Enduring Security Framework (ESF) partners, along with experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), published their assessment of potential threats associated with 5G network slicing and strategies to help keep this emerging tech secure.
5G is the fifth-generation technology standard for broadband cellular networks. 5G technology can provide increased data download and upload speeds, lower latency, and allow more devices to connect to the internet at the same time.
Network slicing is a 5G network architecture which allows mobile service providers to divide their network up into several independent “slices” in order to create specific virtual networks that cater to different clients and use cases. Today’s report specifically identifies management strategies to ensure the confidentiality, integrity, and availability of each network slice.
“The Department of Defense is transitioning 5G into its enterprise. Being able to do network slicing across the entire 5G system is a critical new capability that 5G provides over LTE. As important, the ability to use network slicing in a secure way is foundational if the Department is to take advantage of the feature at all,” said Andrew Thiessen, Chief Technologist, DOD 5G Cross Functional Team.
The threat and security considerations discussed in this assessment are intended for mobile service providers, hardware manufacturers, software developers, and system integrators that design, deploy, operate, or maintain 5G networks.
Today’s release led by NSA and CISA on behalf of the ESF, a public-private cross-sector working group, is intended to provide an informed methodology to design, deploy, operate, and maintain secure network slicing across private, hybrid, and public networks. This release builds upon the work previously published in the ESF Potential Threat Vectors to 5G Infrastructure.
See the other documents in the ESF 5G series below:
- Potential Threat Vectors to 5G Infrastructure
- Security Guidance for 5G Cloud Infrastructures: Prevent and Detect Lateral Movement (Part I)
- Security Guidance for 5G Cloud Infrastructures: Securely Isolate Network Resources (Part II)
- Security Guidance for 5G Cloud Infrastructures: Data Protection (Part III)
- Security Guidance for 5G Cloud Infrastructures: Ensure Integrity of Cloud Infrastructure (Part IV)
- Open Radio Access Network Security Considerations
For more timely, unique and actionable cybersecurity guidance from NSA and our partners, visit our full library.
If you have questions or want to learn more about ESF, please contact NSAESF@cyber.nsa.gov.