5G is the next next quantum leap in the evolution of mobile and wireless communication, offering unprecedented speed, capacity and capabilities. The 5G world is one in which networks will serve trillions of connected things, and every individual will be supported by hundreds of connected devices.
Alongside these opportunities, 5G’s combination of new capabilities and virtualisation also brings new threats. 5G has significantly more network end-points that can be exposed to cyber criminals, and 5G virtualisation means the whole connection is based on software, which is inherently hackable.
A vital first step toward protecting 5G networks against cyber threats is to understand where the vulnerabilities arise.
This means adopting a process based on identifying, profiling and assessing the health of each component before it is permitted to connect to the network, and—if appropriate—limiting access to the 5G service based on this assessment. It’s what we call a zero-trust approach, and it will help organisations across the 5G ecosystem strike the right balance between business risk and 5G security.
In this paper we suggest that a zero-trust approach, combined with company leaders focusing on three key pillars—trust, resilience and enablement—form the basis of a sound cyber strategy, and will ensure that companies can roll out 5G quickly and safely.
Peter Durojaiye
EMEA Leader for Cyber Impact Center Director, Cybersecurity & Privacy, PwC Hungary