CIOReview
| | December 20208CIOReviewIN MY OPINIONCloudification of Communications Service Provider (CSP) network is imminentThe concept of cloud has become ubiquitous and has made inroads into the networks of communications service providers (CSPs). 5G will create new cloud-based applications and opportunities that are unviable with current network blueprints. CSPs in the past have always questioned migrating the network functions in their entirety to a public cloud as they are often skeptical of its security; however, no CSP can discount that hybrid cloud strategy will be a cornerstone for their 5G plans. In the 5G realm, it is important to remember that networks will become programmable, so the power of the cloud will be needed to future-proof the network and drive the costs down, taking advantage of economies of scale. This is the only way CSPs can exploit the 5G metamorphosis - by embracing a holistic and secure hybrid cloud strategy. The Telco CloudThe telco cloud is based on the predominant idea of codifying network elements of CSPs to create an ameliorated experience and scalability. Currently, the network functions are an integration of hardware, software, applications, and data. This approach is resource-intensive and not scalable for the new digital world. This is now creating a scenario where legacy orchestration solutions are separated from the digital infrastructure vis-a-vis the cloud, virtualization, and containers.An effective integration of these domains (orchestration and infrastructure) is possible through the telco cloud. Open-source platforms are gaining popularity in these two worlds. These platforms will help bring down the Total Cost of Ownership but will add additional complexities. Many CSPs are already contemplating a unified digital infrastructure across network functions and IT applications to exploit the above-mentioned levers. What are the possible vulnerabilities and threat vectors in a telco cloud?Telco cloud environment will be intricate and heterogeneous, including multiple tiers, technologies, deployment models, applications/network functions, and SECURING TELCO CLOUD FOR THE 5G ERAAPIs. The diversity of cloud computing models poses a security risk where different types of attacks are now targeting the cloud infrastructure. Static, manual, and perimeter security are obsolete and ineffective for dynamic clouds. Security breaches will have serious ramifications for CEOs and other key stakeholders. The threat vectors are ever-expanding. Prevention is more desirable than a cure, and implementing proactive security measures will go a long way in protecting the crown jewels for CSPs.An end-to-end telco cloud system encompasses multiple components, each of which can be subjected to distinctive attacks. An illustrative view of the cloud infrastructure threat landscape is depicted below:By Srinivas Bhattiprolu, Head of Advanced Consulting Service, Nokia Software
< Page 7 | Page 9 >