This post is also available in: עברית (Hebrew)
5G systems provide accelerated communications, but they can be a target to cyber-attacks if they are not properly secured.
Major US federal agencies have released the first in a series of reports detailing their expectations for providers of fifth-generation networking equipment and services.
Fifth-generation networking is inherently cloud-based and the recommended mitigations go far beyond the implementation of multifactor authentication to validate user identity.
Addressing cloud providers and mobile operators, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) said, “5G networks should assign unique identities to all elements (and preferably to each interface) that will communicate to other elements in the 5G network,” for example.
The report focuses on preventing and detecting lateral movement so that if one cloud resource is affected the entire network doesn’t become compromised. Lateral movement has been a major concern amid recent attacks, according to nextgov.com.
Overcoming confusion around the shared responsibility model for cloud security has been part of the challenge. “Cloud providers and mobile network operators may share security responsibilities in a manner that requires the operators to take responsibility to secure their tenancy ‘in the cloud,’” as the eport puts it.
Interested in learning more about cloud cybersecurity? Attend INNOTECH 2021 Cyber, HLS, and Innovation Event at Expo Tel Aviv, Nov. 17-18.