ABSTRACT

5G Security Evaluation Process Investigation, Version 1   [open pdf - 2MB]

From the Executive Summary: "Standards for Phases 1 and 2 of fifth generation (5G) cellular network technology are complete and cellular operators now are rolling out 5G services. Federal agencies have used mobile wireless for several years; however, prior to 5G, agencies tended to treat the cellular network solely as a pipe for transport layer communications. With 5G, agencies want to take advantage of different 5G usage scenarios: low-, mid-, and high-band spectrum. The new features, capabilities, and services 5G offers can transform mission and business operations. [...] This study investigates how 5G may introduce unique challenges to the traditional ATO [authorization to operate] process defined in security assessment processes and frameworks such as the National Institute of Standards and Technology's (NIST) Risk Management Framework (RMF)."

Publisher:
Date:
2022-05
Copyright:
Public Domain
Retrieved From:
Cybersecurity and Infrastructure Security Agency: https://www.cisa.gov/
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations