Home
/
Blog
/

Zero Trust Architecture in 5G: from marketing slogan to measurable security

A practical guide to building Zero Trust in 5G networks. Covers identity for subscribers and slices, micro segmentation across SBA, control and user plane protection, roaming, telemetry, policy engines, and measurable KPIs. No fluff. Just engineering.

Research
Nov 20, 2025
Zero Trust Architecture in 5G: from marketing slogan to measurable security

Zero Trust in one sentence

Never assume trust based on where traffic comes from. Verify every request, apply least privilege, and monitor continuously. In 5G, this must hold for users, devices, applications, network functions, slices, and partners.

Why Zero Trust matters more in 5G

Fifth generation mobile networks look and behave like cloud software. You get containerized network functions, APIs everywhere, service based discovery, and frequent change. The old perimeter mindset breaks as soon as an internal API gets exposed, a roaming peer misbehaves, or a misconfiguration opens a path from user plane to control plane. Zero Trust fits the reality of dynamic infrastructure and hostile interconnect.

Core principles mapped to 5G reality

  1. Strong identity for everything
    Users, UEs, gNBs, network functions, slices, data networks, API clients, and third party exposures need strong identity. Think of SUCI and SUPI for users, certificates for NFs, signed service account tokens for SBA clients, and explicit tenant identity for slices and private networks.
  2. Least privilege everywhere
    A network function that only needs Nsmf service access should never be able to call Nudm. A slice scoped analytics tool should not read another slice. A roaming partner should only reach the interworking functions that serve that partner. Default deny must be the normal mode, not a special case.
  3. Continuous verification
    TLS with server only auth at deployment time is not enough. Enforce mutual authentication, validate attestation or posture where possible, rotate credentials, and inspect behavior in real time. Make the trust decision per request, not per session.
  4. Assume breach
    Design so that a compromised NF, pod, or API key creates an alertable blast radius that is small and reversible.

Where Zero Trust lands inside a 5G system

Radio access and edge

Treat gNBs and distributed units as identities with certificates and inventory observability. Restrict management access to just in time paths. Validate software provenance on upgrades. For MEC workloads, apply per application identities and network policy so that an edge hosted video cache cannot query core subscriber data.

Control plane service based architecture

All NFs in the SBA must speak mutual TLS. Use a service mesh or equivalent sidecars to enforce client identity, request level authorization, and traffic policy. Discovery through NRF should not equal permission. Build explicit allow lists for which NF type can call which service and method. Log request identity and claims for every API call. Inspect for abuse patterns such as sudden surges of Nudm UEContext queries.

User plane

Separate data paths per slice and per QoS class using strict policy on SMF and UPF. For sensitive slices, pin traffic through dedicated UPF instances. Prevent lateral movement from user plane support networks into SBA control. Telemetry from UPF should feed anomaly detection for tunneling abuse and protocol oddities.

Subscriber data and identity

UDM, AUSF, ARPF, and authentication front ends are crown jewels. Place them in the most restricted security zone with rigorous access brokering. Only a minimal set of services may request subscriber profiles or authentication vectors, and every access is attributed and justified.

Roaming and interconnect

Treat every roaming partner as untrusted by default. Use protocol aware screening and rate limiting at SBI and legacy interworking edges. Enforce per partner certificates, per partner allow lists, and behavior baselines. Monitor for location abuse, SMS abuse, and mapping scans coming over interconnect.

Management and orchestration

CI CD, CNIs, registries, and observability stacks often become the back door. Require signed images, least privileged service accounts, and separate clusters or tenants per environment. Protect cluster APIs and Helm or operators with the same discipline as UDM.

Identity and policy that actually work

  1. Workload identity
    Use SPIFFE like identities or mesh issued certificates for pods and NFs. Rotate frequently. Encode NF type, slice scope, and environment inside identity claims to drive policy.
  2. Authorization
    Centralize policy as code. Express who can call which API with what claims and in which slice. Enforce at the point of use through sidecars or gateways, not only at a central proxy.
  3. Human identity
    Admins and operators get short lived credentials bound to device posture. Break glass flows are logged and scoped.

Micro segmentation without breaking the network

Segment by function, slice, and sensitivity. A helpful mental model

  1. Inner zone for subscriber identity and cryptographic material.
  2. Control zone for SBA services and NRF.
  3. User plane zone with strict boundaries to control.
  4. Interconnect zone for roaming and exposure.
  5. Management zone for CI CD and cluster control.

Traffic from a less trusted zone to a more trusted one requires mutual authentication, explicit authorization, and inspection. Traffic within a zone still follows allow lists and identity checks.

Telemetry, detection, and response

Zero Trust collapses without observability. Collect and correlate

  1. API call logs per method with caller identity and slice context.
  2. UPF flow records and GTP control messages for anomaly detection.
  3. Roaming edge events for pattern analysis.
  4. Auth success and failure timelines for users and workloads.
  5. Configuration changes from orchestration and IaC systems.

Automate response playbooks. For example, quarantine an NF identity, revoke a service token, remove an NRF registration, or divert a roaming partner to a scrubbing path while preserving service for others.

Practical controls you can ship this quarter

  1. Mutual TLS for all SBA calls, verified at both ends.
  2. Service level allow lists for every API on every NF.
  3. Dedicated UPF for sensitive slices, with policy that forbids lateral control plane reachability.
  4. Per partner certificates and rate limits at interconnect.
  5. Signed images and admission control in clusters that run NFs.
  6. Centralized, queryable logs for API and control messages with retention that matches regulatory reality.
  7. Alerting on impossible travel or impossible topology, such as an NF that appears in two data centers at once.

Common pitfalls

  1. Treating service discovery as authorization. Finding an NF is not the same as being allowed to call it.
  2. Using a single shared certificate or token for a whole NF type. Compromise becomes untraceable.
  3. Assuming user plane traffic is harmless. Attackers love data plane pivots.
  4. Forgetting roaming. The most interesting traffic often arrives from someone else’s network.
  5. Deploying a mesh without policy. Encryption alone does not implement least privilege.

Measuring progress with real KPIs

  1. Percentage of SBA calls that include mutual authentication. Target one hundred percent.
  2. Number of API methods protected by explicit authorization policies. Target one hundred percent.
  3. Mean time to revoke a compromised workload identity. Target minutes.
  4. Blast radius size, measured as the maximum set of APIs reachable if a single NF identity is stolen. Target very small and getting smaller.
  5. Detection coverage for top abuse scenarios. For example location retrieval over roaming and mass subscriber data queries.

A short blueprint you can adapt

  1. Inventory NFs, APIs, and interconnects. Assign risk and trust zones.
  2. Stand up identity for workloads and humans. Prove rotation and revocation.
  3. Enforce mutual authentication on every control plane hop.
  4. Write allow lists for the critical APIs first, starting with subscriber data and session control.
  5. Isolate sensitive slices in user plane and prevent reverse reachability.
  6. Lock down CI CD and cluster control.
  7. Centralize telemetry and build a few high quality detections before chasing hundreds.
  8. Drill incident response for stolen identities and partner abuse.

Closing thought

Zero Trust in 5G is not a product. It is a way to run your network where identity, least privilege, and evidence guide every connection. Start with the control plane and interconnect, measure ruthlessly, and keep shrinking what a single mistake can do.

Summary
Download our whitepaper

LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Be informed

SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Towards Harmonization: Mapping EU Telecom Security Regulations and their evolution

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.