Of course, there are some potential risks with 5G network slicing.
Network slice instances, for example, could require such supporting capabilities as dynamic auto-scaling as well as high availability to address the performance requirements of mission critical applications. IT teams should also consider end-to-end deployment of security functions based on the use case requirements, such as traffic traveling from the network edge through a core cloud and then to the internet.
Sophisticated cyber criminals could also attempt to attack a specific network slice instance or host. Depending on how slices are established, IT teams would need to review any differences in protocols and policies, and whether they are sufficient based on the use case in question.
Organizations could mitigate these risks by adding slice-specific virtualized security network functions, such as a virtual firewall. However, once network slices have been deployed, it would be best to work with a managed service provider to determine which kind of analytics tools might be able to provide greater visibility into possible threats.
When it comes to choosing the right provider, consider whether any purpose-built hardware supporting security functions, such as intrusion detection and firewalls, have been deployed throughout the network. And of course, security features should be deployed from 5G standards.
Learn more about how to move to 5G with the best possible security in place.