版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、CONTENTSEXECUTIVE SUMMAR Y HYPERLINK l _bookmark0 5G is a Journey and Demands Changes to Security 4 HYPERLINK l _bookmark1 INTR ODUCTION HYPERLINK l _bookmark1 5G Enables Innovation at the Speed of Business 6SECURING HYPERLINK l _bookmark2 5G HYPERLINK l _bookmark2 Securing a 5G-Enabled Edge Computi
2、ng World 12 HYPERLINK l _bookmark3 NEXT S TEP S HYPERLINK l _bookmark3 One Way to Bolster Courage is to Prepare 26 HYPERLINK l _bookmark4 Key Takeaways 30 HYPERLINK l _bookmark5 Conclusion 31 HYPERLINK l _bookmark6 Appendices 32E X E C U T I V E5G IS A JOURNEY AND DEMANDS CHANGES TO SECURITY5G will
3、change where and how we harness compute power and promote unforeseen product and service innovation. Once5G attains critical mass with a robust ecosystem, 5G will touchnearly every organization, promising new revenue potential across a myriad of industries. 5G will expand usage of edge computing, wh
4、ich locates network functions, applications, compute, and storage closer to end users, creating near real-time performance along with high bandwidth and low latency.STANDALONE 5G IS MORE SECUREStandalone 5G is more secure than any previous network generation. While the promise of 5G is universally r
5、ecognized, the path to implementing 5G is unique toAnd then theres cloud. Cloud rapidly multiplies private and public 5G architectural options, and it is believed that 5G will create a wide range of brand-new applications and services in cloud computing. Which architecture anorganization chooses wil
6、l depend on the organizations industry, speed, and latency requirements and how each organizationFIGURE 1COMPANIES ARE ADOPTING 5G TO REMAIN COMPETITIVE.Q. What is your primary concern for your organizations 5G implementation today and in 1218 months?How 5G is architected will determine how security
7、 is designed.S U M M A R Y% of respondentsevery organization. Enterprises should closely examine existing company networks and security models and rethink accordingly. Each organization will ultimately create a footprint in 5G and edge design that is unique and purpose built to that organization. 5G
8、 is not aone size fits all technology. How 5G is architected will determine how security is designed. Organizations can choose from an isolated on-premises private 5G network, independent of the publicN= 947operator 5G network, or one that sharesA. Top use case now and in 12-18 months is to remain c
9、ompetitive:57.7%55.8%mobile operator 5G network resources. They can choose multi-tenant public options delivered as a service, with network slicing and virtualization to provide a single-tenant experience.NOWBASE Respondents who indicated their organization is researching/ implementing/completing 5G
10、 deploymentIN 1218 MONTHS SOURCE IDCs Custom Survey, 5G Cybersecurity Impact Survey, October 2020desires to control access to data and applications. It has been said that data is the new oil, and it is an apt view to keep in mind as the market moves toward 5G universality. How data is consumed, inpu
11、t, accessed (and by whom), stored, and transported will influence an enterprises unique footprint for protection.In addition to technology considerations, the move to 5G is highly influenced by the business, which means that business and IT leaders needto collaborate on 5G strategies and implementat
12、ion. Digital transformation is reshaping how organizations think about technology investments. The collaboration between IT and business leaders is key to a business ability to grow and remain competitive in the nextseveral years. In fact, according to a global survey conducted by AT&T Cybersecurity
13、 with IDC during September 2020, 80% of respondents are adopting 5G to remain competitive in their industry, to create new IT projects, and to establish new business models (see Figure 1). Thisis a drastic shift in how technology is being adopted, introduced, and used for competitive advantage.Among
14、 some organizations, the implementation of 5G will be evolutionary as they navigate the transition from 4G to 5G and all the security issues that shift implies.5G PROPELS A REVOLUTION IN COMPUTE HISTORYDigital transformation, cloud adoption, and distributed assets already existin todays modern hyper
15、connected enterprise, but this evolution in compute did not happen overnight. Similarly,the blending of 5G and edge compute wont happen immediately. And with this shift, enterprise businesses will want to focus on how these revolutionary new technologies are secured.Some innovative organizations are
16、 already embracing 5G and edgecomputing. These leaders are designing security unique to their 5G model that will help them today and as 5G and edge computing gain ubiquity. Standalone 5G is part of the overall ecosystem that is emerging but not yet fully realized, which means that organizations toda
