Chapter 7

Securing Network Slice, SDN, and Orchestration in 5G

After reading this chapter, you should have a better understanding of the following topics:

  • Threats in SDN, orchestration, and network slice deployments in 5G

  • Securing SDN, orchestration, and network slice deployments

  • Real scenario case study examples of SDN, orchestration, and network slice threat surfaces and threat mitigation techniques

This chapter will take you through the threat surface and mechanisms to mitigate threats in the 5G network slice and its enablers—software-defined networks (SDNs) and orchestration.

This chapter will be of particular interest to the following teams from enterprise and 5G service providers deploying 5GC and cybersecurity vendors planning product ...

Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.