Intelligent CIO Europe Issue 76 | Page 53

FEATURE : 5G that of core services , meaning they can be deployed anywhere within the network , including basestations and customer-premises equipment ( CPE ). Therefore , Edge Computing in a 5G core network context allows for an easy , dynamic , and standardised deployment of security components closer to the Edge .
Outside of the 5G core context , Edge Computing security benefits are not directly related to 5G itself , but are a consequence of the bandwidth and latency benefits it provides . Security functions that previously had to be located on-site due to limited bandwidth to the cloud can now be moved more freely due to fewer bandwidth and latency constraints . Likewise , security functions that used to be limited to operation in the cloud due to the need for high-speed connectivity with other cloud services can now be moved closer to the Edge as bandwidth and latency become less limiting factors .
What are the best practices for enterprises to ensure robust cybersecurity in a 5G environment ?
To ensure robust cybersecurity in a 5G environment , there are some best practices that enterprises should follow . Firstly , it ’ s important to understand that 5G is more than just a faster radio network . Operating a private 5G network can be demanding and requires continuous resources . If that ’ s not possible , relying on existing 5G network operators and using slices to achieve a ‘ private ’ network might be more beneficial .
When operating a private 5G network , it ’ s similar to operating a mid-scale cloud / virtualisation environment with all the necessary components like firewalls , IDS / IPS , backup / restore , faulty hardware , software vulnerabilities , ( virtual ) patching and much more . These challenges are not new when running largescale data centres but also apply to 5G core networks . A 5G network requires consistent maintenance and resources , and failure to maintain the core network properly may lead to vulnerabilities in the core network and jeopardise every service relying on it .
Another best practice related to 5G is device security . Just because devices are on a 5G network does not make them secure by default . This assumption often arises when devices were originally conceived to be operated in air-gapped environments . Especially when old devices are supposed to be moved to 5G , it ’ s a good time to evaluate their security posture and implement appropriate measures . This may include adding an additional layer around older / vulnerable devices or replacing older devices with newer ones with adequate security .
How does the increased speed and connectivity of 5G impact the landscape of cyberthreats and cyberattacks ?
Interestingly , we have not yet seen any direct impact of 5G on cyberattacks . Generally , technologies that increase bandwidth and the number of devices have led to an increase in DDoS attacks . However , this is not specific to 5G .
On the contrary , we would have expected a statistically significant increase in the number of DDoS attacks , given the increased number of connected 5G devices . One possible explanation for why this has not yet happened could be the shared-network nature of 5G . In the past , increases in DDoS attacks and bandwidth originated from an increased number of devices that were connected to privately-owned , non-shared networks like fiber or DSL . For instance , saturating a DSL line with DDoS traffic did not directly affect other users of the same access provider , unless the backbone was saturated .
However , this is different for 5G . All subscribers use a shared medium ( radio ). Therefore , a single device hogging all the ‘ air-time ’ might compromise service quality for other subscribers in the area . Nonetheless , 5G has controls in place to manage air-time to ensure service quality for all subscribers . Thus , a compromised device used for DDoS will run into provider-controlled resource limitations way before ‘ the air ’ is saturated .
To summarise , the benefits of 5G for cyberthreats and cyberattacks are not directly related to 5G . Instead , they are more a consequence of its bandwidth and latency advantages . Moreover , even DDoS , which benefits from bandwidth , is not as prominent as feared . This is probably because the actual control mechanisms in 5G to manage air-time are enforced , and enforced ‘ near ’ the subscriber , e . g ., at the base station , and not only once the traffic hits the backbone . �
Udo Schneider , IoT Security Evangelist , Trend Micro

TO ENSURE ROBUST CYBERSECURITY IN A 5G

ENVIRONMENT , THERE ARE

SOME BEST PRACTICES THAT ENTERPRISES SHOULD FOLLOW .

www . intelligentcio . com INTELLIGENTCIO EUROPE 53