17、y will need to start implementing 5G in conjunction with 4G. Implementation is evolving as organizations explore the various use cases and navigate the security issues inherent in a super-connected world.To meet the business demand for innovation that can come with 5G, forward-looking organizations
18、share that they are increasing adoption of software- driven service functions like software- defined networking (SDN), security virtualization, self-healing, and automated networks. And many have implementeda Zero Trust approach in their network for better enterprise visibility, reduced IT complexit
19、y, data protection, and support for cloud migration.Security basics dont go away but rather get elevated in importance. Organizations cannot firewall their way around the distributed 5G edge though firewalls and network segmentation are still relevant. Data security, identity and access management,
20、threat intelligence, and visibility are more important than ever in finding threats and shutting them down commensurate with the near real- time promise of 5G.ENTERPRISE SECURITY APPROACHES DEPEND ON THE BUILDOUT OF 5G AND ENTERPRISE RISK APPETITEThe transition to 5G is unfolding with implementation
21、 requiring strategic planning and long-term investment. Organizations should be proactive today, act with purpose, and take action. Many trendsetters have begun their journeyto the edge and 5G, setting the pace and cadence for the future of innovation. As additional enterprises join the journey to 5
22、G, those organizations should seek to utilize existing security technologies in building a security road map.This report highlights the need for a benefit-to-risk evaluation of data security and access management concerns juxtaposed against enhanced speed and reduced latency benefits. This evaluatio
23、n requires a review of existing security programs, policies, and controls.Other key areas useful for the enterprise to consider as it transitions to 5G are:Assess the organizations risk appetite.Consider asset and network topology.Determine the organizations innovation posture. Evaluate whether the
24、organization is a leader or laggard in a software-defined world with the ability to enable a malleable 5G security architecture.Identify areas of security in need of immediate attention. Think about which currently deployed security assets can be utilized today that will make the journey to 5G with
25、the business more efficient.Align 5G technology and digital transformation strategy with an enterprise-wide strategy. Coalesce a strategic, cross-functional tiger team to steer the initiative.Envision the end state. Consider segmentation as a first step to Zero Trust or choose an initial focus on cr
26、eating platform visibility of threat intelligence, analytics, and response tools across existing assets.I N T R O D U C T I O N5G ENABLES INNOVATION AT THE SPEED OFBUSINESS5GIS ENABLING innovations in smart cities, fleet management, supply chain, and IT automation by connecting billions of low-power
27、 internet of things (IoT) devices to the cellular network. By taking advantage of low latency, high speed, and ultra-high reliability, enterprises can one day actualize mission-critical and, in some cases, life-critical applications such as smart grids, remote surgery, and intelligent transportation
28、 systems. Unlike previous technology rollouts,5G is finding an enthusiastic audience of line-of-business (LOB) executives that have seen the promise of IoT and edge-basedapplications in a 4G world and are pushing for the rapid adoption of 5G to realize all the speed and latency promises that 5G enab
29、les. When LOB executives are funding the technology and security improvements needed to realize the safe entry of these 5G use cases, 5G can be called a revolutionary, game-changing technology. Yet, among some organizations, the implementation of 5G will be evolutionary as they navigate the transiti
30、on from 4G to 5G and all the security issues that shift implies.The explosion of 5G-enabled hardware and the apps hosted on those devices bring about yet another elevated era of highly organized,commercialized, and potentially state-sponsored threat actors. These groups are ready and willing to dest
31、roy, steal, or hinder the data that these5G-enabled devices utilize to further their criminal desires. Unlike prior improvements to the radio spectrum, the innovations that 5G brings mean that the vast amounts of data that is being created, hosted, and transmitted could potentially be probed by cybe
