Now more than ever, national security missions must overcome risks around untrusted technology in a hyperconnected world. To enable resilient operations and shield sensitive data through these challenges, the Department of Defense is urging its senior leaders, engineers, operators, and contractors to embrace a 鈥渮ero trust鈥 security model聽for聽sensitive聽data, systems, and services, including聽fifth-generation聽(5G) mobile technology.聽All聽networks聽should leverage聽this mindset.聽And putting zero trust into action today聽with聽existing tools聽can聽mitigate emerging mission risks聽and enable the 5G capabilities of tomorrow.聽
Our report,聽Building Mission-Driven 5G Security with Zero Trust, explains what you need to know to get started:
- It鈥檚 zero hour for zero trust.聽The concept of zero trust has been around for years鈥攂ut it鈥檚 never been more vital for national defense.聽
- Your organization聽can use the pillars of zero trust, plus governance, to understand the strengths and gaps in current capabilities, and to design actionable plans for improved security.
- We recommend employing four complementary steps to realize zero trust for 5G. Our report explains the steps and includes hypothetical聽cyberattack use cases聽to show聽security principles聽in action.聽