White Paper

Building Better 5G Security: How to harness and adapt IT best practices to protect 5G core networks

As Mobile Network Operators (MNOs) implement standalone 5G core networks, they will need service-based architectures built using IT concepts and protocols like HTTP/2, APIs, and microservices. These 5G networks will rely on data centers at the edge of the network to support responsive connectivity.

This new architecture will give MNOs much greater flexibility and scalability than they have had in the past. This creates business opportunities—MNOs will have the versatility to support many more use cases and applications. It also carries its own burdens—5G will extend the threat landscape and the attack surface, and operators will need to defend their networks from the core to the edge.

This white paper includes:

  • An overview of the key security considerations in each of the four planes that make up a 5G core network: Data Plane, Control Plane, Management Plane, and Application Plane.
  • Tips for ensuring that your 5G core network's service-based architecture is prepared for the challenges that come with high volume, multi-source traffic and broad exposure to the outside world.
  • Techniques, drawn from F5’s extensive expertise in IT and telecoms, for combining IT and telecom best practices to help secure the four planes of your 5G network.

Fill out the form below to receive the white paper.

Complete the form to download the offer and be contacted about F5 products and services. The information you provide will be treated in accordance with the F5 Privacy Notice. Opt out at any time, or contact us to download without opting in.

Thank you. Your White Paper is on the way.

Check your inbox for an email from F5 in the next hour, which will include the download link.