32、rcriminals using the very same technology that allowed this data to move in the first place.Combatting security vulnerabilities at the speed of 5G will require continuous and adaptive scanning and monitoring. But more thanthat, organizations will need to embrace new strategies like Zero Trust as wel
33、l as advanced automation and analytics, artificial intelligence (AI), and machine learning (ML). Ingestion of new telemetry sources, some of which cannot fully be understood yet like industrial operational technology and IoT, will need to be correlated and contextualized to provide actionable intell
34、igence to the security operations team.A platform approach is key here. Organizations will need to stop new threats and potential spread without sacrificing user experience to maintain the speed and continuity of business. Speed creates new security concerns. The5G-enabled edge applications that cra
35、ve the low-latency possibilities of 5G also bring along some familiar headaches for the security and DevOps teams to tackle. The move of data to the edge has also seen the rise of supporting technologies and applications to process this data before it moves on to its final destination in the cloud.C
36、onsider for a moment the unique opportunities that having a containerized edge database can offer. While processing data closer to where it is collected allows for quicker decision making, it does not negate the need for protection of the data. To the contrary, processing data in this way requires e
37、xtra oversight because data is being collected and processed to support critical functions.For example, cyber-resilience and software engineering principles that incorporate security first will be critical as software engineers develop modern cloud apps.FIGURE 2WEB-BASED APP ATTACKS PRESENT A CHALLE
38、NGE TO ADDRESS.Q. In your opinion, when implementing 5G, how much of a challenge are web-based application attacks?Note: Scores are based on a scale of 15, where 1 = not achallenge at all and 5 = significant challenge.NOT A CHALLENGE SIGNIFICANT CHALLENGE 123455.2%11.6%28.4%34.3%20.5%BASE N= 947Resp
39、ondents who indicated their organization is researching/implementing/ completing 5G deploymentSOURCE IDCs Custom Survey, 5G Cybersecurity Impact Survey, October 202083.2% of respondents believe attacks on web-based applications will be a challenge83.2%Figure 2 shows that more than 54% of survey resp
40、ondents recognize this,stating that web application attacks are a security challenge when implementing 5G.Moving the data processing closer to the use case application certainly allows for near real-time, AI-enabled processing and decision making, but its not without drawbacks. Along with it comes t
41、he possibility of older-style threats such as SQL injection attacks, unencrypted data travelling along private networks that may or may not have malware-sniffing apps looking at the data, and other yet- to-be identified security challenges.In the near term, 4G will continue to exist. In fact, during
42、 the marketstransition to 5G, traffic will move between 4G and 5G via roaming exchanges that have been established for 4G. Network operators provide that infrastructure and roaming interfaces at the signaling layer, and they are protected. The enterprise must be responsible for the data layer. A sha
43、red security model like that in public cloud is needed.Yes, 5G is revolutionary, and businesses are banking on the capabilities that 5G promises. However, they concurrently recognize the need to team with the right service providers to help usher in the capabilities that 5G and edge computing have t
44、he potential to deliver in a safe, highly secure, and resilient way.WHAT IS SECURE 5G AND WHY DOES IT MATTER?With standalone 5G and mobile network rollouts accelerating globally, the impact to the enterprise is only just beginning. 5G is not simply a new radio upgrade or more advanced smartphone. 5G
45、 implies an adjacent investment in cloud and software-defined networks, both at the core layer and at the edge of the cellularnetwork. Said differently, 5G will ultimately be defined as a new globally distributed mobile platform able to support a whole array of enterprise-grade and consumer devices.
46、 5G will radically transform and empower operators to efficiently drive new market opportunities, all from a single 5G network platform.Enhances data privacyIn fact, nearly 54% of our survey respondents who completed 5G implementations state that multi-access edge computing (MEC) enables near real-
47、time cloud services at the edge and 52% believe MEC enhances data managementFIGURE 3EDGE COMPUTING SPEEDS SERVICES AND ENHANCES DATA MANAGEMENT.Q. Which definitions describe your understanding ofEnables near real-time cloud services at the edgecellular edge and MEC?% of respondentsEnhances data mana
