Front Page: NCSC-FI
Front Page: NCSC-FI
Menu

The current 5G standardisation focuses on the security of the protocols and application interfaces between 5G functions. However, there is only little publicly available information on securely owning and operating a 5G network, including the best possible way of protecting the underlying ICT platforms that run the 5G network.

5G network architectures and use cases come in various forms. Like many applications, mobile networks have also moved towards a software-based architecture, allowing a high scale of decentralisation. It means they can be protected with the same building blocks as many other microservice-oriented environments.

The Traficom 5G Security Architecture provides high-level guidelines and checklists to support building and operating a 5G network. It aims to help network owners in designing, maintaining and auditing a 5G network that is based on efficient and effective security mechanisms.

The Traficom 5G Security Architecture complements the current 5G standards and mainly focuses on a cloud- based 5G network implementation. By following the principles defined in the Traficom 5G Security Architecture and utilising the existing tools available in the modern cloud security technologies, the network owners can efficiently maintain the security and trust in the services their networks provide.