5G Network Security
5G network security encompasses the threat surface, architectural controls, regulatory obligations, and standards frameworks governing fifth-generation wireless networks deployed across the United States. The transition from 4G LTE to 5G introduces fundamentally restructured core network design, expanded attack surfaces driven by network slicing and edge computing, and a corresponding expansion of federal oversight from agencies including the FCC, CISA, and NIST. This page provides a reference treatment of 5G security: its scope, structural mechanics, regulatory drivers, classification distinctions, contested tradeoffs, persistent misconceptions, and a phase-structured technical checklist.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps
- Reference table or matrix
- References
Definition and scope
5G network security refers to the body of architectural controls, cryptographic protocols, identity frameworks, and policy mandates that protect fifth-generation wireless infrastructure and the data traversing it. The 3rd Generation Partnership Project (3GPP) defines 5G security requirements in Release 15 (TS 33.501), which introduced unified authentication architecture (5G-AKA and EAP-AKA'), subscriber identity concealment via the Subscription Concealed Identifier (SUCI), and mandatory integrity protection for user-plane traffic under specific conditions.
The scope of 5G security extends across four distinct infrastructure layers: the Radio Access Network (RAN), the 5G Core (5GC), the transport network interconnecting them, and the application and service layers hosted at the edge. Each layer carries distinct threat profiles. The 5GC, unlike the 4G Evolved Packet Core, is a cloud-native, service-based architecture (SBA) built on containerized microservices communicating over HTTP/2 and JSON — design choices that introduce web-application-class vulnerabilities absent in prior generations.
NIST's National Cybersecurity Center of Excellence (NCCoE) 5G Cybersecurity project identifies three primary deployment scenarios — standalone 5G, non-standalone 5G (anchored to LTE), and network slicing environments — each with distinct security boundaries and control requirements. The CISA 5G Security Evaluation Process Investigation further extends scope to supply chain integrity and untrusted vendor components, referencing risks codified in the Secure and Trusted Communications Networks Act of 2019.
Core mechanics or structure
The 5G Core's service-based architecture replaces the point-to-point interface model of 4G with a mesh of network functions (NFs) — including the Access and Mobility Management Function (AMF), Session Management Function (SMF), and User Plane Function (UPF) — that communicate over a shared service bus. Security across this bus relies on Transport Layer Security (TLS 1.2 minimum, TLS 1.3 preferred) and OAuth 2.0 token-based authorization between NFs, as specified in 3GPP TS 33.501 §13.
Network slicing — the partitioning of a single physical 5G infrastructure into logically isolated virtual networks — is a defining 5G capability. Each slice is assigned independent security policies, QoS parameters, and isolation boundaries. The security of slicing depends on the isolation quality of the underlying virtualization layer (typically a Kubernetes-based container orchestration platform), and failures in hypervisor or container isolation directly translate to cross-slice data leakage.
SUCI replaces the cleartext transmission of the International Mobile Subscriber Identity (IMSI) used in 2G, 3G, and 4G, encrypting the subscriber's permanent identity with the home network's public key before transmission over the air interface. This control directly addresses IMSI-catcher attacks — a class of active interception exploiting identity exposure in prior generations.
The O-RAN Alliance's open RAN architecture, which disaggregates the radio unit (RU), distributed unit (DU), and centralized unit (CU), introduces additional northbound and southbound interfaces that must be independently secured. CISA's Potential Threat Vectors to 5G Infrastructure report identifies open interfaces in disaggregated RAN as a priority attack surface requiring explicit access controls and anomaly detection.
Causal relationships or drivers
Four structural forces shape the 5G security threat landscape.
Expanded attack surface. 5G deployments connect an estimated 1 billion IoT devices globally by projections from the GSMA Intelligence database, each representing a potential network entry point. Unlike smartphones, IoT endpoints frequently lack firmware update mechanisms, long-term vendor support, or hardware roots of trust.
Software-defined infrastructure. The shift to cloud-native, containerized network functions means 5G infrastructure inherits the full vulnerability class of cloud platforms: misconfigured APIs, exposed management interfaces, and container escape vulnerabilities. The NIST SP 800-190 Application Container Security Guide documents 12 categories of container-specific risks directly applicable to 5GC deployments.
