Q. Will 5G amplify the cybersecurity threats organizations are already facing?
A. 5G itself doesn’t introduce new risks; it is simply a means of transporting IP traffic. However, enterprises need to understand the risks associated with the new use cases that 5G enables. What is the worst-case scenario of that use case?
Let’s take an extreme example: autonomous vehicles. 5G and mobile edge computing (MEC) will be instrumental in supporting autonomous vehicles and next-level smart- city solutions. Smart cities and autonomous driving go hand in hand, because vehicles will be depending on the telemetry they receive from smart-city appliances.
So the worst case for autonomous driving is the vehicle being hijacked. In the best-case scenario, the vehicle is just disabled. In the worst case, the breach causes an accident.
You could argue that this is an extreme use case from a breach or exploit perspective, but the way we work with our customers is to work backwards from the use case. We have identified the use case and articulated the worst possible scenario. We now understand the risk that a breach would cause, and we work backwards to understand how strong the security posture for this use case has to be—and also how rapidly we’d need to detect and respond to such a breach. You will have use cases with different levels on the risk scale. You could have mobile 3D manufacturing enabled by 5G and a breach there could have a financial impact by halting production, but the impact is less severe to human life than with an autonomous vehicle being compromised. Again, it’s about working backwards through the use cases.
Q. 5G is poised to blow open the doors for innovation, and some are concerned that it could make the “rogue IT” challenge harder to manage, with business lines rushing 5G-enabled tools and processes into production. If you don’t have a fundamentally strong security governance program now, with proper oversight of the deployment of technology, is it going to be a problem as 5G becomes widely adopted?
A. Yes. Very prominent breaches, which have received media coverage over the last few years, have changed the landscape in that the companies that were breached are not perceived as victims anymore. If you think back four or five years, the companies that were breached presented themselves as victims, and there was very little discussion as to how diligent they had been in protecting their environment and their customers’ data.
Looking forward, there’s an expectation that there will be enough maturity in security programs, as well as regulatory pressure, to not enable use cases without having verified and demonstrated that they can protect them accordingly.
Q. Say an organization has made significant investments in its security infrastructure—security incident and event management (SIEM); endpoint protection; security orchestration, automation and response (SOAR); firewalls, etc.—does 5G make all of these prior investments obsolete?
A. No, it will not make them obsolete. If you look at the 5G security stack, you will see 90% of the technologies that we already have today, such as endpoint protection, endpoint detection and response, Zero Trust–based mechanisms, software-defined perimeter (SDP) with medium to very strong encryption for the payload, even things like quantum key distribution. Where a lot of innovation needs to happen is in the area of detection. The 5G use cases, to a large degree, are related to real-time interactions, due to 5G’s extremely low latency. So the need to detect a breach in near real time greatly increases.