{"id":843259,"date":"2024-02-20T13:02:44","date_gmt":"2024-02-20T13:02:44","guid":{"rendered":"https:\/\/www.capgemini.com\/no-no\/?p=843259&#038;preview=true&#038;preview_id=843259"},"modified":"2025-09-04T09:06:42","modified_gmt":"2025-09-04T09:06:42","slug":"adopting-zero-trust-for-private-5g","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","title":{"rendered":"Adopting zero trust for private 5G"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Adopting zero trust for private 5G<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2021\/08\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Kiran Gurudatt<\/h5><h5 class=\"blog-date\">20 Feb 2024<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<p>For organizations across the world, 5G has the potential to drive digital transformation and unlock new business opportunities, whether that\u2019s connecting factories across vast areas or optimizing new energy sites like wind farms. However, as organizations embrace 5G, they must also address the escalating cybersecurity threats that come with this technological evolution.<\/p>\n\n\n\n<p>Traditional security models, which rely on perimeter-based defenses and implicit trust built within the industrial network, are ill-equipped to handle the dynamic and distributed nature of 5G networks. This is where zero trust security principles come into play.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-defining-zero-trust\"><strong>Defining zero trust<\/strong><\/h4>\n\n\n\n<p>Zero trust assumes that an attacker may already be present within the network, and a constant cycle of validation needs to be in motion to prevent further infiltration and lateral movements. It offers a proactive and adaptive approach to security, emphasizing continuous verification and strict access controls to mitigate risks and ensure the integrity of 5G networks.<\/p>\n\n\n\n<p>For Industrial enterprises deploying private 5G networks, a zero-trust approach means that all access to 5G networks should be explicitly authenticated, authorized, and monitored, and access privileges should be continuously reviewed. No access should be granted implicitly or by default.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-zero-trust-for-private-5g-networks\">Zero trust for Private 5G Networks<\/h4>\n\n\n\n<p>Our strategy for implementing zero trust in private 5G networks aligns with the vendor-agnostic <a href=\"https:\/\/www.cisa.gov\/zero-trust-maturity-model\">Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Framework<\/a>, addressing security across five pillars of zero trust. By leveraging the right technology and methodology, Capgemini recommends an approach based on zero trust principles for secure deployment of 5G technology in OT networks.<\/p>\n\n\n\n<p>The implementation of robust protection and seamless operations needs to cover all five key pillars:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity<\/strong>: Define and enforce granular access control policies for industrial users, allowing specific users to perform specific tasks on a specific asset. These policies should consider contextual requirements such as the time and location of a user\u2019s request.<\/li>\n\n\n\n<li><strong>Devices:&nbsp;<\/strong>Validate the end devices and ensure that the trust level of the devices is assessed. Policies need to be enforced to allow the segmentation of devices based on 5G network-specific identities e.g. Subscription Permanent Identifier (SUPI)\/Subscription Concealed Identifier (SUCI). Policies should support device identity matching and context-based segmentation that allows the grouping of devices based on device type, cellular identities, location, along with the quality of service (QoS), latency, bandwidth, redirection, etc.<\/li>\n\n\n\n<li><strong>Networks:&nbsp;<\/strong>Zero trust requires a clear separation of communication flows for network control and application\/service tasks. For organizations using private 5G networks, a secure communication channel should be established when communicating with different locations, in addition to enabling secure remote access so that only those with the correct authentication and authorization credentials are allowed on the network.<\/li>\n\n\n\n<li><strong>Applications and Workloads:&nbsp;<\/strong>The OT environment hosts various applications that are used for different purposes, such as data collection, process monitoring, and product creation. Access to these applications over a 5G network should be governed by access control policies that enforce application control, thereby minimizing the attack surface at ingress and egress. Policies should also be able to detect workload vulnerabilities and misconfigurations and enable application control based on operator-specific\/standard slices.<\/li>\n\n\n\n<li><strong>Data:<\/strong>&nbsp;Data protection should include measures to protect sensitive industrial information and prevent data loss. Data protection must be supported for both data at rest and data in motion, taking into account data classification and file types. Data flowing from one industrial site to another and to remote users must be inspected for data leakage, and measures must be taken to restrict access to unmanaged devices and unknown users.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-key-industrial-5g-security-use-cases-aligned-with-the-zero-trust-framework-include\"><strong>Key industrial 5G security use cases aligned with the zero-trust framework include:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network segmentation<\/strong>: Improve digital perimeter resilience by enforcing, micro-segmenting, and grouping devices based on device type (CCTV, mobile), vendor, location, QoS, or 5G cellular identities (SUPI\/SUCI).<\/li>\n\n\n\n<li><strong>Secure remote access<\/strong>: Enforce zero trust-based access controls and offer secure remote access to industrial environments deploying 5G assets for internal and third-party users.<\/li>\n\n\n\n<li><strong>Policy enforcement for slices:&nbsp;<\/strong>Apply security policies per network slice or group of slices assigned for various applications, based on their slice ID and thus prevent unauthorized data transfer and block various malicious activities inside industrial environment.<\/li>\n\n\n\n<li><strong>Security monitoring using 5G SOC<\/strong>: Security monitoring of various 5G powered industrial devices (sensors, robots cameras drones end user phones, laptops) in a 5G security operation center (SOC) that offers centralized visibility along with other features such as incident management, vulnerability, and compliance management.