- Advertisement -spot_img
Wednesday, September 28, 2022

5G security must be ensured through the Zero Trust secure access model

5G accelerates digital transformation because of its performance, efficiency and latency, but it also provides opportunities for cybercrime. That’s a message from cyber security firm SonicWall, which warns that the transfer of applications and network functions to the cloud, along with network cuts, increases the attack surface and, as a result, creates new entry points for cybercriminals.

According to the company, security teams have a big task ahead of them when it comes to protecting their networks for 5G, which includes enforcing the right policies for users, devices and applications. Therefore, they should adopt models such as zero-trust network access (ZTNA), which allows configuring fine-grained, low-privilege access with authentication and authorization of every user and device across the network, reducing the potential for criminals to infiltrate. substantially reduced. Network.

For SonicWall, ZTNA’s removal of implicit trust and insisting on the need for verification of each access request is the secure new way to go because a zero-trust framework ensures full visibility and control of 5G infrastructure, including connecting devices. , network interfaces, applications and workloads. As they point out, ZTNA is flexible enough to adapt to a variety of systems. “The 5G zero-trust architecture is end-to-end, consisting of the access network, transport, and core, and consists of multiple layers. Security of the logical elements of the zero-trust architecture (as defined in NIST SP 800-207) Establishes trust in user and device identity, improves end-to-end visibility, and controls all devices accessing the network using any cloud deployment model.”

By adopting zero-trust principles for 5G security, organizations can improve security from several angles:

— least privilege: Combined with the context allows precise access to the functions of 5G networks.

– Identity Verification: Defines the identity to include all users and devices that require access to protected resources.

– Network Segmentation: Take advantage of network segmentation to protect sensitive data and critical applications, preventing any lateral movement.

– Security Politics: Implement precise 5G security policies for fine-grained control over data and applications.

– Continuous Verification: Eliminates implicit trust and continually validates every step of digital interaction.

– Protecting Cloud Native Network Function (CNF) workloads: Protects CNFs running in a public or private cloud during its continuous integration/continuous deployment lifecycle.

– Monitoring and Auditing: Monitors all interactions between users, devices and network functions on multiple layers.

According to the firm’s experts, the bottom line is that ZTNA for 5G presents an opportunity for organizations to rethink the way they secure users, applications and infrastructure, and ensure they are scalable and scalable for the modern cloud. be durable. On SDN and open environments, supporting an easier and more efficient path to digital transformation, which is approaching like a tsunami for all organizations.

World Nation News Desk
World Nation News Deskhttps://worldnationnews.com/
World Nation News is a digital news portal website. Which provides important and latest breaking news updates to our audience in an effective and efficient ways, like world’s top stories, entertainment, sports, technology and much more news.
Latest news
Related news
- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here