Supply chain concentration. The Secure and Trusted Communications Networks Act of 2019 (47 U.S.C. §1601 et seq.) established the FCC's authority to prohibit equipment from vendors designated as national security threats — currently Huawei and ZTE under FCC Order DA 21-80 — and created the Rip and Replace reimbursement program. Supply chain risk is a regulatory driver, not merely a technical one.
Regulatory mandates. Executive Order 14028 (May 2021) directed federal agencies to adopt zero trust architectures, a requirement that directly intersects with 5G deployments where federal agencies operate private or hybrid 5G networks. CISA's Zero Trust Maturity Model provides the implementation reference for network identity enforcement in these environments — a framework also applicable in network security service contexts.
Classification boundaries
5G security controls are classified along three axes: architectural layer, deployment model, and threat domain.
By architectural layer: RAN security (air interface encryption, base station authentication), transport security (IPsec for fronthaul/backhaul), and core security (NF authorization, API gateway controls, slice isolation).
By deployment model: public macro networks operated by licensed carriers; private 5G networks operated by enterprises, utilities, or federal agencies on licensed CBRS (Citizens Broadband Radio Service, 3.5 GHz band) or mmWave spectrum; and non-standalone deployments relying on LTE control-plane anchoring, which inherit 4G security limitations.
By threat domain: subscriber identity threats (IMSI catchers, SUCI implementation failures), protocol-layer threats (signaling attacks via Diameter and SS7 in non-standalone deployments), virtualization threats (container escape, slice boundary violations), and supply chain threats (compromised firmware in RU/DU hardware).
The distinction between standalone (SA) and non-standalone (NSA) 5G is security-critical: NSA deployments using LTE as the control plane retain Diameter signaling exposure, a protocol with documented vulnerabilities catalogued in GSMA FS.11 Diameter Security.
Tradeoffs and tensions
Performance vs. encryption. 3GPP TS 33.501 mandates integrity protection for control-plane traffic but makes user-plane integrity protection conditional, citing latency constraints in ultra-reliable low-latency communication (URLLC) use cases. This creates a documented gap: user-plane traffic in certain configurations may traverse network segments without integrity verification, a tradeoff acknowledged in ENISA's Threat Landscape for 5G Networks.
Open RAN vs. supply chain risk. Open RAN disaggregation is positioned as a supply chain diversification tool — reducing dependence on single-vendor integrated RAN equipment — but introduces a larger number of software interfaces that require independent security validation. The security audit burden increases proportionally with the number of disaggregated components.
Network slicing isolation vs. resource efficiency. Strong cryptographic and hypervisor-level slice isolation consumes compute and memory overhead. Operators optimizing resource utilization may configure shared infrastructure that weakens isolation guarantees, creating a direct tension between operational economics and security posture — a structural issue discussed within the broader network security provider network purpose and scope.
Federal oversight vs. deployment velocity. FCC spectrum licensing, NTIA supply chain reviews, and DoD spectrum-sharing requirements in the CBRS band impose review timelines that can delay private 5G deployments. The National Spectrum Strategy (released by NTIA in November 2023) acknowledges this tension between security review processes and commercial deployment timelines.
Common misconceptions
Misconception: 5G is inherently more secure than 4G across all dimensions.
Correction: 5G introduces stronger subscriber identity protection (SUCI) and mandatory NF authorization, but NSA deployments retain Diameter and SS7 exposure. The cloud-native SBA introduces web-application vulnerabilities absent in 4G's hardware-centric architecture. Security improvement is layer-specific, not universal.
Misconception: Network slicing provides cryptographically enforced isolation equivalent to physical separation.
Correction: Slice isolation is enforced by software — container orchestration platforms and hypervisors — not by physical separation. Container escape vulnerabilities (e.g., CVE-2019-5736 affecting runc) can defeat slice boundaries. Physical separation is the only control that eliminates cross-slice data access entirely.
Misconception: SUCI eliminates all IMSI-catcher risk.
Correction: SUCI conceals the permanent subscriber identity on the air interface, but the home network must correctly implement the SUCI deconcealment process. Implementation errors in the Home Unified Data Management (UDM) function can expose the SUPI (Subscription Permanent Identifier). Additionally, SUCI does not protect against false base station attacks that manipulate service availability rather than intercept identity.
Misconception: FCC's trusted vendor designations resolve supply chain risk.
Correction: FCC restrictions apply to equipment procurement by US carriers receiving federal subsidies. Enterprise private 5G deployments using non-FCC-subsidized infrastructure are not subject to the same statutory restrictions, creating a gap documented in the CISA 5G Strategy.
Checklist or steps
The following phase sequence reflects the 5G security implementation framework described in NIST NCCoE SP 1800-33 (5G Cybersecurity). This is a structural reference, not implementation advice.
Phase 1 — Architecture and inventory
- Document whether the deployment is standalone (SA) or non-standalone (NSA) 5G
- Identify all network functions (AMF, SMF, UPF, UDM, PCF, AUSF) and their hosting environments
- Enumerate all northbound and southbound interfaces in disaggregated RAN components
- Classify slice types by tenant, use case, and required isolation level
Phase 2 — Identity and access controls
- Verify SUCI implementation against 3GPP TS 33.501 §6.12
- Confirm OAuth 2.0 authorization is enforced between all service-based interface NF pairs
- Validate TLS version enforcement (minimum TLS 1.2; TLS 1.3 for new deployments) on all NF-to-NF communications
- Apply network function access tokens (NF Service Consumer tokens) per TS 33.501 §13.3
Phase 3 — Virtualization and container security
- Apply NIST SP 800-190 container security controls to Kubernetes clusters hosting 5GC functions
- Enforce namespace isolation and Pod Security Standards for each network slice
- Scan container images for known CVEs before deployment to RAN and core NF workloads
Phase 4 — Transport and RAN hardening
- Implement IPsec for all fronthaul and backhaul transport segments
- Apply mutual authentication on O-RAN A1, E2, and O1 interfaces per O-RAN Alliance security specifications
- Verify CBRS spectrum access server (SAS) authentication for CBRS-band private deployments
Phase 5 — Supply chain validation
- Cross-reference all hardware and software vendors against FCC's Covered List before procurement
- Obtain Software Bill of Materials (SBOM) for all 5GC network function software packages
- Validate firmware integrity via cryptographic signing for all RU and DU hardware units
Phase 6 — Monitoring and response
- Deploy network anomaly detection tuned for SBA HTTP/2 traffic baselines
- Establish slice-specific SIEM correlation rules to detect cross-slice anomalies
- Align incident response procedures with CISA's 5G Security Guidance reporting thresholds
Reference table or matrix
| Security Domain | 4G LTE Control | 5G SA Control | Key Standard | Residual Risk in 5G |
|---|---|---|---|---|
| Subscriber identity protection | IMSI sent in cleartext | SUCI (encrypted with home network public key) | 3GPP TS 33.501 §6.12 | UDM deconcealment implementation errors |
| Authentication | EPS-AKA | 5G-AKA, EAP-AKA' | 3GPP TS 33.501 §6.1 | Roaming scenario downgrade attacks |
| Core signaling security | Diameter (no native auth) | OAuth 2.0 + TLS on SBA | 3GPP TS 33.501 §13 | Misconfigured NF access token policies |
| User-plane integrity | Not mandated | Conditional (URLLC exempt) | 3GPP TS 33.501 §6.6 | Integrity gap in low-latency slices |
| RAN interface security | IPsec on S1 | IPsec on NG interface; O-RAN interfaces variable | 3GPP TS 33.401; O-RAN Alliance | Open RAN vendor implementation variation |
| Network slicing isolation | Not applicable | Hypervisor/container-based | NIST SP 800-190 | Container escape vulnerabilities |
| Supply chain controls | Informal vendor assurance | FCC Covered List; SBOM requirements | 47 U.S.C. §1601; EO 14028 | Private enterprise deployments outside FCC subsidy scope |
| Roaming security | SS7 exposure | SEPP (Security Edge Protection Proxy) on N32 | 3GPP TS 33.501 §9 | SEPP misconfiguration; NSA Diameter persistence |
The network security providers provider network includes service providers and consultancies with documented 5G security specializations organized by deployment type and regulatory scope. For context on how this reference material fits within the broader framework, see the how to use this network security resource page.
References
- National Cybersecurity Center of Excellence (NCCoE) 5G Cybersecurity project
- CISA 5G Security Evaluation Process Investigation
- Potential Threat Vectors to 5G Infrastructure
- NIST SP 800-190
- NIST SP 800-53 — Security and Privacy Controls
- Cybersecurity and Infrastructure Security Agency
- CIS Critical Security Controls
- ISO/IEC 27001 — Information Security Management