Useful Links
Computer Science
Computer Networking
Wireless Communication
5G Cyber Security
1. Introduction to 5G Cyber Security
2. 5G System Architecture and Security Domains
3. Security of Key 5G Technologies
4. Identity, Authentication, and Authorization
5. Network Slicing Security
6. Securing 5G Use Cases
7. 5G Security Operations and Management
8. 5G Security Standards, Regulation, and Governance
Network Slicing Security
Principles of Network Slice Isolation
Control Plane Isolation
Logical Separation of Control Functions
Access Control Between Slices
Control Message Filtering
User Plane Isolation
Data Path Separation
Traffic Filtering and Policing
Quality of Service Enforcement
Management Plane Isolation
Separate Management Interfaces
Role-Based Access for Slice Management
Configuration Isolation
Slice-Specific Security
Custom Security Policies per Slice
Policy Definition and Enforcement
Compliance Monitoring
Security Level Agreements
Slice-Specific Authentication and Authorization
Unique Credentials per Slice
Slice-Level Access Control
Multi-Tenant Identity Management
Security Service Chaining
Slice-Specific Security Functions
Security Function Orchestration
Dynamic Security Policy Adaptation
Inter-Slice and Intra-Slice Security
Preventing Lateral Movement Between Slices
Segmentation Controls
Monitoring for Cross-Slice Activity
Slice Boundary Enforcement
Securing Communication Within a Slice
Encryption of Intra-Slice Traffic
Integrity Protection for Slice Data
Slice-Internal Access Control
Slice Resource Protection
Resource Quota Enforcement
Performance Isolation
Denial of Service Prevention
Network Slice Lifecycle Security
Secure Slice Creation and Instantiation
Authentication of Slice Requests
Validation of Slice Configuration
Secure Resource Allocation
Secure Slice Modification and Termination
Change Management Controls
Secure Decommissioning of Resources
Data Sanitization
Slice Template Security
Template Integrity Protection
Template Access Control
Version Management
Security of the Network Slice Selection Function (NSSF)
NSSF Authentication and Authorization
Secure NSSF Registration
Access Control for Slice Selection
Protection of Slice Selection Signaling
Signaling Message Integrity
Slice Selection Privacy
Slice Selection Policy Security
Policy Integrity Protection
Policy Update Security
Previous
4. Identity, Authentication, and Authorization
Go to top
Next
6. Securing 5G Use Cases