Table of Contents
- List of Figures
- List of Tables
- Title and Copyright Information
- 1 Introduction
- 2 Overview
- 3 Cloud Native Core Network Functions
- 4 Secure Development Practices
- 5 Trust Model
- 6 Common Security Recommendations and Procedures
- 7 Cloud Native Environment Security Recommendations and Procedures
- 8 4G/5G Core Network Function Security Recommendations and Procedures
- A Cloud Native Core Network Port Flows