5G networks and beyond are expected to evolve in dynamic and programmable virtualized environments to fulfill the different needs of the emerging use cases of mobile networks. Furthermore, this evolution is set against the background of a new security threat landscape. Thus, these are calling for an evolved approach for security along with security assurance mechanisms providing the confidence that the intended security policies are effectively enforced. To achieve this, an automated end-to-end full stack security compliance approach in network function virtualization can provide the service provider confidence that security and compliance are ensured.
This white paper investigates the main challenges related to the security compliance in network function virtualization for 5G and beyond. It recommends a full stack end-to-end automated security compliance approach in network function virtualization based on five key features supporting the evolution of operational security assurance in addition to the product security assurance.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Ericsson |
Published: | April 25, 2022 |
License: | Copyrighted |
Copyright: | © Telefonaktiebolaget LM Ericsson 1994-2022 |