| | December 20209CIOReviewThere are myriad threat vectors, and attacks can ensue with or without any human involvement. A few best practicesThe threats and vulnerabilities are different, so there is no silver bullet for securing a telco cloud. A few best practices will aid in this process, some of them are depicted below. CSPs must embrace the agility and innovations associated with the Internet world. Moving toward, a zero-touch architecture with extreme automation is essential to improve operational efficiency and network performance, and this will have a direct bearing on costs. Automation, cloudification, and Artificial Intelligence are essential attributes for increasing agility, thus enabling a faster rollout of services and a better customer experience.ConclusionSecurity must be an integral part of the telco cloud and the services that run on it. It needs to move from being a disjointed bolt-on to network services to be concomitant and built-in as a part of every service that is being offered by the telco cloud. Security was too siloed into multiple technology domains in the past and this resulted in many vulnerabilities in a telco cloud environment. CSPs are now realising the importance of an integrated and holistic approach towards a secure telco cloud. Traditionally, human-originated errors dominated the root causes of various security vulnerabilities, this is relevant for telco clouds as well. These human errors can be effectively eliminated through automation. In my view, automation must become the new normal for CSPs. With 5G and edge potentially opening the network to web-scale competition, security will surely be a key characteristic in enabling CSPs to differentiate their solutions and their new network infrastructure in the 5G realm. Telco cloud environment will be intricate and heterogeneous, including multiple tiers, technologies, deployment models, applications/network functions, and APIs. The diversity of cloud computing models poses a security risk where different types of attacks are now targeting the cloud infrastructureSrinivas Bhattiprolu
<
Page 8 |
Page 10 >