Skip navigation
Evolving Open RAN Security

Evolving Open RAN security

A path forward to build Zero Trust Architecture (ZTA)

A deep dive into the security aspects of Open RAN

Due to its network functions, interfaces and technologies, Open RAN has an expanded threat surface and is at increased risk of internal threats when compared to traditional RAN. In this paper we have taken a deep dive into these threats and what can be done to mitigate them.

Evolving Open RAN Security

Cloud based critical infrastructure needs to be protected from external and internal threats with a Zero Trust Architecture (ZTA). This paper presents an analysis of the expanded Open RAN attack surface, showcases the progress made in the O-RAN Alliance and recommended security controls to achieve a ZTA in Open RAN.

Download the paper

Findings

Increased Open RAN Security risks

Increased Open RAN Security risks

It is widely acknowledged that Open RAN, including O-RAN and Cloud RAN, has an expanded threat surface due to new network functions, interfaces, and technologies leading to an increased risk of internal threats compared to traditional RAN.

Securing O-RAN architecture

Securing O-RAN architecture

The O-RAN architecture must be specified, built, implemented and operated so that its functions, interfaces and data are secured with built-in confidentiality, integrity and availability protection against external and internal threats.

General security considerations for Open RAN

General security considerations for Open RAN

In general Open RAN has security considerations beyond the O-RAN architecture. It is important to assess the attack surfaces for Open RAN in hybrid cloud deployments, cloud-native technologies, APIs, and AI/ML.

Path forward to a zero-trust architecture

Path forward to a zero-trust architecture

A path forward to a secure Open RAN from external and internal threats is to build a Zero Trust Architecture (ZTA) and Ericsson recommends security controls to achieve a ZTA in Open RAN.

Related content