48、gementSupports latency-sensitive applications46.9Enables quick data analysis and action on insights38.5Reduces data security attack surface33.653.952.4(see Figure 3).When it comes to securing the cellular edge or MEC, 31% of respondents think that 5G is secure out of the box fromthe network provider
49、 with no additional0%N= How 5G and the edge are secured will ultimately come down to an organizations unique 5G and edge use case.948security required and another 26% have no strategic plan to address the security of 5G. This is in direct opposition to the 56% of respondents who understand that 5G w
50、ill require a change to their security approach to accommodate network changes. In addition, nearly half of the survey respondents believe that 5G poses an elevated security threat, partly because there are more vectors through which adversaries can attack.These diametrically opposing beliefs sum up
51、 the conundrum facing enterprises as they transition enterprise network architecture, including security infrastructure, to incorporate 5G. Nearly half of the survey respondents think 5G requires no change to their security infrastructure, while the other half understands that this shift demands a r
52、ework of the security posture to keep the business protected. And, as stated previously, how 5G and the edge are secured will ultimately come down toan organizations unique 5G and edge use case and site type, including thearchitectures and which data is consumed, input, accessed, stored, and transpo
53、rted (see Figure 4).21.5BASE Respondents who are primary decision makers/part of team/influencer role regarding the adoption of cellular edge and/or multi-access edge computing“Dont know” = 2.0%50%SOURCE IDCs Custom Survey, 5G Cybersecurity Impact Survey, October 2020Carriers plan to offer MEC archi
54、tectures that can be used to create and distribute network software and services to enterprise customers. The standalone5G core network is designed as a cloud-native solution, which means that specific network functions can be deployed in a cloud environment, whether those functions reside in a regi
55、onal cloud datacenter or in the MEC appliance on premises. Deploying some of these functions, such as theUser Plane Function (UPF), can provide significant gain in network latency and security especially data security as organizations can keep specific data cuts on premises. The dual use of 5G and M
56、EC can be a force multiplier for any organization looking to get the most out of its 5G investments both in performance and security.Whether deploying applications from a central cloud, an edge cloud, or anon-premises MEC or a combination enterprises need to take a proactiveapproach in defining thei
57、r use cases and application performance needs from the outset. The 5G/MEC architecture should align to use cases, applications, and site type.While broader 5G awareness will continue to gain traction, market understanding of how, why, and the best way to jointly deploy 5G and MEC also remains in que
58、stion, with use cases specific to the enterprise largelyinfluencing design decisions. However, it is widely recognized that the combination of 5G and MEC can help yield significant gains in latency, particularly when standalone 5G is abstracted and deployed alongside MEC.Among the top 5G use cases I
59、DC sees are:The need to improve deployments in IoT, industrial IoT, and OTEnhancing data privacyThe desire for broader network coverageWanting to accelerate digital transformation projectsThe 5G/MEC architecture should align to theuse cases, applications, and site type.FIGURE 45G AND THE EDGE WILL I
60、MPACT HOW YOU APPROACH SECURITY.Q. Please rank the top 3 according to your perception of their impact on yourorganizations security architecture due to the inclusion/adoption of 5G (overall rank).% of respondentsLOWSECURITY IMPACT HIGH 5G is secure out of the box from the network provider, and no ad
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度餐飲業(yè)SaaS運(yùn)營管理軟件銷售合同3篇
- 2024版物流倉儲(chǔ)中心租賃及運(yùn)營管理合同
- 2025年度銷售合同違約責(zé)任補(bǔ)充協(xié)議
- 年度回轉(zhuǎn)窯式垃圾焚燒爐市場分析及競爭策略分析報(bào)告
- 二零二五版城市更新項(xiàng)目借款合同規(guī)范2篇
- 2024-2025學(xué)年高中歷史專題七近代以來科學(xué)技術(shù)的輝煌7.2追尋生命的起源同步課時(shí)作業(yè)含解析人民版必修3
- 二零二四年倉儲(chǔ)物流園建設(shè)項(xiàng)目融資合同
- 二零二五年度酒店客房安全監(jiān)控服務(wù)合同3篇
- 2025年度林業(yè)生態(tài)補(bǔ)償項(xiàng)目評(píng)估合同4篇
- 2025版茅臺(tái)酒經(jīng)銷商培訓(xùn)及銷售技能提升合同3篇
- GB/T 7588.2-2020電梯制造與安裝安全規(guī)范第2部分:電梯部件的設(shè)計(jì)原則、計(jì)算和檢驗(yàn)
- GB/T 14600-2009電子工業(yè)用氣體氧化亞氮
- 小學(xué)道德與法治學(xué)科高級(jí)(一級(jí))教師職稱考試試題(有答案)
- 申請使用物業(yè)專項(xiàng)維修資金征求業(yè)主意見表
- 河北省承德市各縣區(qū)鄉(xiāng)鎮(zhèn)行政村村莊村名居民村民委員會(huì)明細(xì)
- 實(shí)用性閱讀與交流任務(wù)群設(shè)計(jì)思路與教學(xué)建議
- 應(yīng)急柜檢查表
- 通風(fēng)設(shè)施標(biāo)準(zhǔn)
- 酒店市場營銷教案
- 房屋買賣合同簡單范本 房屋買賣合同簡易范本
- 環(huán)保有限公司營銷策劃方案
評(píng)論
0/150
提交評(píng)論