{"id":7661,"date":"2022-08-09T00:00:00","date_gmt":"2022-08-09T00:00:00","guid":{"rendered":""},"modified":"2025-06-13T02:37:27","modified_gmt":"2025-06-13T09:37:27","slug":"security-for-next-generation-telecommunication-networks","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/","title":{"rendered":"Security for next generation telecommunication networks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Almost two years ago, the National Defense Science Board invited me to participate in the Summer Study 2020 Panel, \u201cProtecting the Global Information Infrastructure.\u201d They requested that I brief them on the evolution of the global communications infrastructure connecting all nations. The U.S., like other nations, both cooperates and competes in the commercial telecom market, while prioritizing national security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This study group was interested in the implementation of 5G and its evolution to 6G. They understood that softwarization of the core communication technologies and the inclusion of edge and cloud computing as core infrastructure components of telecommunications services is inevitable. Because of my expertise in these areas, they invited me to share my thoughts on how we might secure and protect the emerging networks and systems of the future. I prepared for the meeting by looking at how Microsoft, as a major cloud vendor, had <a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/network-security\/#overview\">worked to secure our global networks<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">My conclusion was simple. It is clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our networks and systems with security as our first principle and we stay constantly vigilant. To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"specialized-hardware-replaced-by-disaggregated-software\">Specialized hardware replaced by disaggregated software<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">One challenge for the panel was to understand precisely what the emerging connectivity infrastructure will be, and what security attributes must be assured with respect to that infrastructure.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Classical networks (the ones before the recent 5G networks), were deployed as hub-and-spoke architecture. Packets came to a specialized hardware-software package developed by a single vendor. From there, they were sent to the Internet. But 5G (and beyond) networks are different. In many ways, the specialized hardware has been \u201cbusted open.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Functionality is now disaggregated into multi-vendor software components that run on different interconnected servers. As a result, the attack surface area has increased dramatically. Network architects have to protect each of these components along their interconnects\u2014both independently and together. Furthermore, packets are now processed by multiple servers, any of which could be compromised. 5G brings the promise of a significant number of connected Internet-of-Things (IoT) devices that, once compromised, could also be turned into an army of attackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-power-of-cloud-lies-in-its-scale\">The power of cloud lies in its scale<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In a word, Microsoft Azure is <em>big<\/em>: 62 regions in 140 countries worldwide host millions of networked servers, with regions connected by over 180,000 miles of fiber. Some of our brightest and most experienced engineers have used their knowledge to make this infrastructure safe and secure for customers, which includes companies and people working in healthcare, government services, finance, energy, manufacturing, retail, and more.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As of today, Microsoft tracks more than 250 unique nation-states, cybercriminals, and other threat actors. Our cloud processes and analyzes more than 43 trillion security signals every single day. Nearly 600,000 organizations worldwide use our security offering. With all this, Microsoft\u2019s infrastructure is secure, and we have earned the trust of our customers. Many of the world\u2019s largest companies with vital and complex security needs have offloaded much of their network and compute workloads to Azure. Microsoft Azure has become part of their critical infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"securing-open-ran-architecture\">Securing Open RAN architecture<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The cloud\u2019s massive and unprecedented scale is unique, and precisely what makes the large investments in sophisticated defense and security economically possible. Microsoft Azure\u2019s ground-up design includes strict security measures to withstand any type of attack imaginable. Conversely, the scale required to defend against sophisticated threats is not logical or feasible for smaller-scale, on-premises systems.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The report, \u201c<a href=\"https:\/\/www.brookings.edu\/research\/why-5g-requires-new-approaches-to-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Why 5G requires new approaches to cybersecurity<\/a>\u201d<sup>1<\/sup> articulates several good reasons why we need to think about how to protect our infrastructure. Many of us in research and engineering have also been thinking about these issues, as evidenced by Microsoft\u2019s recently published white paper, Bringing Cloud Security to the Open RAN, which describes how we can defend and mitigate against malicious attacks against O-RANs, beginning with security as the first principle.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With respect to O-RAN and <a href=\"https:\/\/azure.microsoft.com\/blog\/new-azure-for-operators-solutions-and-services-built-for-the-future-of-telecommunications\/\" target=\"_blank\" rel=\"noopener\">Azure for Operators Distributed Services<\/a> (AODS), we explain how they inherit and benefit from the cloud\u2019s robust security principles applied in the development of the far-edge and the near-edge. The inherently modular nature of Open RAN, alongside recent advancements in Software Defined Networking (SDN) and network functions virtualization (NFV), enables Microsoft to deploy security capabilities and features at scale across the O-RAN ecosystem.