{"id":1117247,"date":"2023-08-22T21:57:45","date_gmt":"2023-08-23T01:57:45","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/5g-players-tout-progress-toward-zta-but-more-work-ahead-light-reading\/"},"modified":"2023-08-22T21:57:45","modified_gmt":"2023-08-23T01:57:45","slug":"5g-players-tout-progress-toward-zta-but-more-work-ahead-light-reading","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/5g-players-tout-progress-toward-zta-but-more-work-ahead-light-reading\/","title":{"rendered":"5G players tout progress toward ZTA, but more work ahead &#8211; Light Reading"},"content":{"rendered":"<p><p>    Security experts agree that zero trust architecture (ZTA) is    critical to securing communications networks. While many    companies argue that they have made progress adding the    technology into their 5G operations, a new report from ATIS    says more needs to be done.  <\/p>\n<p>    \"5G is the most secure generation of standardized mobile    technology available commercially today,\" the trade association    wrote in     a 48-page report. \"5G is specified with many features of a    ZTA but it does not embody a full implementation of a ZTA.\"  <\/p>\n<p>    ATIS is a North American partner to 3GPP, the     global standards body for 5G. ATIS argued that 3GPP needs    to look at ways to insert ZTA into 5G devices and radio access    networks (RANs), rather than just the 5G core.  <\/p>\n<p>    That's one of the many action items outlined in its report,    which is noteworthy considering the group has previously    addressed issues including     secure supply chains, robocalls and hearing aid    compatibility for cellphones. It launched its Next G Alliance    effort  targeting 6G      in 2020.  <\/p>\n<p>    Implementing zero trust  <\/p>\n<p>    A zero-trust network architecture is based on the notion that    each network element needs to be individually protected from    attack.  <\/p>\n<p>    \"By starting from the assumption that the attacker is already    inside the network, the zero trust model enhances security by    both blocking unauthorized access to network resources and    preventing internal lateral movement by an attacker,\" 5G    equipment vendor Ericsson     wrote two years ago.  <\/p>\n<p>      (Source: NicoElNino\/Alamy      Stock Photo)    <\/p>\n<p>    As ATIS notes in its report, zero trust is also the security    framework recommended by most US government agencies. For    example, the US Cybersecurity and Infrastructure Security    Agency (CISA) and the National Security Agency (NSA) both    support the ZTA implementation from the US National Institute    of Standards and Technology (NIST) for 5G.  <\/p>\n<p>    But ATIS notes that this is no small task. \"Creating a ZTA for    5G requires careful consideration of the 5G architecture's    unique aspects,\" the association wrote. It explained that    security must be addressed from a variety of angles across    different traffic planes (user, control and management) and    domains including core network, RAN and user equipment like    smartphones.  <\/p>\n<p>    According to ATIS, 3GPP has been working to implement zero    trust broadly, but only in the Service Based Interface (SBI)    and not in other aspects of the 5G network like the RAN.  <\/p>\n<p>    The O-RAN Alliance also has been working to implement ZTA in    its open RAN specifications. Security     has been a hot topic in the early discussions around open    RAN.  <\/p>\n<p>    ZTA across the ecosystem  <\/p>\n<p>    The interest in ZTA doesn't come as a surprise to 5G equipment    vendors and network operators.  <\/p>\n<p>    \"Nokia's products and services support a zero-trust approach to    network security  the premise that trust cannot be assumed and    must continually be validated,\" the company told    the NTIA earlier this year.  <\/p>\n<p>    Indeed, Nokia said its focus on security extends to its new    ASTaR (Advanced Security Testing and Research) lab in Dallas,    Texas. The company and the lab will serve as a lead technology    provider and collaborator for NIST's National Cybersecurity    Center of Excellence (NCCoE) 5G Cybersecurity Project.  <\/p>\n<p>    Mavenir told    the NTIA earlier this year that it has \"already qualified    its open RAN product offerings through the NESAS qualification    process, which includes development and supply of products on a    zero-trust basis.\"  <\/p>\n<p>    The Network Equipment Security Assurance Scheme (NESAS) is a    program from the global GSMA trade association to provide \"one    universal and global security assurance framework.\"  <\/p>\n<p>    Finally, operators ranging from Verizon to Dish Network have    discussed the technology.  <\/p>\n<p>    \"Verizon's Zero Trust Dynamic Access provides a zero trust    cloud security solution for secure access to the open Internet,    cloud applications, private applications and data and public    cloud services,\" the company wrote     on its Verizon Business website. \"That helps you defend    your business.\"  <\/p>\n<p>    And Dish has made ZTA a core part of     its early 5G sales story. Indeed, the company touted its    zero trust approach to 5G deployment as part of     Hughes Network Systems' work with the US military.  <\/p>\n<p>    Related posts:  <\/p>\n<p>     Mike Dano, Editorial Director, 5G & Mobile    Strategies, Light Reading | @mikeddano  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.lightreading.com\/security\/5g-players-tout-progress-toward-zta-but-more-work-ahead\/d\/d-id\/786195\" title=\"5G players tout progress toward ZTA, but more work ahead - Light Reading\">5G players tout progress toward ZTA, but more work ahead - Light Reading<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security experts agree that zero trust architecture (ZTA) is critical to securing communications networks. While many companies argue that they have made progress adding the technology into their 5G operations, a new report from ATIS says more needs to be done <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/5g-players-tout-progress-toward-zta-but-more-work-ahead-light-reading\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187725],"tags":[],"class_list":["post-1117247","post","type-post","status-publish","format-standard","hentry","category-progress"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1117247"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1117247"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1117247\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1117247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1117247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1117247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}