Skip to content

Commit 3d692b6

Browse files
authored
Merge pull request #274846 from robswain/NAS-encryption
Add NAS encryption config
2 parents a856fba + c633735 commit 3d692b6

File tree

3 files changed

+35
-19
lines changed

3 files changed

+35
-19
lines changed

articles/private-5g-core/modify-packet-core.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,8 @@ The following changes will trigger components of the packet core software to res
4040
- Static UE IP pool prefixes
4141
- Network address and port translation parameters
4242
- DNS addresses
43-
- Changing the UE Maximum Transmission Unit (MTU) signaled by the packet core.
43+
- Changing the UE maximum transmission unit (MTU) signaled by the packet core.
44+
- Changing the non-access stratum (NAS) encryption type.
4445

4546
The following changes will trigger the packet core to reinstall, during which your service will be unavailable for up to two hours:
4647

@@ -106,6 +107,7 @@ To modify the packet core and/or access network configuration:
106107
- Use the information you collected in [Collect packet core configuration values](collect-required-information-for-a-site.md#collect-packet-core-configuration-values) for the top-level configuration values.
107108
- Use the information you collected in [Collect access network values](collect-required-information-for-a-site.md#collect-access-network-values) for the configuration values under **Access network**.
108109
- If you want to enable UE usage monitoring, use the information collected in [Collect UE usage tracking values](collect-required-information-for-a-site.md#collect-ue-usage-tracking-values) to fill out the **Azure Event Hub Namespace**, **Event Hub name** and **User Assigned Managed Identity** values.
110+
- If you want to change the non-access stratum (NAS) encryption type, use the **Advanced configuration** tab. You can set up to three levels of preference. For example, you could set the first preference to `NEA2/EEA2`, the second preference to `NEA1/EEA1` and the third preference to `none` to ensure that one of the two encryption algorithms is used and NEA0/EEA0 (null encryption) is not permitted. This will prevent UEs that do not support NAS encryption from registering with the network.
109111
1. Choose the next step:
110112
- If you've finished modifying the packet core instance, go to [Submit and verify changes](#submit-and-verify-changes).
111113
- If you want to configure a new or existing data network and attach it to the packet core instance, go to [Attach a data network](#attach-a-data-network).

articles/private-5g-core/private-5g-core-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -136,13 +136,13 @@ Azure Private 5G Core supports the following authentication methods:
136136
- 5G Authentication and Key Agreement (5G-AKA) for mutual authentication between 5G UEs and the network.
137137
- Evolved Packet System based Authentication and Key Agreement (EPS-AKA) for mutual authentication between 4G UEs and the network.
138138

139-
The packet core instance performs ciphering and integrity protection of 5G non-access stratum (NAS). During UE registration, the UE includes its security capabilities for 5G NAS with 128-bit keys.
139+
The packet core performs ciphering and integrity protection of 5G non-access stratum (NAS). During UE registration, the UE includes its security capabilities for 5G NAS with 128-bit keys.
140140

141141
Azure Private 5G Core supports the following algorithms for ciphering and integrity protection:
142142

143-
- 5GS null encryption algorithm
144-
- 128-bit Snow3G
145-
- 128-bit Advanced Encryption System (AES) encryption
143+
- NEA2: 128-bit Advanced Encryption System (AES) encryption
144+
- NEA1: 128-bit Snow3G
145+
- NEA0: 5GS null encryption algorithm
146146

147147
### UE-to-UE traffic
148148

articles/private-5g-core/security.md

Lines changed: 28 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Security
33
titleSuffix: Azure Private 5G Core
44
description: An overview of security features provided by Azure Private 5G Core.
5-
author: richardwhiuk
6-
ms.author: rwhitehouse
5+
author: robswain
6+
ms.author: robswain
77
ms.service: private-5g-core
88
ms.topic: conceptual
99
ms.date: 01/25/2022
@@ -28,18 +28,18 @@ The Azure Private 5G Core service stores all data securely at rest, including SI
2828