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We encapsulate code into secure containers and enable more granular control of sensitive data and workloads than prior generations of networking technologies. Additionally, our computing framework makes it easy to add sophisticated security features in real-time, including AI\/ML and advanced cloud security capabilities to promptly detect and actively mitigate malicious activities.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft is actively working on delivering the most resilient platform in the industry, backed by our proven security capabilities, trustworthy guarantees, and a well-established secure development lifecycle. This platform is being integrated with Microsoft security defense services to prevent, detect, and respond to attacks. It includes AI\/ML technologies to allow creation of logic to automate and create actionable intelligence to improve security, fault analyses, and operational efficiency.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We are also leveraging Azure services such as <a href=\"https:\/\/azure.microsoft.com\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener\">Active Directory<\/a>, <a href=\"https:\/\/azure.microsoft.com\/services\/container-registry\/\" target=\"_blank\" rel=\"noopener\">Azure Container Registry<\/a>, <a href=\"https:\/\/azure.microsoft.com\/services\/azure-arc\/\" target=\"_blank\" rel=\"noopener\">Azure Arc<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/products\/azure-network-function-manager\/\" target=\"_blank\" rel=\"noopener\">Azure Network Function Manager<\/a> to provide a foundation for secure and verifiable deployment of RAN components. Additional technologies include secure RAN deployment and management processes on top of these, which will eliminate significant upfront cost otherwise incurred by RAN vendors when building these technologies themselves.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It is noteworthy that across the entire project lifecycle\u2014from planning to sunsetting\u2014we integrate security practices. All software deliverables are developed in a \u201csecure by default\u201d manner, going through a pipeline that leverages Microsoft Azure\u2019s security analysis tools that perform static analysis, credential scanning, regression, and functionality testing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We are taking steps to integrate our RAN analytics engine with <a href=\"https:\/\/azure.microsoft.com\/services\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noopener\">Microsoft Sentinel<\/a>. This enables telecom operators to manage vulnerability and security issues, and to deploy secure capabilities for their data and assets. We expect Microsoft Sentinel, <a href=\"https:\/\/azure.microsoft.com\/services\/monitor\/\" target=\"_blank\" rel=\"noopener\">Azure Monitor<\/a>, and other Azure services will incorporate our RAN analytics to support telecommunications customers. With this, we will deliver intelligent security analytics and threat intelligence for alert detection, threat visibility, proactive hunting, and threat response. We also expect that Azure AI Gallery will host sophisticated 3rd party ML models for RAN optimization and threat detection, running on the data streams we collect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigating-the-impact-of-compromised-systems\">Mitigating the impact of compromised systems<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We have built many great tools to keep the \u201cbad guys\u201d out, but building secure telecommunication platforms requires dealing with the unfortunate reality that sometimes systems can still be compromised. As a result, we are aggressively conducting research and building technologies, including fast detection and recovery from compromised systems.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Take the case of ransomware. Traditional ransomware attacks encrypt a victim\u2019s data and ask for a ransom in exchange for decrypting it. However, modern ransomware attacks do not limit themselves to encrypting data. Instead, they remove the enterprise\u2019s ability to control its platforms and critical infrastructure. The RAN constitutes critical infrastructure and can suffer from ransomware attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\" alt=\"System architecture for mitigating impact of ransomware. Healthy servers receive trusted beacons from the cloud. An attack on near and far edge servers causes the cloud to stop issuing trusted beacons. In their absence, servers automatically reimage themselves kicking ransomware off the platform.\" title=\"Figure 1\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Specifically, we have developed technology that prepares us for the unfortunate time when systems may be compromised. Our latest technology makes it easier to recover as quickly as possible, and with minimal manual effort. This is especially important in telco far-edge scenarios, where the large number of sites makes it prohibitively expensive to send technicians into the field for recovery. Our solution, which leverages a concept called trusted beacons, automatically recovers a far-edge node from a compromise or failure. When trusted beacons are absent, the platform automatically reboots and re-installs an original, unmodified, and uncompromised software image.