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h4>\n\n\n\n<p>Implementing Zero trust for private 5G networks involves several key essential steps that include defining all the key assets to be protected such as applications, devices, data, etc, documenting the traffic flow over the 5G networks and defining fine grained policies that determine access to resources along with logging and monitoring, that provide key insights into network activity. Effectively implementing zero trust across all levels can greatly enhance the security posture of OT networks leveraging 5G technology.<\/p>\n\n\n\n<p>By embracing zero trust principles and integrating them into the fabric of 5G networks, organizations can mitigate risks, protect sensitive data, and ensure the integrity of their networks in an increasingly interconnected and dynamic digital world.<\/p>\n\n\n\n<p>You can learn more about our approach and our partners by joining us at&nbsp;<a href=\"https:\/\/www.capgemini.com\/news\/events\/mobile-world-congress-in-barcelona\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mobile World Congress<\/a>&nbsp;in Barcelona between 26\u201329 February 2024.<\/p>\n\n\n\n<p><a id=\"_msocom_1\"><\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Author<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2023\/03\/Kiran-Gurudatt-1-3.jpg\" alt=\"Kiran Gurudatt\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/tgkiran\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Kiran Gurudatt<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Director, Cybersecurity, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/tgkiran\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>.<\/p>\n","protected":false},"author":506,"featured_media":843260,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"82c82fe4-21b1-409d-b312-f975667d1aab\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[123],"content-group":[],"class_list":["post-843259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Adopting zero trust for private 5G - Capgemini Norway<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adopting zero trust for private 5G\" \/>\n<meta property=\"og:description\" content=\".\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Norway\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T13:02:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T09:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\",\"name\":\"Adopting zero trust for private 5G - Capgemini Norway\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg\",\"datePublished\":\"2024-02-20T13:02:44+00:00\",\"dateModified\":\"2025-09-04T09:06:42+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg\",\"width\":2880,\"height\":1801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/no-no\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adopting zero trust for private 5G\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#website\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/\",\"name\":\"Capgemini Norway\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/no-no\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Adopting zero trust for private 5G - Capgemini Norway","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","og_locale":"en_US","og_type":"article","og_title":"Adopting zero trust for private 5G","og_description":".","og_url":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","og_site_name":"Capgemini Norway","article_published_time":"2024-02-20T13:02:44+00:00","article_modified_time":"2025-09-04T09:06:42+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","url":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","name":"Adopting zero trust for private 5G - Capgemini Norway","isPartOf":{"@id":"https:\/\/www.capgemini.com\/no-no\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","datePublished":"2024-02-20T13:02:44+00:00","dateModified":"2025-09-04T09:06:42+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#primaryimage","url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","width":2880,"height":1801},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/no-no\/"},{"@type":"ListItem","position":2,"name":"Adopting zero trust for private 5G"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/no-no\/#website","url":"https:\/\/www.capgemini.com\/no-no\/","name":"Capgemini Norway","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/no-no\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/no-no\/author\/"}]}},"blog_topic_info":[{"id":123,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":123,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":579,"name":"santanughosh","slug":"santanughosh"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Adopting zero trust for private 5G","url":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Norway","logo":""},"keywords":[],"dateCreated":"2024-02-20T13:02:44Z","datePublished":"2024-02-20T13:02:44Z","dateModified":"2025-09-04T09:06:42Z"},"rendered":"<meta name=\"parsely-title\" content=\"Adopting zero trust for private 5G\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/adopting-zero-trust-for-private-5g\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-02-20T13:02:44Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Norway","distributor_original_site_url":"https:\/\/www.capgemini.com\/no-no","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2024\/02\/MWC-web-banner.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2021\/08\/cg-logo.png?w=330","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/843259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/users\/506"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/comments?post=843259"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/843259\/revisions"}],"predecessor-version":[{"id":861391,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/843259\/revisions\/861391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/media\/843260"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/media?parent=843259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/categories?post=843259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/tags?post=843259"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/brand?post=843259"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/service?post=843259"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/industry?post=843259"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/partners?post=843259"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/blog-topic?post=843259"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/content-group?post=843259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}