1、Ericsson White Paper1/284 23-FGB 101 0781 UenFebruary 2024Zero Trust Architecture for advancing mobile network security operationsZero Trust Architecture for advancing mobile network security operationsContentFebruary 20242ContentExecutive Summary 3Introduction 4The evolution of Zero Trust Architect
2、ure 6Guidance for implementing a ZTA 8ZTA implementation challenges for mobile networks 10Security Management to achieve ZTA maturity 13Ericssons journey toward ZTA 17Conclusion 19References 20Authors 21Zero Trust Architecture for advancing mobile network security operationsExecutive SummaryFebruary
3、 20243Executive SummaryPerimeter security alone is no longer sufficient for securing critical infrastructure due to evolving threats,including advanced persistent threats(APTs)from sophisticated adversaries.Once inside the network,the adversary could exploit vulnerabilities to move laterally undetec
4、ted and perform reconnaissance or disrupt the network,if a monitoring system were not in place.The best way to prepare for evolving threats is to have a system aligned with a zero trust architecture(ZTA)that secures micro-perimeters across the entire mobile network and provides the ability to identi
5、fy,protect,detect,respond,and recover from evolving attacks.Industry standards define technical capabilities that support a ZTA,but these capabilities need to be complemented with automated security operations to continuously achieve the desired security posture.This whitepaper describes a security
6、management function that automates and orchestrates network security operations to help mobile network operators(MNOs)achieve a ZTA aligned with the US National Institute of Standards and Technology(NIST)Zero Trust Architecture 1 and US Cybersecurity and Infrastructure Security Agency(CISA)Zero Trus