close
close

5G private key to protect critical operations and sensitive data

Boldyn noted that a private 5G network must prevent unauthorized users/devices to reduce the risk of data leakage

Private 5G networks offer significant security benefits compared to public networks for industrial applications, said Janne Isosaari, senior operations director for private networks for Europe at Boldyn Networks, adding that industrial facilities can deploy reliable private 5G networks that protect them critical operations and sensitive data.

“Private networks are deployed for the exclusive use of an enterprise or campus, allowing only authorized users and devices to connect to the network. With private networks, data is encrypted and stored locally with restricted access. Prevents data leaks. Privacy/security is provided by private APNs,” Isosaari said.

“Jamming, the inevitable disruption of wireless signals, remains a potential threat. However, the closed nature of private networks operating on a dedicated spectrum makes them less susceptible to attacks compared to other wireless network solutions,” added the director.

Director Boldyn also explained that industrial interconnectedness, driven by the advancement of Industry 4.0 technologies, requires a constant and reliable network connection to minimize downtime due to delays. “To achieve this, securing this complex environment requires a team of experts who not only understand cybersecurity issues, but also can maintain optimal network performance. The network must prevent unauthorized users/devices to reduce the risk of data leakage.

Commenting on the strategies companies should adopt to enhance the security of private 5G networks in industrial environments, Isosaari stated that while private 5G networks offer inherent security benefits due to their dedicated nature, it is critical to go beyond this and implement additional security measures in accordance with ISO27001 recommendations. “Treating private 4G/5G networks the same as any other enterprise network is another key issue. This means using the same security and access control protocols used in other network systems. This consistency simplifies security management and reduces the risk of vulnerabilities,” said the director.

Isosaari further stated that the growth of IoT devices poses a complex security challenge for enterprises because many IoT devices often lack robust security features, making them easy targets for attackers. “Furthermore, patching vulnerabilities in all of these devices can be a slow and labor-intensive process. The IoT device ecosystem requires careful management to ensure end-to-end security,” Isosaari added.

The executive emphasized that private networks can significantly mitigate these threats because they allow a central system to manage and authorize all devices, ensuring that only approved people have access to the network and its controls. “Additionally, private networks enable secure communications by encrypting all data flowing between devices, protecting sensitive information from unauthorized users/devices.”

When asked about the differences in security implications in a scenario where the private network is local core and RAN versus on-premises RAN, public core, the executive stated that local core and RAN provide greater control over data privacy as well as usage statistics . “Because both the core and RAN are in the infrastructure, customers will have greater control over user data and how it is handled. This enables more stringent access control and encryption rules,” the director said.

“While local core provides greater control over data privacy, it is not the only factor. The security implications depend on the overall network design and security practices,” he added.

RCR Wireless News has published an editorial report titled “Securing the Edge – Where 5G Meets the Enterprise,” in which key industry leaders and analysts examine the most important security issues for private 5G networks deployed at the enterprise edge. Click here to access the report.