Network Security
Network zones are stacked with increasing proximity to the open internet or DMZ. Each zone is traversed by ingress and egress points through an application or server, with appropriate authentication and authorization for connecting system traffic.
- VPCs.
- Network policies applied within a Kubernetes cluster or at ingress points.
- An appropriate service mesh.
Your network security must ensure adequate separation between internet-facing servers and back office systems. Malicious access to the control plane of network elements is highly damaging. For Diameter, the ports and gateways in this layer are often unauthenticated with the assumption that the network zone is fundamentally secure. 5G SBA provides improved authentication but remains an internal and highly protected network control plane. In Figure 1, Zone 5 is the most secure network zone.
In Figure 1, the Business API Gateway pods deployed in Zone 4 expose the Subscriber Management REST APIs on one virtual network interface, available to a web server in Zone 3, and authenticate the connecting server and requested URL. Only successfully authenticated requests are processed and dispatched using a separate virtual network interface to the MDC Gateway port on the MATRIXX Engine in Zone 5. A service mesh or Kubernetes policies can be used to achieve an equivalent solution within the Kubernetes overlay network.