Chapter 5

Securing MEC Deployments in 5G

After reading this chapter, you should have a better understanding of the following topics:

  • Key threat surfaces in different models of 5G MEC deployments

  • Key security controls for securing 5G MEC

  • Real scenario case study examples on MEC threat surfaces and threat mitigation techniques

In the previous chapters, we discussed the security controls to mitigate threat surfaces in 5G radio access network (RAN) deployments. This chapter will take you through the threat surfaces in 5G multi-access edge computing (MEC) deployments and mechanisms to mitigate the threats.

This chapter will be of particular interest to the following teams from enterprise 5G MEC consumers, 5G service providers, and cybersecurity ...

Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.