<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:"Segoe UI";
        panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
        {font-family:"Franklin Gothic Book";
        panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
p.xxxmsonormal, li.xxxmsonormal, div.xxxmsonormal
        {mso-style-name:x_x_x_msonormal;
        margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
p.xxxparagraph, li.xxxparagraph, div.xxxparagraph
        {mso-style-name:x_x_x_paragraph;
        margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.xxxnormaltextrun
        {mso-style-name:x_x_x_normaltextrun;}
span.xxxeop
        {mso-style-name:x_x_x_eop;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div>
<div>
<p class="xxxparagraph"><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">Today, Enduring Security Framework (ESF) partners at the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency
 (NSA), and the Office of the Director of National Intelligence (ODNI) published an assessment of 5G network slicing. The paper, “<a href="https://media.defense.gov/2022/Dec/13/2003132073/-1/-1/0/POTENTIAL%20THREATS%20TO%205G%20NETWORK%20SLICING_508C_FINAL.PDF" title="https://media.defense.gov/2022/Dec/13/2003132073/-1/-1/0/POTENTIAL%20THREATS%20TO%205G%20NETWORK%20SLICING_508C_FINAL.PDF">Potential
 Threats to 5G Network Slicing</a>,” is developed by industry and government experts of a working panel under the ESF and it builds upon the 2021
</span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><a href="https://www.cisa.gov/sites/default/files/publications/potential-threat-vectors-5G-infrastructure_508_v2_0%20%281%29.pdf"><span class="xxxnormaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#0563C1">ESF
 Potential Threat Vectors to 5G Infrastructure</span></span></a></span><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif"> paper.</span></span><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">This working panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a network
 slice. For this paper, a network slice is defined as an end-to-end logical network that provides specific network capabilities and characteristics for a user.</span></span><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">Although network slicing is not solely unique to 5G, it is a critical component because 5G specifications call for network
 slicing as a fundamental component and therefore require network operators to adopt security practices that can mitigate threats like those described in this paper, such as Denial of Service, Man-in-the-Middle attacks, and configuration attacks.</span></span><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">As with any emerging technology, with increased benefits come increased risks. This paper intends to introduce 5G stakeholders
 to the benefits associated with network slicing and introduce perceived risks and management strategies that may address those risks. </span></span><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif">  </span></span><o:p></o:p></p>
<p class="xxxparagraph"><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxparagraph" style="font-kerning:none"><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">For more information and resources on 5G, visit
</span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><a href="https://cisa.gov/5g-library"><span class="xxxnormaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#0563C1">cisa.gov/5G-Library</span></span></a></span><span class="xxxnormaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">. </span></span><span class="xxxeop"><span style="font-family:"Franklin Gothic Book",sans-serif"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"> </span><o:p></o:p></p>
<p class="xxxmsonormal"><span style="font-size:12.0pt"> <o:p></o:p></span></p>
</div>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D90EF1.311642F0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>