TM Forum Community

 View Only
  • 1.  Network slicing and 5G

    Posted Mar 02, 2018 17:20
    What risks can be predicted in the future 5G partitioned networks?

    ------------------------------
    RICARDO Oliveira
    Prefeitura da Cidade do Rio de Janeiro
    ------------------------------


  • 2.  RE: Network slicing and 5G

    Posted Mar 05, 2018 03:39
    ​Hi Riccardo,

    We have recently published a whitepaper highlighting many risks of virtualized networks and in respect to slicing.  You can get it here:

    Creating a chain of trust in 5G networks
    Gemalto remove preview
    Creating a chain of trust in 5G networks
    View this on Gemalto >


    Kind Regards,
    Paul

    ------------------------------
    Paul Bradley
    GEMALTO SA
    ------------------------------



  • 3.  RE: Network slicing and 5G

    Posted Mar 07, 2018 11:45
    Hi Paul,
    I liked very much the Gemalto's paper you recommended. It has the information I need to start my study about what a sliced 5G network needs in order to be secure. 
    Thank you!

    ------------------------------
    RICARDO Oliveira
    Prefeitura da Cidade do Rio de Janeiro ( Rio de Janeiro City Hall)
    ------------------------------



  • 4.  RE: Network slicing and 5G

    TM Forum Member
    Posted Oct 03, 2025 16:04
     
    1. Expanded Attack Surface
    Partitioned 5G networks-particularly those employing network slicing-create multiple virtual networks over a shared infrastructure. This significantly increases the number of potential entry points for attackers:
     
    Each slice may adopt a distinct security posture, complicating efforts to enforce consistent protection across the network.
    If inter-slice communication is not properly isolated, it can be exploited as a vector for lateral movement or data breaches.
     
    2. Vulnerabilities in Virtualization and Orchestration
    Virtualized environments are susceptible to misconfigurations, privilege escalation, and container escape attacks.
    Orchestration tools, if compromised, can provide attackers with broad control over network functions and resources.


    ------------------------------
    Chirag Raval
    Lead Consultant
    Infosys Ltd
    ------------------------------