Building better 5G security
Building Better 5G Security
As Mobile Network Operators (MNOs) implement standalone 5G core networks, they’ll implement service-based architectures that use IT concepts and protocols like HTTP/2, APIs, and microservices, relying on data centers at the edge of the network to support responsive connectivity.
This gives MNOs greater flexibility and scalability than they have had in the past, giving them the versatility they need to support many more use cases and applications. 5G also extends the threat landscape and the attack surface that operators need to defend.
In this white paper, get an overview of the key security considerations in each of the 4 planes that make up a 5G core network.