From the course: Implementing Zero Trust for 5G and Open RAN
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Solution: Threat modeling
From the course: Implementing Zero Trust for 5G and Open RAN
Solution: Threat modeling
(upbeat music) - [Instructor] So this is how I will approach this. I'll first use STRIDE, which is the threat modeling framework, stands for Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Escalation of privilege. I'll use this process to identify potential vulnerabilities and then maps them to the ZTA controls. Let's take a look how I'll do this. In the architecture components, you have to set, first of all, that what are your architecture components. Starting from the 5G core network, what are the main applications of your core network that you are targeting? Then you have to set up the interfaces, define interfaces for each of these core network functions. Then start with O-RAN components, define the RIC, DU, CU, and RU, and their interfaces as well, for example, E2, A1, O1, and O2. Then you have to define the common components, for example, the transport network, APIs or NF communication and external access, and also telemetry and analytics…