Securing National Communications Infrastructure

Data security and protection are of utmost importance, particularly for governments and telecommunication companies that are responsible for safeguarding this valuable asset. 

As the world becomes increasingly interconnected through advanced technologies like 5G and fixed broadband networks, robust security measures are more critical today than ever before.

The recent formation of the Global Coalition on Telecommunications (GCOT) by the UK and four international partners signals a collaborative effort to strengthen national infrastructure against state-sponsored threat actors. However, it is essential to acknowledge that the challenges go beyond simply investigating external networks.

Huawei & The State-Sponsored Threat

The controversy surrounding Huawei, the Chinese telecommunications giant, has been a focal point in discussing state-sponsored threats these past years. Allegations of espionage and network shutdowns have heightened concerns about protecting data and the UK’s critical infrastructure. At the height of its controversial coverage, a reported 47% of Britons believed in a threat posed by the Chinese company and called for sanctions against the firm. In response, a designated vendor direction document was issued to 35 telecom companies, calling for Huawei technology to be removed from the UK’s 5G public networks by the end of 2027.

Despite mounting concerns, smaller companies often turn to Huawei due to its competitive pricing. This reliance on Huawei's technology, even with its known risks, has led to the proliferation of their equipment in 5G and fixed networks, raising questions about the overall security posture of the UK telecommunications industry.

Telecoms Under ‘siege’

Despite the UK Government’s global initiatives to crack down on state-sponsored threats, a recent Google Cloud report highlights a surge in cyberattacks on telecom companies during Q1 2023. The global telecoms sector has experienced a staggering 85% of the top 1,000 distributed denial of service (DDoS) attacks during this period, and this raises the question as to where these attacks are coming from. Despite state-sponsored threat actors being linked to numerous incidents, an often-overlooked aspect is the ability to scrutinise our own networks and re-direct the security focus there. These findings underscore the urgency for a comprehensive approach to cybersecurity that extends beyond merely investigating external, international threats. 

Technology from various sources continues to find its way into UK networks, which means constructing a new approach that enhances security first while providing the flexibility to adapt to evolving threats without a complete overhaul of physical equipment. This includes upgrading legacy tech infrastructure to meet modern security requirements and fostering international security information sharing. By doing so, both public and private security teams can better anticipate and respond to emerging threats, creating a more resilient telecommunications ecosystem. 

Introducing A New Approach - Network Disaggregation

It’s also essential to address the fact that operators need to balance security and cost efficiency. This challenging task requires careful consideration of various factors, including network architecture, security protocols, and operational costs. So, how can they build secure networks without compromising on costs? 

One promising way to enhance telecom security is through network disaggregation. This involves decoupling hardware and software, allowing for the combination of open components to form a complete switching and routing device.

Telcos can purchase white-box hardware from anywhere globally and run independent software from a trusted source, minimising security risks. As foreign threats often lie in the software aspect of the network, not the hardware, telcos can purchase cheaper hardware and couple it with trusted software to create a cost-effective network with little security risk. Should a security concern arise, the ability to switch software without vendor lock-in adds a layer of adaptability and flexibility.

The decoupling of hardware and software provides network characteristics that enhance security as network disaggregation: enables quick software updates and patches, facilitates the selection of best-of-breed security tools from different vendors, reduces risks associated with vendor lock-in, provides granular security controls for precise configuration, enables isolation and segmentation to contain breaches, supports custom security implementations, allows scalable security architecture independent of hardware, offers centralised management for enhanced visibility and control, and ensures secure boot and hardware verification to only run trusted components on routing devices.

Securing The Future Of Our Networks

Overall, network disaggregation addresses key security concerns and offers scalability, allowing telco operators to expand their networks by adding and removing white boxes as needed. This flexibility aligns with the dynamic nature of cyber threats, ensuring that telecommunications networks can evolve without compromising security.

As the telecommunications industry grapples with the challenges posed by state-sponsored threat actors, it is important to adopt a comprehensive strategy beyond investigating external networks.

Going forward, the UK government has demonstrated its commitment through a £70 million round of funding for Future Telecoms Research Hubs, which is a step in the right direction. However, embracing network disaggregation is a natural step in protecting the UK’s critical national infrastructure against external threats ensuring a resilient and secure digital future for all.

Richard Brandon is VP of Strategy at RtBrick

Image: Diana den Held

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Intelligent Automation & AI Can Improve Business Resilience
Creating A Top-Notch Financial App With Advanced Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.