5G Resource Library


CISA’s National Risk Management Center (NRMC) has compiled this library of free, voluntary resources to help the public and stakeholders better understand the wide array of 5G benefits, the risks that comes with 5G deployment, and steps that can be taken now to ensure 5G security and resilience.

Whether you’re curious about the fundamentals or in the process of deploying 5G, this library includes the National 5G Strategy, CISA’s 5G Strategy, educational videos, 5G cloud cybersecurity guidance, and other resources.

CISA's 5G Resources

CISA 5G Strategy

The CISA 5G Strategy details CISA’s approach to advance the development and deployment of a secure and resilient 5G, one that promotes national security, data integrity, technological innovation, and economic opportunity for the United States and its allied partners. 

 5G Basics Infographic

The 5G Basics Infographic educates stakeholders on 5G basics, use-cases, how it compares to 4G, and key 5G challenges and risks.

5G Market Penetration and Risk Factors Infographic

This infographic provides a high-level overview of select mobile network equipment components market leaders, major components of 5G networking, and points of vulnerability in the 5G network.

Edge vs. Core - An Increasingly Less Pronounced Distinction in 5G Networks

This paper informs stakeholders about how edge computing increases the risks of untrusted components into 5G networks by moving core functions away from traditional network boundaries. The product is intended to provide an overview of edge computing and represents CISA’s analysis of the risks associated with installation of untrusted components into 5G infrastructures.

Overview of Risks Introduced by 5G Adoption in the United States

The paper provides an overview of 5G technology and represents CISA’s analysis of the vulnerabilities likely to affect the secure adoption and implementation of 5G technologies. This analysis represents the beginning of CISA’s thinking on this issue, and not the culmination of it.

Potential Threat Vectors to 5G Infrastructure 

CISA, the National Security Agency, and the Office of the Director of National Intelligence, as part of the Enduring Security Framework Working Group (a cross-sector, public-private working group), examined three major 5G threat vectors—standards, the supply chain, and threats to systems architecture—to develop a summary and technical review of types of threats posed by 5G adoption in the U.S. and sample scenarios of 5G risks.

Security Guidance for 5G Cloud Infrastructures Part I: Prevent and Detect Lateral Movement 

CISA and the National Security Agency published 5G cloud cybersecurity guidance created by the Enduring Security Framework Working Group (a cross-sector, public-private working group). This paper is the first of a four-part series intended to help 5G providers, operators, and customers reduce their risk of lateral movement in cloud architecture. 

Security Guidance for 5G Cloud Infrastructures Part II: Securely Isolate Network Resources

CISA and the National Security Agency published 5G cloud cybersecurity guidance created by the Enduring Security Framework Working Group (a cross-sector, public-private working group). The second of a four-part series, this guidance is intended to help 5G providers, operators, and customers with understanding good container security hygiene and implementing real-time threat detection. 

Security Guidance for 5G Cloud Infrastructures Part III: Data Protection

CISA and the National Security Agency published 5G cloud cybersecurity guidance created by the Enduring Security Framework Working Group (a cross-sector, public-private working group). The third of a four-part series, this guidance is intended to help 5G providers, operators, and customers with protecting the confidentiality, integrity, and availability of data within a 5G cloud infrastructure.

Security Guidance for 5G Cloud Infrastructures Part IV: Ensure Integrity of Cloud Infrastructure 

CISA and the National Security Agency published 5G cloud cybersecurity guidance created by the Enduring Security Framework Working Group (a cross-sector, public-private working group). The final in the four-part series, it provides guidance on platform integrity, build time security, launch time integrity, and micro services infrastructure integrity.

CISA’s 5G Innovation & Transformation Video Series

This video, CISA’s Role in 5G Security and Implementation, explains the evolution of telecommunication networks from 1G to 5G, its implications to the Nation’s infrastructure and National Critical Functions, and CISA’s role in working with industry and the international community to help enhance ensure 5G security and implementation.

This video, 5G Implementation Security Risks, identifies the five primary buckets of vulnerability (5G deployment, network security, use of untrustworthy components, the ICT supply chain, and the possible loss of competition and choice) that provide the foundation needed to understand 5G risk.

This video, 5G Spectrum, provides an overview of the three different sections of the radio frequency spectrum—5G low band, 5G mid band, and 5G high band— that wireless carriers are using to deploy 5G cellular network technology and the challenges that comes with deployment.

With faster download speeds, reduced wait times, and increased capacity, this video, 5G Use Cases, details these three primary use cases that were developed by standard bodies to guide how 5G would improve upon previous generations to create a better user experience.

5G External Resources

These resources are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide warranties of any kind regarding this information, nor does it endorse any commercial product, service, or subjects of analysis. Any references to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by DHS.

3rd Generation Partnership Project (3GPP)

  • A telecommunications standards organization that develops a series of releases to provide developers with a stable platform for the implementation of cellular telecommunication features. Releases 15, 16, and 17 focus on 5G.

Framework to Conduct 5G Testing

  • A framework by the Federal Mobility Group (FMG) to support the diverse needs of federal use-cases of 5G as well as coordination of 5G test activities across the federal government.

National Strategy to Secure 5G

  • Released in March 2020, the National Strategy to Secure 5G outlines how the Nation will safeguard 5G infrastructure domestically and abroad. In January 2021, the accompanying Implementation Plan was released. Both document puts the United States on the path to make sure that we are equipped to continue development, deployment, and management of secure and reliable 5G. 

National Telecommunications and Information Administration (NTIA)

  • Housed within the Department of Commerce, NTIA is principally responsible for advising the President on telecommunications and information policy issues.

O-RAN ALLIANCE

  • An effort committed to transforming radio access networks (RAN) towards open, intelligent, virtualized and fully interoperable RAN.

State Department’s 5G site 

  • Provides the latest security and policy concerns related to 5G.


For questions, please email 5G@cisa.dhs.gov.

Was this webpage helpful?  Yes  |  Somewhat  |  No