2929
Azure Private 5G Core packet core instances are deployed on Azure Stack Edge devices, which handle [protection of data](../databox-online/azure-stack-edge-security.md#protect-your-data).
3030

31-
## Customer-managed key encryption at rest
31+
### Customer-managed key encryption at rest
3232

33-
In addition to the default [Encryption at rest](#encryption-at-rest) using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network) to encrypt data with your own key.
33+
In addition to the default [Encryption at rest](#encryption-at-rest) using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) to encrypt data with your own key.
3434

35-
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key. Note that:
35+
If you elect to use a CMK, you'll need to create a Key URI in your [Azure Key Vault](../key-vault/index.yml) and a [User-assigned identity](../active-directory/managed-identities-azure-resources/overview.md) with read, wrap, and unwrap access to the key. Note that:
3636

3737
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](../key-vault/keys/how-to-configure-key-rotation.md).
3838
- The SIM group accesses the key via the user-assigned identity.
3939

40-
For further information on configuring CMK, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
40+
For more information on configuring CMK, see [Configure customer-managed keys](/azure/cosmos-db/how-to-setup-cmk).
4141

42-
You can use Azure Policy to enforce using CMK for SIM groups. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
42+
You can use Azure Policy to enforce using CMK for SIM groups. For more information, see [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
4343

4444
> [!IMPORTANT]
4545
> Once a SIM group is created, you cannot change the encryption type. However, if the SIM group uses CMK, you can update the key used for encryption.
@@ -50,23 +50,37 @@ Azure Private 5G Core provides write-only access to SIM credentials. SIM credent
5050

5151
As these credentials are highly sensitive, Azure Private 5G Core won't allow users of the service read access to the credentials, except as required by law. Sufficiently privileged users may overwrite the credentials, or revoke them.
5252

53+
## NAS encryption
54+
55+
Non-access stratum (NAS) signaling runs between the UE and the AMF (5G) or MME (4G). It carries the information to allow mobility and session management operations that enable data plane connectivity between the UE and network.
56+
57+
The packet core performs ciphering and integrity protection of NAS. During UE registration, the UE includes its security capabilities for NAS with 128-bit keys. For ciphering, by default, Azure Private 5G Core supports the following algorithms in order of preference:
58+
59+
- NEA2/EEA2: 128-bit Advanced Encryption System (AES) encryption
60+
- NEA1/EEA1: 128-bit Snow 3G
61+
- NEA0/EEA0: 5GS null encryption algorithm
62+
63+
This configuration enables the highest level of encryption that the UE supports while still allowing UEs that don't support encryption. To make encryption mandatory, you can disallow NEA0/EEA0, preventing UEs that don't support NAS encryption from registering with the network.
64+
65+
You can change these preferences after deployment by [modifying the packet core configuration](modify-packet-core.md).
66+
5367
## RADIUS authentication
5468

55-
Azure Private 5G Core supports Remote Authentication Dial-In User Service (RADIUS) authentication. You can configure the packet core to contact a RADIUS authentication, authorization and accounting (AAA) server in your network to authenticate UEs on attachment to the network and session establishment. Communication between the packet core and RADIUS server is secured with a shared secret that is stored in Azure Key Vault. The default username and password for UEs are also stored in Azure Key Vault. You can use the UE's International Mobile Subscriber Identity (IMSI) in place of a default username. See [Collect RADIUS values](collect-required-information-for-a-site.md#collect-radius-values) for details.
69+
Azure Private 5G Core supports Remote Authentication Dial-In User Service (RADIUS) authentication. You can configure the packet core to contact a RADIUS authentication, authorization, and accounting (AAA) server in your network to authenticate UEs on attachment to the network and session establishment. Communication between the packet core and RADIUS server is secured with a shared secret that is stored in Azure Key Vault. The default username and password for UEs are also stored in Azure Key Vault. You can use the UE's International Mobile Subscriber Identity (IMSI) in place of a default username. See [Collect RADIUS values](collect-required-information-for-a-site.md#collect-radius-values) for details.
5670

