From Fragmented 5G Identity to Cloud-Native Trust

Table of Contents

Automating Certificate-Based Identity for T-Mobile’s 5G Standalone Network

As a Tier-1 mobile network operator accelerated deployment of its 5G Standalone (5GSA) network, securing machine and infrastructure identities became mission-critical. The 5G core introduced new trust boundaries, third-party vendor dependencies, and stringent compliance requirements as part of national and cross-border critical infrastructure. Existing identity and certificate solutions lacked the cloud-native automation, flexibility, and protocol support needed to scale securely in a modern 5G environment.

The operator required a standards-based identity lifecycle solution that could integrate with existing PKI investments while supporting 3GPP CMPv2, enabling cloud-native deployment, coordinating security across internal teams and strategic vendors, and maintaining the resilience and compliance demanded of large-scale telecom infrastructure without introducing operational risk or service disruption.

ISS Solution: ILM for Telecoms & Critical Infrastructure

ISS delivered an Identity Lifecycle Management (ILM) solution purpose-built for telecom scale, cloud-native environments.

ILM enabled seamless integration with MS ADCS, extending it with full CMPv2 support, allowing 5G network components to securely request and manage certificates even though ADCS does not natively support CMPv2. Vendors were able to independently integrate with ILM interfaces while adhering to centrally enforced security and compliance policies defined by the operator.

In parallel, the operator expanded ILM beyond 5G identities to include infrastructure web server certificate management using ILM’s ACME implementation, eliminating manual processes and preventing certificate-related outages across critical services.

Key Capabilities Delivered

  • First-of-its-kind CMPv2 (3GPP) certificate management with MS ADCS
  • Cloud-native identity automation without interoperability issues
  • Centralized inventory of cryptographic assets across 5GSA appliances
  • Rapid response to compromised devices through immediate certificate revocation and replacement
  • Crypto agility, enabling fast replacement of deprecated or vulnerable algorithms
  • Automated compliance enforcement via policy-driven approvals and lifecycle controls

Results

  • Automated identity lifecycle management across the 5G Standalone network
  • Elimination of certificate-related outages in infrastructure services
  • Improved security posture for critical telecom infrastructure
  • Operational agility through cloud-native certificate and identity automation
  • Stronger compliance confidence with centralized visibility and enforcement

Popular Case Studies

Smart Cities & Infrastructure

A global electric vehicle manufacturer needed to support ISO 15118-compliant Plug & Charge across its growing network of vehicles, charge points, and service providers. As EV adoption accelerated, the company required a unified trust infrastructure that could authenticate vehicles, chargers, and mobility service providers automatically — eliminating user friction while maintaining cryptographic control and compliance with international standards.

Smart Cities & Infrastructure

Smart infrastructure operators face escalating risks as PLCs, SCADA systems, elevators, building management systems (BMS), and connected city services converge on digital networks. These assets are long-lived, safetycritical, and regulated under IEC 62443, SIL 3/4, and NIST SP 800-82. Challenges include legacy assets with expired credentials, PLC-driven elevators integrated into fire and BMS systems, and emergency phone lines converted to IP/VoIP, creating new attack surfaces. SCADA/DCS controllers managing power, water, and city services are also exposed to cyber and compliance risks, compounded by fragmented visibility across suppliers and infrastructure. To meet safety and regulatory demands, operators require a resilient, audit-ready trust foundation ensuring compliance and uptime.

Power, Energy & Utilities

A leading U.S. power utility needed to secure and modernize its digital trust infrastructure across IT and OT networks. With thousands of certificates, keys, and secrets spread across enterprise applications, SCADA devices, and mobile endpoints, the risk of outage, cyberattack, and compliance gaps was rising sharply. At the same time, the organization faced increasing regulatory pressure and had committed to a full digital transformation by 2030, requiring a more resilient, unified trust foundation.

Resource Library

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems
Ready to Secure Your Trust Lifecycle?

Let's secure your entire trust lifecycle from the physical edge to the cloud, the sea, and beyond.