47.6 F
Washington D.C.
Friday, March 29, 2024

ESF Members NSA and CISA Provide Threat Assessment, Best Practices for 5G Network Slicing

Network slicing is a 5G network architecture which allows mobile service providers to divide their network up into several independent “slices” in order to create specific virtual networks.

Enduring Security Framework (ESF) partners, along with experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), published their assessment of potential threats associated with 5G network slicing and strategies to help keep this emerging tech secure.

5G is the fifth-generation technology standard for broadband cellular networks. 5G technology can provide increased data download and upload speeds, lower latency, and allow more devices to connect to the internet at the same time.

Network slicing is a 5G network architecture which allows mobile service providers to divide their network up into several independent “slices” in order to create specific virtual networks that cater to different clients and use cases. Today’s report specifically identifies management strategies to ensure the confidentiality, integrity, and availability of each network slice.

“The Department of Defense is transitioning 5G into its enterprise. Being able to do network slicing across the entire 5G system is a critical new capability that 5G provides over LTE. As important, the ability to use network slicing in a secure way is foundational if the Department is to take advantage of the feature at all,” said Andrew Thiessen, Chief Technologist, DOD 5G Cross Functional Team.

The threat and security considerations discussed in this assessment are intended for mobile service providers, hardware manufacturers, software developers, and system integrators that design, deploy, operate, or maintain 5G networks.

Today’s release led by NSA and CISA on behalf of the ESF, a public-private cross-sector working group, is intended to provide an informed methodology to design, deploy, operate, and maintain secure network slicing across private, hybrid, and public networks. This release builds upon the work previously published in the ESF Potential Threat Vectors to 5G Infrastructure.

See the other documents in the ESF 5G series below:

For more timely, unique and actionable cybersecurity guidance from NSA and our partners, visit our full library.

If you have questions or want to learn more about ESF, please contact [email protected].

Read more at NSA

ESF Members NSA and CISA Provide Threat Assessment, Best Practices for 5G Network Slicing Homeland Security Today
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles