Skip navigation
Security considerations for Cloud RAN

Security considerations of Cloud RAN

Securing cloud-based RAN deployments 

How to ensure Cloud-RAN implementations are secure, trusted and robust? Ericsson has recommendations to achieve it.

Cloud-based RAN deployment option is an important step towards a more open RAN architecture. The deployment can provide inherent security advantages such as isolation and geographical redundancy. However, the cloud also introduces new security risks that must be considered.

This technical paper from Ericsson examines threats, vulnerabilities, and security controls for cloud-based RAN deployments and provides recommendations and guidance on best practices with a combination of people, processes, and technology to ensure that RAN implementations, including Cloud RAN, are secure, trusted, and robust.

Many of the recommendations for securing Cloud RAN provided in this paper are also applicable to O-RAN and vRAN, as well as cloud-native 5G Core (5GC).

Download the paper

The following recommendations are provided by two experienced Ericsson experts for operators and cloud providers to secure Cloud RAN:

  • Embrace zero-trust principles to ensure trusted access with certificate-based mutual authentication.
  • Build a secure cloud environment using secure hardware and best practices to establish a trust chain with hardware root of trust.
  • Software development organizations should apply LCM and DevSecOps for cloud-native applications according to industry best practices.
  • Use a security management solution for security policy configuration, access controls, automated validation of configurations, and run-time compliance monitoring.

And more in the paper.

Download the paper

Related topics