NFV Security in 5G - Challenges and Best Practices

In this report explores relevant challenges, vulnerabilities and attacks to the Network Function Virtualization (NFV) within the 5G network. NFV changes the network security environment due to resource pools based on cloud computing and open network architecture. 60 security challenges grouped in 7 categories have been identified and explored. Among others, this report exposes vulnerabilities, attack scenarios and their impact on the 5G NFV assets. To address these upcoming challenges, security controls and best practices are put forward in this report, taking into account the particularities of this highly complex, heterogeneous and volatile environment. In particular, 55 best practices categorized in Technical, Policy and Organizational categories have been identified.


This site uses cookies to offer you a better browsing experience.
Aside from essential cookies we also use tracking cookies for analytics.
Find out more on how we use cookies.

Accept all cookies Accept only essential cookies