5771
Your RADIUS server must be reachable from your Azure Stack Edge device on the management network. RADIUS is only supported for initial authentication. Other RADIUS features, such as accounting, are not supported.
5872

5973
## Access to local monitoring tools
6074

6175
### Secure connectivity using TLS/SSL certificates
6276

63-
Access to the [distributed tracing](distributed-tracing.md) and [packet core dashboards](packet-core-dashboards.md) is secured by HTTPS. You can provide your own HTTPS certificate to attest access to your local diagnostics tools. Providing a certificate signed by a globally known and trusted certificate authority (CA) grants additional security to your deployment; we recommend this option over using a certificate signed by its own private key (self-signed).
77+
Access to the [distributed tracing](distributed-tracing.md) and [packet core dashboards](packet-core-dashboards.md) is secured by HTTPS. You can provide your own HTTPS certificate to attest access to your local diagnostics tools. Providing a certificate signed by a globally known and trusted certificate authority (CA) grants further security to your deployment; we recommend this option over using a certificate signed by its own private key (self-signed).
6478

65-
If you decide to provide your own certificates for local monitoring access, you'll need to add the certificate to an [Azure Key Vault](../key-vault/index.yml) and set up the appropriate access permissions. See [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) for additional information on configuring custom HTTPS certificates for local monitoring access.
79+
If you decide to provide your own certificates for local monitoring access, you'll need to add the certificate to an [Azure Key Vault](../key-vault/index.yml) and set up the appropriate access permissions. See [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) for more information on configuring custom HTTPS certificates for local monitoring access.
6680

6781
You can configure how access to your local monitoring tools is attested while [creating a site](create-a-site.md). For existing sites, you can modify the local access configuration by following [Modify the local access configuration in a site](modify-local-access-configuration.md).
6882

69-
We recommend that you replace certificates at least once per year, including removing the old certificates from your system. This is known as rotating certificates. You might need to rotate your certificates more frequently if they expire after less than one year, or if organizational policies require it.
83+
We recommend that you rotate (replace) certificates at least once per year, including removing the old certificates from your system. You might need to rotate your certificates more frequently if they expire after less than one year, or if organizational policies require it.
7084

7185
For more information on how to generate a Key Vault certificate, see [Certificate creation methods](../key-vault/certificates/create-certificate.md).
7286

@@ -78,13 +92,13 @@ Microsoft Entra ID allows you to natively authenticate using passwordless method
7892

7993
If you decide to set up Microsoft Entra ID for local monitoring access, after deploying a mobile network site, you'll need to follow the steps in [Enable Microsoft Entra ID for local monitoring tools](enable-azure-active-directory.md).
8094

81-
See [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools) for additional information on configuring local monitoring access authentication.
95+
See [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools) for more information on configuring local monitoring access authentication.
8296

83-
You can use Azure Policy to enforce using Entra ID for local monitoring access. See [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
97+
You can use Azure Policy to enforce using Microsoft Entra ID for local monitoring access. For more information, see [Azure Policy definitions for Azure Private 5G Core](azure-policy-reference.md).
8498

8599
## Personally identifiable information
86100

87-
[Diagnostics packages](gather-diagnostics.md) may contain information from your site which may, depending on use, include data such as personal data, customer data, and system-generated logs. When providing the diagnostics package to Azure support, you are explicitly giving Azure support permission to access the diagnostics package and any information that it contains. You should confirm that this is acceptable under your company's privacy policies and agreements.
101+
[Diagnostics packages](gather-diagnostics.md) may include personal data, customer data, and system-generated logs from your site. When providing the diagnostics package to Azure support, you are explicitly giving Azure support permission to access the diagnostics package and any information that it contains. You should confirm that this is acceptable under your company's privacy policies and agreements.
88102

89103
## Next steps
90104

0 commit comments

Comments
 (0)