Now more than ever, national security missions must overcome risks around untrusted technology in a hyperconnected world. To enable resilient operations and shield sensitive data through these challenges, the Department of Defense is urging its senior leaders, engineers, operators, and contractors to embrace a “zero trust” security model for sensitive data, systems, and services, including fifth-generation (5G) mobile technology. All networks should leverage this mindset. And putting zero trust into action today with existing tools can mitigate emerging mission risks and enable the 5G capabilities of tomorrow.
Our report, Building Mission-Driven 5G Security with Zero Trust, explains what you need to know to get started:
- It’s zero hour for zero trust. The concept of zero trust has been around for years—but it’s never been more vital for national defense.
- Your organization can use the pillars of zero trust, plus governance, to understand the strengths and gaps in current capabilities, and to design actionable plans for improved security.
- We recommend employing four complementary steps to realize zero trust for 5G. Our report explains the steps and includes hypothetical cyberattack use cases to show security principles in action.