NFV Security in 5G - Challenges and Best Practices

In this report explores relevant challenges, vulnerabilities and attacks to the Network Function Virtualization (NFV) within the 5G network. NFV changes the network security environment due to resource pools based on cloud computing and open network architecture. 60 security challenges grouped in 7 categories have been identified and explored. Among others, this report exposes vulnerabilities, attack scenarios and their impact on the 5G NFV assets. To address these upcoming challenges, security controls and best practices are put forward in this report, taking into account the particularities of this highly complex, heterogeneous and volatile environment. In particular, 55 best practices categorized in Technical, Policy and Organizational categories have been identified.


We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information