• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Implementing 5G security: 5 service provider priorities & preferences

Takeaways from the 2019 Heavy Reading 5G security survey

1. 5G security use case priorities during commercial launch

Service providers intend to address immediate security challenges inherent with 5G New Radio (NR) and 5G Next-Gen Core (NGC) by prioritizing these security use cases.

  • 1
    Core network signaling security services
    a1
  • 2
    Cloud RAN fronthaul and backhaul security
    a2
  • 3
    Core network configuration services, including slice management
    a3

2. Top 5 service provider security-as-a-service (SECaaS) priorities

A number of key offerings are central to enhancing the CSP 5G SECaaS portfolio.

  • 1
    Application visibility and control for IoT services
    b1
  • 2
    Subscriber (IMSI) threat correlation
    b2
  • 3
    Secure applications on the mobile edge
    b3
  • 4
    Automated cloud-based proactive security for known and unknown attacks
    b4
  • 5
    Device (IMEI) threat correlation
    b5

3. Signaling security crucial to 5G

Current signaling control planes are stable for the most part, but service providers are less confident that this security performance can be duplicated on the 5G control plane.

bar_chart
 
of CSPs agree signaling storms will be more common in 5G NR RAN and 5G NGC
 
of CSPs agree signaling security between inter-operator networks (roaming) will be crucial in 5G

4. Full content inspection a must-have

Full content inspection enhances visibility into RAN and Core and is fast becoming an extremely important “must-have” network security capability to CSPs.

  • 42p
    agree full content inspection is vital in 5G NR RAN
  • 41p
    agree full content inspection is vital in 5G/NGC
  • 32p
    agree full content inspection is vital in roaming
  • 25p
    agree full content inspection is vital in Gi/SGi interface
  • 24p
    agree full content inspection is vital in MEC cloud

5. Threat correlation: a critical requirement

Full content inspection enhances visibility into RAN and Core and is fast becoming an extremely important “must-have” network security capability to CSPs.

  • IMSI
    of CSPs rated subscriber (IMSI) correlation to threats and vulnerabilities a critical security service
    c1
  • IMEI
    of CSPs rated device (IMEI) correlation to threats and vulnerabilities a critical security service
    c2



Although security challenges await at the inaugural phase of the 5G rollout, CSPs have clear insight into strategic security use case priorities that will guarantee success.

WANT TO LEARN MORE?


Source

"Heavy Reading's 2019 5G Security Survey," Heavy Reading, February 2019.

 

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved