The second installment of the Guidance to protect the confidentiality, integrity, and availability of data within a 5G core cloud infrastructure (Securely Isolate Network Resources) is published by the Enduring Security Framework (ESF) of the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA). In particular, the guidance supports 5G providers, operators, and customers to implement container security hygiene and real-time threat detection. The guidance especially focuses on the measures to increase "Pod" security.
Original source