{"id":538807,"date":"2025-04-03T04:45:12","date_gmt":"2025-04-03T04:45:12","guid":{"rendered":"https:\/\/www.capgemini.com\/co-es\/?p=538807&#038;preview=true&#038;preview_id=538807"},"modified":"2025-04-03T04:46:59","modified_gmt":"2025-04-03T04:46:59","slug":"how-to-conduct-a-watertight-risk-assessment-for-5g-networks","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","title":{"rendered":"How to conduct a watertight risk assessment for 5G networks"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>How to conduct a watertight risk assessment for 5G networks<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/Aarthi-Krishna.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Aarthi Krishna<\/h5><h5 class=\"blog-date\">29 Sep 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n\n<h2 class=\"wp-block-heading\" id=\"h-by-2025-5g-networks-are-nbsp-expected-to-cover-nbsp-a-third-of-the-world-s-population-as-the-global-footprint-of-5g-expands-so-does-the-associated-security-risk-while-the-underlying-security-capabilities-of-5g-are-superior-to-those-of-previous-generations-they-are-not-without-limitations\">By 2025, 5G networks are&nbsp;<a href=\"https:\/\/www.gsma.com\/futurenetworks\/ip_services\/understanding-5g\/5g-innovation\/\">expected to cover<\/a>&nbsp;a third of the world\u2019s population. As the global footprint of 5G expands, so does the associated security risk. While the underlying security capabilities of 5G are superior to those of previous generations, they are not without limitations.<\/h2>\n\n\n<p>Retail customers use public networks with limited security liability, but most organizations using 5G (typically for manufacturing and operations) will need to build a private network or use a hybrid public\/private model that is built to meet their specific requirements. The complexity of such an ecosystem makes risk assessment an essential part of implementing security for 5G.<\/p>\n\n\n<p>In the&nbsp;<a href=\"https:\/\/www.capgemini.com\/insights\/expert-perspectives\/understanding-5g-security\/\">previous blog<\/a>, we looked at the challenges associated with 5G deployment architectures and why risk assessment must be holistic in nature, covering both the horizontal and vertical axes of the network. Here, we take a closer look at what it takes to conduct a full risk assessment.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-essential-steps-for-a-robust-risk-assessment\"><strong>Essential steps for a robust risk assessment<\/strong><\/h2>\n\n\n<p>A thorough risk assessment ensures full coverage of the 5G network. It has to be comprehensive and end-to-end, with a full understanding of the people, processes, and technology risks, while adhering to the necessary frameworks, such as <a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST<\/a>,&nbsp;<a href=\"https:\/\/www.isa.org\/intech-home\/2018\/september-october\/departments\/new-standard-specifies-security-capabilities-for-c\">the ISA\/IEC 62443 standard<\/a>,&nbsp;and&nbsp;<a href=\"https:\/\/fight.mitre.org\/\">MITRE FiGHT<\/a><\/p>\n\n\n<p>At Capgemini, we follow these three essential steps as with any risk assessment :<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-nbsp-1-discovery\"><strong>&nbsp;1. Discovery<\/strong><\/h4>\n\n\n<p>The discovery phase aims to gather all necessary information about the 5G environment, its assets, the number of and types of devices, and the use cases deployed, along with the organization\u2019s risk appetite and existing security policies.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-2-assessment\">2. <strong>Assessment<\/strong><\/h4>\n\n\n<p>Once all the necessary information has been collected, the assessment phase evaluates security controls and policies that are pertinent to the 5G network. Every identified gap is assigned a risk score, and reports and visual aids are created to clearly communicate these findings.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-nbsp-3-reporting\"><strong>&nbsp;3. Reporting<\/strong><\/h4>\n\n\n<p>After the assessment, a complete view of the current maturity level and the risk scores are reported, and supporting recommendations are presented to enhance the security posture.<\/p>\n\n\n<p>Our approach to 5G risk assessment is divided into two key parts, one covering the technical controls and the other covering managerial and operational controls:<\/p>\n\n\n<ul class=\"wp-block-list\">\n\n<li><strong>Technical controls:<\/strong> This part of the assessment addresses the technical controls implemented in a 5G network spanning its various components that include the endpoints, mobile edge computing (MEC), radio access network (RAN), core, and other functional elements like NFV and network slicing. For each of these components, the assessment is further classified into several sub-categories. For instance, the sub-categories for which an endpoint is assessed include its access control, network security, supplier security, physical security, and asset management. Such an approach to sub-categorization is especially useful when assessing functional elements. For example, network slicing in 5G is a key functional element that enables the delivery of meaningful guarantees for network coverage, performance, capacity, or even security. Slicing essentially divides the underlying physical network infrastructure into multiple virtual networks to cater to a specific quality of service (QoS), such as low latency for real-time applications, high bandwidth for multimedia streaming, and ultra-reliability for critical communications. While this adds significant value to a network and is