Security Capabilities are a Critical Element to 5G SuccessEscrito por Redacción TNI el 04/01/2022 a las 00:15:09894
5G networks based on standard technical specifications from the Third Generation Partnership Project (“3GPP”) continue to be the most widely adopted and secure wireless cellular technology in existence. Today, 5G Americas, the voice of 5G and LTE for the Americas announced the publication of a new white paper entitled ‘Security for 5G’ which details features and recommendations for securing 5G networks and provides an update on the security enhancements introduced by 3GPP in Releases 15 and 16. Chris Pearson, President of 5G Americas, said, “The increased speeds and lower latency of 5G networks are beginning to impact nearly every facet of life for consumers and enterprises. Fortunately, security has been the built into 5G right from its inception and has been required throughout its development, planning and deployment.” As increased bandwidth, higher data rates, and a surge of new devices and connections have made managing network security more complex, 5G Americas has provided nearly annual updates around the topic of security in wireless cellular networks. ‘Security for 5G’ is the latest update, building on prior work and focuses on evolving 5G security considerations. This white paper addresses emerging challenges and opportunities, making recommendations for securing 5G networks in the context of the evolution to cloud-based and distributed networks:
Additionally, the white paper provides insight into securing 5G in private, public, and hybrid cloud deployment models. Topics such as orchestration, automation, cloud-native security, and application programming interface (API) security are addressed. The transition from perimeter-based security to a zero-trust architecture to protect assets and data from external and internal threats is also discussed.
Scott Poretsky, Director of Security, North America, Network Product Solutions at Ericsson and 5G Americas group co-leader further added, “5G continues to integrate with other key technology enablers. In the cloud’s multi-stakeholder environment, cloud-native function software vendors, platform vendors, mobile network operators, hyperscale cloud providers, and system integrators must collaborate to clearly define requirements, roles and responsibilities for implementing security architecture and controls.” Noticias Relacionadas:Mobile World Congress 2015: EU unveils its vision for 5G Ya tenemos aquí el 5G (o no) |