The Enduring Security Framework (ESF) specialists from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published their third installment of guidance to protect the data within a 5G core cloud infrastructure. The series explains how to protect sensitive data in the 5G cloud from unauthorized access. Natalie Pittore, Chief of ESF in NSA’s Cybersecurity Collaboration Center, noted the importance of securing data in all stages of its lifecycle, in transit, at rest, and in use through the use of encryption, cryptographic keys and secure protocols.
Part III focuses on protecting the confidentiality and integrity of data within a 5G cloud Infrastructure, protecting sensitive information from unauthorized access. Authenticity mechanisms play a key role in data protection by guarding access to the 5G cloud infrastructure data, according to CISA and NSA.
- Part I: Prevent and Detect Lateral Movement: Detect malicious cyber actor activity in 5G clouds and prevent actors from leveraging the compromise of a single cloud resource to compromise the entire network.
- Part II: Securely Isolate Network Resources: Ensure that there is secure isolation among customer resources with emphasis on securing the container stack that supports the running of virtual network functions.
- Part III: Protect Data in Transit, In-Use, and at Rest: Ensure that network and customer data is secured during all phases of the data lifecycle (at-rest, in transit, while being processed, upon destruction).
By J. Sharpe Smith Inside Towers Technology Editor
Reader Interactions