Security is a major consideration in network slicing, because it allows mobile network operators to create specific virtual networks that cater to different clients and use cases, according to a paper assessing the risks of a 5G standalone network slicing.
“A 5G infrastructure necessitates that the confidentiality, integrity, and availability triad of each network slice must be ensured,” the paper said.
“5G Network Slicing: Security Considerations for Design, Deployment, and Maintenance” was published recently by a partnership of Enduring Security Framework (ESF), the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA). The paper offers best practices for “federal departments and agencies (inclusive of the DoD)” to design, deploy, operate, and maintain “secure network slicing” across private, hybrid, and public networks.
The paper introduces 5G stakeholders to the benefits associated with network slicing, assesses 5G network slicing threat vectors, presents guidance in line with industry best practices, and identifies perceived risks and management strategies that may address those risks.
“Although all 5G network stakeholders can benefit from this guidance, the threat and security considerations discussed in this assessment are intended for mobile service providers, hardware manufacturers, software developers, and system integrators that design, deploy, operate, or maintain 5G networks,” the paper said. “This document aims to foster communication among these parties, and between them and network slice customers.”
Reader Interactions