{"id":96660,"date":"2019-01-28T06:00:04","date_gmt":"2019-01-28T14:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=96660"},"modified":"2019-05-06T15:36:22","modified_gmt":"2019-05-06T22:36:22","slug":"what-does-it-mean-to-be-5g-ready","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/01\/what-does-it-mean-to-be-5g-ready\/","title":{"rendered":"What Does It Mean to Be \u201c5G-Ready\u201d?"},"content":{"rendered":"<p><em>With regard to security, it\u2019s critical.<\/em><\/p>\n<p>We keep hearing about products and technologies that are \u201c5G-ready.\u201d But what does that mean? Mobile Service Providers will undoubtedly require 5G equipment that is scalable in terms of capacity and throughput, but does that alone mean the networks will be 5G-ready?<\/p>\n<p>In late February at Mobile World Congress 2019, we can certainly expect to see demos of 5G core networks, network slicing, New Radios (5G-NR), and other 5G-ready network components. But what about security? Mobile networks will not be 5G-ready unless the necessary security capabilities are baked into these networks by design.<\/p>\n<p>Tom Wheeler, former chairman of the Federal Communications Commission, accurately points out in a recent <a href=\"https:\/\/www.nytimes.com\/2019\/01\/21\/opinion\/5g-cybersecurity-china.html\" rel=\"nofollow,noopener\" ><strong>NY Times op-ed<\/strong><\/a><strong>:\u00a0 \u201c<\/strong><em>Leadership in 5G technology is not just about building a network, but also about whether that network will be secure enough for the innovations it promises.\u201d<\/em>\u00a0 Wheeler goes on to state, <em>\u201cThe simple fact is that our wireless networks are not as secure as they could be because they weren\u2019t designed to withstand the kinds of cyberattacks that are now common. This isn\u2019t the fault of the companies that built the networks, but a reflection that when the standards for the current fourth-generation (4G) technology were set years ago, cyberattacks were not a front-and-center concern.\u201d<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>A New Approach for Security Is Needed<\/strong><\/p>\n<p>With 5G, everything changes. Critical applications like remote healthcare, remote monitoring and control over our power grids, and self-driving automobiles will all rely on 5G technologies. The networks will become more distributed, and many critical applications will be hosted at the edge of 5G networks and across edge clouds. Opportunities for threat actors will emerge if they are allowed to go unchecked, as they will use automation to wage multi-stage attacks and find the least secure portions of the 5G networks to exploit. For mobile networks to be 5G-ready, a new approach for security is required.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-500x252.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:50.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-96661 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-500x252.png\" alt=\"\" width=\"500\" height=\"252\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-500x252.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-230x116.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-768x387.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-510x257.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-79x40.png 79w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-596x300.png 596w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach.png 822w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Even though standards and network architectures are still being defined, mobile operators not only have the opportunity to build the right set of security capabilities into these network evolutions by design, they have no choice but to do it. Today\u2019s cyberattacks are already capable of evading mobile networks, and their continued evolution is indeed a front-and-center concern.<\/p>\n<p>To truly be 5G-ready, mobile operators need to adopt a robust and comprehensive end-to-end security strategy with:<\/p>\n<ul>\n<li>Complete visibility, inspection, and controls that are applied across all layers of the network \u2013 application, signaling, and data planes.<\/li>\n<li>Cloud-based threat analytics \u2013 powered by machine learning (ML) \u2013 that are leveraged across the different mobile network locations and environments.<\/li>\n<li>A cloud-ready platform that ensures consistent security enforcement across all network locations.<\/li>\n<\/ul>\n<p>With these necessary security capabilities in place, mobile networks will be able to evolve as 5G-ready with a data-driven threat prevention posture that provides contextual security outcomes. Mobile operators will be able to automate processes to proactively identify infected devices and prevent device-initiated attacks. They will be able to capture advanced multi-stage attacks that will naturally look to leverage different signaling and control layers across the 5G networks. They will be able to automatically identify advanced threats, correlate these with specific devices\/users, and isolate\/remove infected devices from their networks. They will also be able to differentiate themselves as \u201csecure business enablers.\u201d<\/p>\n<p>These 5G networks are set to become the backbone of transformational services that will positively alter our lives for generations to come. Whether it\u2019s autonomous vehicles, remote surgery, smart utilities, or the multitude of other technological advancements that will enable us to benefit from 5G, as Wheeler states: \u201c<strong><em>Innovators, investors and users need confidence in the network\u2019s cybersecurity if its much-heralded promise is to be realized.\u201d<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paloaltonetworks.jifflenow.com\/mwc2019\/external_request\/32b88a\" rel=\"nofollow,noopener\" >Meet with us at Mobile World Congress for an exclusive, executive 5G security briefing<\/a><\/p>\n<p>Email us at:\u00a0 <a href=\"mailto:mwc@paloaltonetworks.com\">mwc@paloaltonetworks.com<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>References:<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks: <a href=\"https:\/\/www.paloaltonetworks.com\/content\/pan\/en_US\/resources\/whitepapers\/5g-security.html\">A New Approach for 5G Security<\/a><\/p>\n<p><a href=\"https:\/\/vimeo.com\/306764087\" rel=\"nofollow,noopener\" >Lee Klarich Interview on 5G Cyber Security<\/a><\/p>\n<p><a href=\"https:\/\/www.lightreading.com\/webinar.asp?webinar_id=1317\" rel=\"nofollow,noopener\" >Webinar:\u00a0 5G Security:\u00a0 A New Approach is Needed<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With regard to security, it\u2019s critical. We keep hearing about products and technologies that are \u201c5G-ready.\u201d But what does that mean? Mobile Service Providers will undoubtedly require 5G equipment that is scalable &hellip;<\/p>\n","protected":false},"author":293,"featured_media":28659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6765,1097],"tags":[6668,3486,5491],"coauthors":[3073],"class_list":["post-96660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-secure-the-enterprise","category-service-providers","tag-5g-security","tag-mobile-network-operators","tag-mobile-network-security","net_sec_category-5g-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/05\/blog-service-providers-banner-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=96660"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96660\/revisions"}],"predecessor-version":[{"id":96737,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96660\/revisions\/96737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/28659"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=96660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=96660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=96660"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=96660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}