expected to provide monetization opportunities, each slice requires specific security requirements to protect against attack vectors relevant to itself. Our risk assessment approach covers the following sub-categories for slicing:<br>&#8211; security for the installation and configuration of a slice<br>&#8211; security during the slice preparation phase<br>&#8211; security during the slice run phase, security for the slice decommissioning phase<br>&#8211; inter- and intra-slice security<br>&#8211; slice interface security<br><\/li>\n\n\n<li><strong>Management &amp; operational controls: <\/strong>This part of the assessment covers risks primarily related to governance, human resource management, incident management, operation management, monitoring audit and testing, and threat awareness. This means asking those non-technical but critical questions such as:<br>&#8211; Has a potential dependency on a single supplier of 5G equipment been considered?<br>&#8211; Have personnel with access to critical or sensitive components of 5G networks been security-vetted?<br>&#8211; Are there documented plans in place in case of a disaster affecting the ongoing operation of the 5G network?<\/li>\n\n<\/ul>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-some-of-the-key-advantages-of-this-risk-assessment-include-ensuring-these-qualities\">Some of the key advantages of this risk assessment include ensuring these qualities:<\/h4>\n\n\n<ul class=\"wp-block-list\">\n\n<li><strong>Standards:<\/strong> It brings together the recommendations and guidance from various organizations, such as ENISA, ETSI, IETF, ITU-T, ISO, ORAN, OWASP, NIST, and GDPR.<\/li>\n\n\n<li><strong>Deployment model:<\/strong> It addresses security risk for various non-public network (NPN) deployment models, including stand-alone deployment and public network integrated deployment.<\/li>\n\n\n<li><strong>End-to-end capabilites:<\/strong> It covers the entire operational technology (OT) and Internet of Things (IoT) ecosystem that sits on top of the 5G network. This includes security concerning manufacturers, suppliers, telco operators, edge, OT, and IoT devices.<\/li>\n\n\n<li><strong>Compliance<\/strong>: It is compliant to industry-accepted standards (e.g., IEC 62443) to facilitate auditing and certification. It incorporates functional and operational requirements for different security levels such as SL1, SL2, and SL3.<\/li>\n\n\n<li><strong>Comprehensive<\/strong> <strong>Coverage:<\/strong> It provides full comprehensive coverage for technical and non-technical risks while at the same time covering the entire 5G architecture from edge devices, RAN, core, MEC, cloud, and to the applications.<\/li>\n\n<\/ul>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-ongoing-monitoring-and-compliance\"><strong>Ongoing monitoring and compliance<\/strong><\/h4>\n\n\n<p>A sound risk assessment is the start of any security journey. After the assessment and the deployment of various security controls, it is crucial to establish an ongoing process for monitoring and responding to security events in the 5G network. Continuous monitoring allows organizations to detect and respond to any security incident promptly, maintaining a robust security posture \u2013 the next blog in the series will consider how to deliver such a monitoring program for 5G networks. Stay tuned.<\/p>\n\n\n<p>Contact&nbsp;<a href=\"https:\/\/www.capgemini.com\/services\/cybersecurity\/\">Capgemini<\/a>&nbsp;today to find out about&nbsp;<a href=\"https:\/\/www.capgemini.com\/solutions\/5g-security-risk-assessment-services\/\">5G security<\/a>.<\/p>\n\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<p><\/p>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/Aarthi-Krishna.jpg\" alt=\"Aarthi Krishna\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/aarthikrishna\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Aarthi Krishna<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Global Head, Intelligent Industry Security, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/aarthikrishna\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Aarthi Krishna is the Global Head of Intelligent Industry Security with the Cloud, Infrastructure and Security (CIS) business line at Capgemini. In her current role, she is responsible for the Intelligent Industry Security practice with a portfolio focussed on both emerging technologies (as OT, IoT, 5G and DevSecOps) and industry verticals (as automotive, life sciences, energy and utilities) to ensure our clients can benefit from a true end to end cyber offering.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/Kiran-Gurudatt-1.jpg\" alt=\"Kiran Gurudatt\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/tgkiran\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Kiran Gurudatt<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Director, Cybersecurity, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/tgkiran\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":149,"featured_media":538808,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"0b5db6d9-0a71-4da3-8790-267ce510538a\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[46],"content-group":[],"class_list":["post-538807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to conduct a watertight risk assessment for 5G networks<\/title>\n<meta name=\"description\" content=\"Our latest blog by Aarthi Krishna &amp; Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to conduct a watertight risk assessment for 5G networks\" \/>\n<meta property=\"og:description\" content=\"Our latest blog by Aarthi Krishna &amp; Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Colombia\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-03T04:45:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T04:46:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\",\"url\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\",\"name\":\"How to conduct a watertight risk assessment for 5G networks\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/co-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg\",\"datePublished\":\"2025-04-03T04:45:12+00:00\",\"dateModified\":\"2025-04-03T04:46:59+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Our latest blog by Aarthi Krishna & Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#breadcrumb\"},\"inLanguage\":\"es-MX\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/co-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to conduct a watertight risk assessment for 5G networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/co-es\/#website\",\"url\":\"https:\/\/www.capgemini.com\/co-es\/\",\"name\":\"Capgemini Colombia\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/co-es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-MX\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/co-es\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to conduct a watertight risk assessment for 5G networks","description":"Our latest blog by Aarthi Krishna & Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","og_locale":"es_MX","og_type":"article","og_title":"How to conduct a watertight risk assessment for 5G networks","og_description":"Our latest blog by Aarthi Krishna & Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.","og_url":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","og_site_name":"Capgemini Colombia","article_published_time":"2025-04-03T04:45:12+00:00","article_modified_time":"2025-04-03T04:46:59+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","url":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","name":"How to conduct a watertight risk assessment for 5G networks","isPartOf":{"@id":"https:\/\/www.capgemini.com\/co-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","datePublished":"2025-04-03T04:45:12+00:00","dateModified":"2025-04-03T04:46:59+00:00","author":{"@id":""},"description":"Our latest blog by Aarthi Krishna & Kiran Gurudatt takes you through the essential steps for a comprehensive 5G network risk assessment.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#breadcrumb"},"inLanguage":"es-MX","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/"]}]},{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#primaryimage","url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","contentUrl":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/co-es\/"},{"@type":"ListItem","position":2,"name":"How to conduct a watertight risk assessment for 5G networks"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/co-es\/#website","url":"https:\/\/www.capgemini.com\/co-es\/","name":"Capgemini Colombia","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/co-es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-MX"},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/co-es\/author\/"}]}},"blog_topic_info":[{"id":46,"name":"Cloud"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":46,"name":"Cloud","slug":"cloud"}],"following_users":[{"id":141,"name":"automator","slug":"automator"},{"id":224,"name":"vikramjanugade","slug":"vikramjanugade"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"How to conduct a watertight risk assessment for 5G networks","url":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Colombia","logo":""},"keywords":[],"dateCreated":"2025-04-03T04:45:12Z","datePublished":"2025-04-03T04:45:12Z","dateModified":"2025-04-03T04:46:59Z"},"rendered":"<meta name=\"parsely-title\" content=\"How to conduct a watertight risk assessment for 5G networks\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/co-es\/insights\/expert-perspectives\/how-to-conduct-a-watertight-risk-assessment-for-5g-networks\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-04-03T04:45:12Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Colombia","distributor_original_site_url":"https:\/\/www.capgemini.com\/co-es","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/MicrosoftTeams-image-76.jpg","author_title":"Aarthi Krishna","author_thumbnail_url":"https:\/\/www.capgemini.com\/co-es\/wp-content\/uploads\/sites\/25\/2025\/04\/Aarthi-Krishna.jpg?w=535","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/posts\/538807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/comments?post=538807"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/posts\/538807\/revisions"}],"predecessor-version":[{"id":538810,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/posts\/538807\/revisions\/538810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/media\/538808"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/media?parent=538807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/categories?post=538807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/tags?post=538807"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/brand?post=538807"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/service?post=538807"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/industry?post=538807"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/partners?post=538807"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/blog-topic?post=538807"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/co-es\/wp-json\/wp\/v2\/content-group?post=538807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}