Strict Regulation Shaping 5G Security in Europe

24
Strict Regulation Shaping 5G Security in Europe-01

The strict regulations in Europe have forced enterprises to rethink their strategies and focus on tightening their 5G security.

Many service providers, especially across Europe, are increasingly focusing on telecom and 5G security. In light of the growing number of cyber threats, they are taking efforts to evolve cybersecurity practices and postures – both for 4G networks and planned 5G deployments. Service providers are also realizing that security can act as a key differentiator for their customers. Part of the reason for enterprises to suddenly increase their focus on cybersecurity is because of the growing expectations from government policymakers.

In today’s world, it is becoming increasingly difficult for service providers to secure their IT infrastructure. The surge in the number of cyber-attacks on mobile networks continues to grow in volume and sophistication, infiltrating and attacking network infrastructure, services, applications and service providers and their customers.

Read Interviews : Enterprises Leverage AI to Secure Sensitive Data

European government realizes the high stakes in networking and particularly the implementation of 5G. It has been issuing legislation and guidance encouraging enterprises to take strong measures to strengthen their security and stop cyber threats on mobile networks.

Last year, Germany’s telecommunications regulator, Bundesnetzagentur, released a draft “Catalogue of Security Requirements for Operating Telecommunications and Data Processing Systems, and for Processing Personal Data, Version 2.0.” According to Annex I, Section 2.2 of Germany’s catalogue, “telecommunications service providers with an IP infrastructure” need to regularly monitor traffic data for any abnormalities “in order to detect attacks or faults” and to implement a suitable monitoring infrastructure that “should be able to continuously identify and prevent threats.”

Many European service providers have taken steps to invest in proven, state-of-the-art security tools and capabilities for securing their networks to address the vulnerabilities in 4G and 5G technologies. These investments are solutions for authentication and access control, real-time mitigation, container security and network segmentation. The evolving dynamics of regulation is increasing the need for enterprises to maintain constant monitoring and enforcement for detecting and stopping cybersecurity threats within mobile traffic in real-time.

Read Interviews : The Need for Safeguarding IT Infrastructure in the New Normal

According to ISACA’s 5G Security: Addressing Risk and Threats of Mobile Network Technologies, “The IoT systems residing on 5G networks create opportunities to positively transform existing business processes, provide value-added benefits, and save time and cost for businesses.” But, just like customers, 5G also provides avenues for cyber-attackers to exploit their targets by leveraging 5G speeds. Also, the increase in the IoT devices and their dependency on 5G networks has only expanded the attack surface. These factors when combined together can rapidly increase the pace of attacks or breaches, making it crucial to secure data, IoT devices, networks and enterprise services.

According to Dustin Brewer, Senior Director of Emerging Technology and Innovation, ISACA, “5G technologies continues to be implemented in phases around the world, allowing for increased speed and network capacity with lower latency and several other benefits.” He further adds and concludes, “The improvements made from previous mobile network technologies to 5G are incredible, namely the introduction of new radio technology and network slicing, multi-band utilization, and 5G’s ability to address risks from previous generation cellular technologies. However, risk still exists with 5G, and professionals should be familiar with the intricacies of the system and security architecture in order to safely implement 5G in their organizations.”

For more such updates follow us on Google News ITsecuritywire News.