This four-part series builds on the ESF Potential Threat Vectors to 5G Infrastructure white paper, released in May 2021, which focused specifically on threats, vulnerabilities, and mitigations that apply to the deployment of 5G cloud infrastructures. Although all 5G network stakeholders can benefit from this guidance, the recommendations are intended for service providers and system integrators that build and configure 5G cloud infrastructures. Read the fourth and final part of this series now.
An attacker can use cloud/virtual networking to move through a network after initial compromise. Configurations to prevent and detect lateral movements is only one aspect of hardening a 5G cloud infrastructure. The detection and mitigation of lateral movement attempts within a 5G cloud system is a shared responsibility among 5G cloud providers, network operators, mobile network operators and customers.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | National Security Agency (NSA) |
Published: | May 20, 2021 |
License: | Public Domain |