5G Core Network Security Assessment Checklist

This 5G core network security assessment ensures compliance with 3GPP TS 33.501 Security Architecture for 5G System, GSMA NESAS (Network Equipment Security Assurance Scheme), CISA 5G Security Evaluation Guidance, and NIST IR 8374 5G Cybersecurity. Designed for telecom security engineers to assess subscriber privacy, roaming security, and API protection.

  • Industry: Telecommunications & IT
  • Frequency: Annually
  • Estimated Time: 60-90 minutes
  • Role: Telecom Security Engineer / CISO
  • Total Items: 17
  • Compliance: 3GPP TS 33.501 Security Architecture for 5G System, GSMA NESAS Network Equipment Security Assurance, CISA 5G Security Evaluation Guidance (2023), NIST IR 8374 5G Cybersecurity: Scenarios and Concerns, ENISA 5G Threat Landscape and Risk Assessment

Subscriber Identity and Authentication

5G subscriber privacy and mutual authentication verification.

  • SUCI (Subscriber Concealed Identifier) implemented in all UEs?
  • 5G-AKA or EAP-AKA' authentication protocol implemented?
  • AUSF (Authentication Server Function) operational and redundant?
  • Network Function service authorization via OAuth 2.0 (RFC 6749)?
  • UDM (Unified Data Management) access restricted to authorized NFs?

Roaming Security and SEPP

N32 interface Security Edge Protection Proxy assessment.

  • SEPP deployed at N32 interface for all roaming connections?
  • TLS 1.3 enforced on all N32 inter-operator interfaces?
  • IPX provider security assessed for roaming routes?
  • Roaming Security Notes

Service Based Architecture API Security

5GC SBA API access controls and north-bound interface security.

  • OAuth 2.0 access tokens required for all network function services?
  • API gateway with rate limiting and anomaly detection deployed?
  • TLS 1.2 or higher enforced on all intra-PLMN NF-NF interfaces?
  • All API calls logged and correlated in security monitoring?

User Plane Integrity and Encryption

Data plane security protection verification.

  • User Plane Integrity Protection enabled for all bearers?
  • User Plane ciphering enabled on all active bearers?
  • Lawful Intercept (LI) configured per national regulatory requirements?
  • 5G Core Security Assessment Notes

Related IT & Data Security Checklists

Related Telecom Checklists

Why Use This 5G Core Network Security Assessment Checklist?

This 5g core network security assessment checklist helps telecommunications & it teams maintain compliance and operational excellence. Designed for telecom security engineer / ciso professionals, this checklist covers 17 critical inspection points across 4 sections. Recommended frequency: annually.

Ensures compliance with 3GPP TS 33.501 Security Architecture for 5G System, GSMA NESAS Network Equipment Security Assurance, CISA 5G Security Evaluation Guidance (2023), NIST IR 8374 5G Cybersecurity: Scenarios and Concerns, ENISA 5G Threat Landscape and Risk Assessment. Regulatory-aligned for audit readiness and inspection documentation.

Frequently Asked Questions

What does the 5G Core Network Security Assessment Checklist cover?

This checklist covers 17 inspection items across 4 sections: Subscriber Identity and Authentication, Roaming Security and SEPP, Service Based Architecture API Security, User Plane Integrity and Encryption. It is designed for telecommunications & it operations and compliance.

How often should this checklist be completed?

This checklist should be completed annually. Each completion takes approximately 60-90 minutes.

Who should use this 5G Core Network Security Assessment Checklist?

This checklist is designed for Telecom Security Engineer / CISO professionals in the telecommunications & it industry. It can be used for self-assessments, team audits, and regulatory compliance documentation.

Can I download this checklist as a PDF?

Yes, this checklist is available as a free PDF download. You can also use it digitally in the POPProbe mobile app for real-time data capture, photo documentation, and automatic reporting.

Browse More Checklists