scope...•continuity risks •failures –how to deal with hardware and software failures...

12
Understand challenges for providing reliable and secure TETRA network operation Choose relevant requirements for your TETRA network Establish questions and criteria to evaluate vendor expertise and solutions Mitigate risks for availability, security and continuity SCOPE

Upload: others

Post on 01-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Understand challenges for providing

reliable and secure TETRA network operation

• Choose relevant requirements for your

TETRA network

• Establish questions and criteria to evaluate

vendor expertise and solutions

• Mitigate risks for availability, security

and continuity

SCOPE

Page 2: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Functionality

• Performance

• Scalability - Capacity

• Availability - Reliability - Coverage

• Security

• Continuity

REQUIREMENTS

Page 3: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Definition of Availability• Availability in Time & Place (coverage)

• Availability versus Reliability• Availability calculation (MTBF, MTTR)

• Increase availability by…• System redundancy

• Link redundancy

• Component redundancy

• Coverage redundancy

• Local Site Fallback

• Direct Mode

AVAILABILITY

Page 4: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• System redundancy• Synchronization, Activation, Recovery > Expected Outage

• Link redundancy• Physical links, Protocols > Expected Outage

AVAILABILITY

MainSwMI

StandbySwMI

BS2 BS4 BS6

BS3 BS5 BS7BS1

Ethernet

E1, DSL, Fiber, ...

Main path to BS4

Standby pathto BS4

Page 5: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Coverage• Coverage planning

• Drive tests

• Special Coverage Locations

• Continuous coverage reporting

AVAILABILITY

Page 6: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Security risks• Eavesdropping – Air interface, Fixed network, Control room

• Traffic analysis – Identities, Movements, …

• Denial of Service – Air interface, Fixed network

• Compromised base station – Sensitive key material

• False base station – Take control of valid users

• Unauthorized user access – Eavesdropping, Disinformation, Fraud

• System disruption – System or site unavailability

SECURITY

Page 7: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• TETRA security• Class 2 Air Interface Encryption – SCK

• Class 3 Air Interface Encryption – DCK, CCK

• Class 3G Air Interface Encryption – GCK

• (Mutual) Authentication

• End-to-End Encryption

SECURITY

Page 8: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• System security• System hardening –

Reduce “surface of vulnerability” (services, ports, …)

• Access security – Encryption and (two-factor) user authentication

• Security auditing – Logging of access and command execution

• Security patches – Resolve known vulnerabilities

SECURITY

Page 9: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Network security• Physical security – Fences, Access control, Alarms

• Cyber security –

Firewall, Intrusion detection, Virus & Malware interception

• Admin access – VPN, (two factor) User authentication

• Network access – VLAN, ACL, EAP

• Link encryption – IPsec, MACsec

• Security auditing – RADIUS, Syslog

SECURITY

Page 10: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Continuity risks• Failures – How to deal with hardware and software failures

• Complaints – How to pro-actively solve user complaints

• Expansion – How to ensure expansions within budget

• Support – How support can be provided securely and effectively

• Lifecycle – How to deal with hardware and software obsolescence

• Vendor – How to ensure long-term vendor relations

CONTINUITY

Page 11: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Failure mitigation• Component Failures – Spares, Repairs

• System Failures – Backup, Restore, Disaster recovery

• User Complaints – Logging, Statistics, Analysis, Reporting

CONTINUITY

Page 12: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Business mitigation• Expansion – Scalability, Cost (Hardware, Licenses)

• Support – Ease of configuration, Remote support,

Service Level Agreements, Cost

• Lifecycle – Software releases, (Security) patches,

End-of-Life Notices, Escrow

• Vendor – Profitability, Strategy, Commitment

CONTINUITY