5G Security Evaluation Process Investigation, Version 1 [open pdf - 2MB]
From the Executive Summary: "Standards for Phases 1 and 2 of fifth generation (5G) cellular network technology are complete and cellular operators now are rolling out 5G services. Federal agencies have used mobile wireless for several years; however, prior to 5G, agencies tended to treat the cellular network solely as a pipe for transport layer communications. With 5G, agencies want to take advantage of different 5G usage scenarios: low-, mid-, and high-band spectrum. The new features, capabilities, and services 5G offers can transform mission and business operations. [...] This study investigates how 5G may introduce unique challenges to the traditional ATO [authorization to operate] process defined in security assessment processes and frameworks such as the National Institute of Standards and Technology's (NIST) Risk Management Framework (RMF)."
Publisher: | |
Date: | 2022-05 |
Copyright: | Public Domain |
Retrieved From: | Cybersecurity and Infrastructure Security Agency: https://www.cisa.gov/ |
Format: | pdf |
Media Type: | application/pdf |
URL: |