5G Cyber Security

  1. Security of Key 5G Technologies
    1. Software-Defined Networking (SDN) Security
      1. Securing the SDN Controller
        1. Controller Authentication and Authorization
          1. Controller Redundancy and Failover
            1. Controller Communication Security
            2. Protection of Control Plane and Data Plane Separation
              1. Control Plane Integrity
                1. Data Plane Isolation
                  1. Flow Table Security
                  2. Northbound and Southbound API Security
                    1. API Access Control
                      1. Secure API Communication Protocols
                        1. API Rate Limiting and Throttling
                        2. SDN-Specific Threats
                          1. Controller Compromise
                            1. Flow Rule Manipulation
                              1. Topology Poisoning
                            2. Network Functions Virtualization (NFV) Security
                              1. Securing the NFV Infrastructure (NFVI)
                                1. Hypervisor Security
                                  1. Virtual Machine (VM) Security
                                    1. Compute Node Security
                                      1. Storage Security
                                        1. Network Virtualization Security
                                        2. Virtualized Network Function (VNF) Security
                                          1. VNF Lifecycle Management Security
                                            1. VNF Image Integrity
                                              1. VNF Configuration Security
                                                1. VNF Performance Monitoring
                                                2. NFV Management and Orchestration (MANO) Security
                                                  1. VNF Manager (VNFM) Security
                                                    1. NFV Orchestrator (NFVO) Security
                                                      1. Virtualized Infrastructure Manager (VIM) Security
                                                      2. Containerization Security in 5G
                                                        1. Securing Container Orchestration
                                                          1. Container Image Scanning and Hardening
                                                            1. Pod and Namespace Isolation
                                                              1. Container Runtime Security
                                                            2. Cloud-Native Network Functions (CNF) Security
                                                              1. Microservices Security
                                                                1. Service Mesh Security
                                                                  1. Inter-Service Communication
                                                                    1. Service Discovery Security
                                                                    2. Container Security Best Practices
                                                                      1. Image Vulnerability Management
                                                                        1. Runtime Protection
                                                                          1. Secrets Management
                                                                          2. Kubernetes Security
                                                                            1. Cluster Hardening
                                                                              1. Role-Based Access Control (RBAC)
                                                                                1. Network Policies
                                                                                  1. Pod Security Standards