Archived Content
In an effort to keep CISA.gov current, the archive contains outdated information that may not reflect current policy or programs.Security Guidance for 5G Cloud Infrastructures Part I: Prevent and Detect Lateral Movement
- Discusses the importance of detecting malicious cyber actor activity in 5G clouds and prevent actors from leveraging the compromise of a single cloud resource to compromise the entire network.
Security Guidance for 5G Cloud Infrastructures Part II: Securely Isolate Network Resources
- Discusses practices to ensure that there is secure isolation among customer resources with emphasis on securing the container stack that supports the running of virtual network functions.
Security Guidance for 5G Cloud Infrastructures Part III: Data Protection
- Informs reader about methods to ensure that network and customer data is secured during all phases of the data lifecycle (at-rest, in transit, while being processed, upon destruction).
Security Guidance for 5G Cloud Infrastructures Part IV: Ensure Integrity of Cloud Infrastructure
- Emphasizes the importance of ensuring that 5G cloud resources (e.g., container images, templates, configuration) are not modified without authorization.