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"looking-into-the-future\">Looking into the future<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We have developed mechanisms for monitoring and analyzing data as we look for threats. Our best-in-class verification technology checks every configuration before lighting it up. Our researchers are constantly adding new AI techniques that use the compute power of the cloud to protect our infrastructure better than ever before. Our end-to-end zero-trust solutions spanning identity, security, compliance, and device management, across cloud, edge, and all connected platforms will protect the telecommunications infrastructure. We continue to invest billions to improve cybersecurity outcomes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft will continue to update you on developments that impact the security of our network, including many of the technologies noted within this article. Microsoft knows that while we need to continue to be vigilant, the telecommunications industry ultimately benefits by making Microsoft Azure part of their critical infrastructure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup> Tom Wheeler and David Simpson, \u201c<a href=\"https:\/\/www.brookings.edu\/research\/why-5g-requires-new-approaches-to-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Why 5G requires new approaches to cybersecurity<\/a>.\u201d The Brookings Institution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1506,1457,1459],"tags":[],"audience":[3053,3056],"content-type":[1481],"product":[1569,1561],"tech-community":[],"topic":[],"coauthors":[65],"class_list":["post-7661","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-identity","category-networking","category-security","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-microsoft-entra-id","product-microsoft-sentinel","review-flag-1680286581-295","review-flag-1-1680286581-825","review-flag-integ-1680286579-214","review-flag-iot-1680286585-835","review-flag-microsofts","review-flag-ml-1680286585-776","review-flag-new-1680286579-546","review-flag-summe-1680286584-4"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security for next generation telecommunication networks | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"It&#039;s clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security for next generation telecommunication networks | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-09T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T09:37:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\" \/>\n<meta name=\"author\" content=\"Victor Bahl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Bahl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/victor-bahl\/\",\"@type\":\"Person\",\"@name\":\"Victor Bahl\"}],\"headline\":\"Security for next generation telecommunication networks\",\"datePublished\":\"2022-08-09T00:00:00+00:00\",\"dateModified\":\"2025-06-13T09:37:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\"},\"wordCount\":1432,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\",\"articleSection\":[\"Hybrid + multicloud\",\"Identity\",\"Networking\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\",\"name\":\"Security for next generation telecommunication networks | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\",\"datePublished\":\"2022-08-09T00:00:00+00:00\",\"dateModified\":\"2025-06-13T09:37:27+00:00\",\"description\":\"It's clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security for next generation telecommunication networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security for next generation telecommunication networks | Microsoft Azure Blog","description":"It's clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/","og_locale":"en_US","og_type":"article","og_title":"Security for next generation telecommunication networks | Microsoft Azure Blog","og_description":"It's clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2022-08-09T00:00:00+00:00","article_modified_time":"2025-06-13T09:37:27+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp","type":"","width":"","height":""}],"author":"Victor Bahl","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Victor Bahl","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/victor-bahl\/","@type":"Person","@name":"Victor Bahl"}],"headline":"Security for next generation telecommunication networks","datePublished":"2022-08-09T00:00:00+00:00","dateModified":"2025-06-13T09:37:27+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/"},"wordCount":1432,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp","articleSection":["Hybrid + multicloud","Identity","Networking","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/","name":"Security for next generation telecommunication networks | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp","datePublished":"2022-08-09T00:00:00+00:00","dateModified":"2025-06-13T09:37:27+00:00","description":"It's clear that attacks on the national communications infrastructure will occur with much greater sophistication than ever before. Because of this, we continue to develop our\u00a0networks and systems with security as our first principle and we stay constantly vigilant.\u00a0To these ends, Microsoft has adopted a zero-trust security architecture in all our platforms, services, and network functions.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/08\/172f96e3-246c-482a-94e8-09a65ce38971.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/security-for-next-generation-telecommunication-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Security for next generation telecommunication networks"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=7661"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7661\/revisions"}],"predecessor-version":[{"id":41737,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7661\/revisions\/41737"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=7661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=7661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=7661"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=7661"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=7661"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=7661"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=7661"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=7661"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=7661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}