuetobe,vital.Asuccessfulattackonsuchinfrastructurecanhavewidespreadeffectsatsignificantscale.However,thereissubstantial
guidanceavailabletohelpsecurevirtualised
solutions,includinghowtomanagedistributedtrust
relationships.TheGSMAhasrecentlyupdateditsBaselineControls26addingfurtherguidance
specificallyonnetworkfunctionvirtualisation
andthereisongoingactivitywithintheGSMA’s
OpenInfrastructureGroup(closelylinkedto
Linu
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 办公机器和设备的安装保养和修理行业营销策略方案
- 粉屑清扫器市场发展前景分析及供需格局研究预测报告
- 减压玩具产品供应链分析
- 人工智能医疗行业营销策略方案
- 保险领域的理赔行业营销策略方案
- 磁带录像机商业机会挖掘与战略布局策略研究报告
- 为建筑物涂覆防护漆行业相关项目经营管理报告
- 制造罐头食品行业营销策略方案
- 旅游业全域透视-领略市场变化引领未来发展
- 数值孔径计产品供应链分析
- 220KV变电所管理制度
- 香港联合交易所有限公司证券上市规则
- 语文记叙文阅读理解答题技巧ppt课件
- 水电站组成和生产过程
- 《神经系统脊髓》PPT课件.ppt
- 破堤施工方案
- 票据法第三章本、支票
- 商检、法检、三检的区别
- 小儿川崎病ppt课件
- 异形金属板幕墙挂接安装施工工法(含模型图,节点图)
- 工程勘察设计收费标准2012年修订本20121118
评论
0/150
提交评论