Course Hero Logo

Csps must manage the security and privacy of their

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 6 - 8 out of 10 pages.

CSPs must manage the security andprivacy of their network and services in thismore complex business context. This alsocreates new business opportunitiesas CSPs can manage the security forenterprises’ specific needs.Instead of the current spot-checkapproach to security solutionsmanagement, there is increasing demandfor enhanced security visibility and controlwithadaptive system-wide securitymanagement automationsolutions.These solutions provide a comprehensiveframework for identifying andFigure 5: Mobile network security management architectureorchestrating security risks in terms of themanaged context. They protect the contextand maintain the desired protection levelin the ever-changing security landscape,detecting known and unknown threats.They also constantly identify systemweaknesses, promptly responding to theidentified threats based on risk evaluation.These solutions provide mechanisms foreasily extracting the evidence for securitymeasures to assess the progress towardthe target state. They also give the C-levelthe chance to specify the security targetstate and risk tolerance.Access andnetwork===Apps andcloudSystem-wide securityMSecuritymanagementSecurityfunctionsTrustanchoringMApplicationand cloudinfrastructureMAccess andnetworkMDevicesand GWsMUser IDmanagementM
7Ericsson | Mastering complete 5G network securitySecurity products in 5G coreAs an example of a new security productin 5G, we have developed an embeddedfirewall with a single cloud native function(CNF) that is part of the Ericsson PacketCore Gateway’s user plane (UP). It offersboth UP security and advanced securityfunctions. Today, this is solved withdifferent multi-vendor hardware nodesthat increase latency.This leads to a time-to-mitigationthat is closer to 5G bandwidth demands,such as toward transport equipment with80 percent coverage of DDoS/DoS attacks.This yields no hardware dependencies ororchestration complexities, and createssignificant TCO savings in NetworkFunctions Virtualization Software DefinedNetworks (NFVI SDN), compared todedicated security solutions. A singleCNF solution will scale in and outsimultaneously with the UP, meetingspecific 5G use case requirements,including edge and deep edge, aswell as small-scale deployments.Security frameworks fordeployment and operationsThere are no telecom-specific securityframeworks, so many CSPs are looking atgeneric cybersecurity frameworks like theNIST CSF and Center for Internet Security(CIS) controls when designing theirapproach and processes around securityoperations. These frameworks guideand inform on managing cybersecurityrisks specific to the use of technology incritical infrastructure.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 10 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
Ericsson, 5G network security

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture