CLOUD AND AI NETWORKING Fast-track connectivity, capacity, and success
Fast-track connectivity, capacity, and success

DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”

FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

Fast-track connectivity, capacity, and success

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.

Promote your brand in TeckNexus Private Network Magazines. Limited sponsor placements available—reserve now to be featured in upcoming 2025 editions.

Fast-track connectivity, capacity, and success

TeckNexus Newsletters

I acknowledge and agree to receive TeckNexus communications in line with the T&C and privacy policy

Whitepaper
This 5G network assurance white paper, sponsored by RADCOM covers critical requirements, technologies, and approaches that assurance solutions must support....
CLOUD AND AI NETWORKING Fast-track connectivity, capacity, and success Accelerate growth and monetize AI applications with industry-leading scale, simplified operations, and proven experience
Private Network Solutions - TeckNexus

Subscribe To Our Newsletter

Tech News & Insight
Tech News & Insight
Tech News & Insight
Tech News & Insight
Tech News & Insight

Feature Your Brand in Upcoming Magazines

Showcase your expertise through a sponsored article or executive interview in TeckNexus magazines, reaching enterprise and industry decision-makers.

CLOUD AND AI NETWORKING Fast-track connectivity, capacity, and success
Scroll to Top

Private Network Security

4 Pillars for Securing Private 5G, LTE and CBRS Cellular Networks