The Top Three Challenges for Securing 5G

5G Coverage

In our latest contribution Lakshmi Kandadai, Director, Palo Alto Networks, outlines the three major challenges for securing 5G.

5G promises enhanced mobile broadband experience, industrial digitalisation via customer value creation and countless other benefits. It has been over a year since the technology first launched in the UK, but there is still much more to be done to achieve widespread coverage across the country. In these early stages of development, there is naturally a focus on pace of rollout, improvements to latency, faster data speeds and functional mobile network redesign to enhance efficiency, agility and openness. However, it is vital that security is not left out of the equation. It is up to the many stakeholders across the industry, within government, and standards organisations to now build a strong foundation for security to mitigate risk as the vision for 5G is realised. It will be much more difficult, costly and time-consuming to protect 5G from those with malicious intent after it has been fully deployed, delaying cybersecurity gives cyber-criminals more time to act.

There are three key challenges for securing 5G. The first is the Internet of Things (IoT), the second is 5G cloud adoption, and the third is developing standards and best practices.

1. The challenge of securing IoT


Palo Alto Networks has conducted ‘proof of concept’ tests around the world and discovered that a high proportion of malicious software currently in mobile networks is made up of IoT botnets. Cyber-criminals often use command and control (C2) communication channels over the Domain Name Service (DNS) and have even used the DNS to extract data. What’s more, Unit 42, Palo Alto Networks’ threat intelligence arm found that over 50% of all IoT devices are vulnerable to medium or high severity cyber-attacks in its 2020 IoT Threat Report leaving both service providers and enterprises vulnerable. 

Inadequate IoT security in operator networks means attacks are evolving alarmingly fast in terms of severity and frequency. Massive cyber-attacks can come from within operators’ own networks via a botnet made up of large-scale weaponised IoT devices in the tens of thousands. This could comprise non-standard computing devices such as microcontrollers and sensors which may run open source or proprietary operating systems and applications and use diverse cellular connectivity models to connect to the internet wirelessly. IoT devices that have been poorly configured represent an opportunity for hackers to build huge botnets, so it is no surprise malicious network attacks using vulnerable IoT devices are on the rise.

Other Unit 42 research shows the challenge of securing IoT is one faced by numerous critical industries including medical and government organisations as they continue supporting people through the COVID-19 pandemic. With breached IoT devices suffering anything from diminished usability to overall device performance and denial of service impacting not just intended targets but also overall network services, which greatly expands the number of people that could be affected, it is clear botnets are a massive threat. As IoT threats become more sophisticated, service providers need to make their detection and prevention methods more sophisticated too. 

2. The challenge of filling security gaps in the cloud


As telecom operators embrace distributed, hybrid technology environments that are multi-vendor, multi-site cloud infrastructures, ‘physical’ network perimeters are disappearing, meaning the approach needed to secure telecom networks radically changes. This technological shift has been prompted in part by many operators’ preferences for a multi-cloud strategy with end-to-end automation for network operations and services to meet diverse 5G-enabled service offering performance and scalability needs.

Software-driven operational models do help drive agility, but also come with serious security flaws from the software platform, underlying OS and software stacks that make networks more vulnerable to attacks that must be addressed, such as Linux threats, host vulnerabilities, and container/hypervisor vulnerabilities. They may also be at risk of lateral threat movement between virtual network functions and applications. As the landscape becomes more distributed, risks are no longer confined to data centre assets – hackers are targeting devices outside traditional perimeters too.

3. The challenge of developing 5G security standards


Many stakeholders in telecoms understand security is fundamental to effectively launching and using 5G, and there is appetite for standards and best practices. There have already been an array of standards and best practices set up on spectrum allocation and use but there is definitely room for leading-edge 5G security practices. Fortunately, the industry association GSMA, which represents over 750 mobile operators around the world, has outlined best practices in mobile security and expanded its guidance, offering a good foundation to build on.

So, how can we overcome these challenges to secure 5G? 


The right approach to securing 5G is multi-faceted and needs a collective effort from both industry and governments. Both businesses and the public sector have a vested interest in mitigating cybersecurity threats, preventing mobile network infrastructures falling victim to cyber-attacks and reducing the impact of cybercrime, so it is crucial to work together.

Industry and governments should cooperate to identify obstacles that are statutory, regulatory or policy that may hamper successful security of mobile network infrastructure and create new plans to ensure critical infrastructure that uses – or will use 5G – is appropriately secure. At the start of 2020 the European Commission took steps towards this by endorsing the joint ‘5G EU ‘toolbox’ – a series of measures for use by member states in the EU to address security risks as 5G is rolled out.

Governments should incorporate measures that mitigate security risks to network infrastructures, services, applications, operators’ customers (enterprises and end-user consumers) and more into their planning.

Industry associations should continue collaborating with service providers and vendors to develop new security guidelines and measures. The GSMA has already consulted with service providers to publish FS.37, a security reference document detailing best practices to secure 5G networks by detecting and preventing attacks against mobile networks, services and applications on the GPRS Tunnelling Protocol User (GTP-U) plane.

Service providers must have real-time visibility into their networks and hybrid cloud environments as well as granular control over traffic to spot and prevent cyber-attacks in the form of IoT botnets and other threats. Overcoming the major security challenges we face with the rollout of 5G will make protecting organisations and their data much easier and more successful.


Lakshmi Kandadai

Director, Palo Alto Networks. Dynamic and visionary leader combining outstanding technical, product & marketing talents, with a proven track record of creating innovative go-to-market strategies including conceptualizing, launching, and positioning 4G/5G, IP (Cloud, SDN/NFV) & mobile edge technology products and solutions in a fast-paced business environment.

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...