AMI’s Collaboration with NIST® National Cybersecurity Center of Excellence Details Solutions for 5G Security

Jun 22, 2022 | FIRMly Secure, Tech Blog

To help organizations effectively manage 5G-related cybersecurity risks, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) launched the 5G Cybersecurity project. AMI along with our fellow collaborators were selected to work with the NCCoE on this project. Together, we are addressing the challenge of safeguarding 5G technology from cyberattacks as 5G development, deployment, and usage evolves. We are addressing these challenges by designing and implementing examples of practical solutions that operators and users of 5G networks can use to mitigate 5G cybersecurity risks.

Our proposed solutions build upon the work of another NCCoE project, Trusted Cloud, where hardware-enabled security serves as the foundation of cloud security. We are focused on a combination of 5G standards-based security features, as well as a secure cloud-based hosting infrastructure. The result will be a commercial-grade security reference architecture for 5G networks that bridges the gap between IT and telecommunications cybersecurity capabilities.

The preliminary draft guide is open for public comment until June 27. We encourage anyone with a stake in securing 5G networks to share their expertise with us. Commercial mobile network operators, potential private 5G network operators, and organizations using and managing 5G-enabled technology will find this publication of particular interest. 

AMI is working with the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) on the 5G Cybersecurity Project to develop practical, interoperable cybersecurity approaches that show how the components of 5G architectures can securely mitigate risks and meet industry sectors’ compliance requirements. 5G standards have been designed to support use case–specific capabilities by way of network deployment options. The proposed proof-of-concept solution will integrate commercial and open source products that leverage cybersecurity standards and recommended practices to showcase 5G’s robust security features. NIST does not evaluate commercial products under this consortium and does not endorse any product or service used. Additional information on this consortium can be found at

Submit your feedback online or send an email to [email protected] 

To receive updates about our progress, please join the 5G Community of Interest. And finally, please share this post with your network to let them know of its availability.  

About the National Cybersecurity Center of Excellence

The National Institute of Standards and Technology’s National Cybersecurity Center of Excellence is a collaborative hub where industry, organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity challenges. 

*While the example implementation uses certain products, NIST and the NCCoE do not endorse these products. The guide presents the characteristics and capabilities of those products, which an organization’s security experts can use to identify similar standards-based products that will fit with their organization’s existing tools and infrastructure.

About AMI

AMI is Firmware Reimagined for modern computing. As a global leader in Dynamic Firmware for security, orchestration and manageability solutions, AMI enables the world’s compute platforms from on-premises to the cloud to the edge. AMI’s industry-leading foundational technology and unwavering customer support have generated lasting partnerships and spurred innovation for some of the most prominent brands in the high-tech industry. AMI is also a critical provider to the Open Compute ecosystem and is a member of numerous industry associations and standards groups, such as the Unified EFI Forum (UEFI), PICMG, National Institute of Standards and Technology (NIST), National Cybersecurity Excellence Partnership (NCEP), and the Trusted Computing Group (TCG).

You May Also Like…