Now more than ever, national security missions must overcome risks around untrusted technology in a hyperconnected world. To enable resilient operations and shield sensitive data through these challenges, the Department of Defense is urging its senior leaders, engineers, operators, and contractors to embrace a “zero trust” security modelforsensitivedata, systems, and services, includingfifth-generation(5G) mobile technology.Allnetworksshould leveragethis mindset.And putting zero trust into action todaywithexisting toolscanmitigate emerging mission risksand enable the 5G capabilities of tomorrow.
Our report,Building Mission-Driven 5G Security with Zero Trust, explains what you need to know to get started:
- It’s zero hour for zero trust.The concept of zero trust has been around for years—but it’s never been more vital for national defense.
- Your organizationcan use the pillars of zero trust, plus governance, to understand the strengths and gaps in current capabilities, and to design actionable plans for improved security.
- We recommend employing four complementary steps to realize zero trust for 5G. Our report explains the steps and includes hypotheticalcyberattack use casesto showsecurity principlesin action.