Establishing a Strong Security Posture for Open RAN (2022)

By Scott Poretsky, Ericsson

The goal of this paper is to present the security risks and recommend security controls to establish a strong security posture for Open RAN deployments. Section 2 of the paper provides a baseline discussion of evolving Open RAN architectures, including O-RAN from the O-RAN Alliance. Section 3 introduces the Open RAN security posture, presenting the security tradeoffs of Open RAN and expanded attack surface of the O-RAN architecture. Section 4 discusses additional security considerations for a strong Open RAN security posture with focus on ZTA and cloud security to support deployment of 5G critical infrastructure for protection against external and internal threats. Section 5 provides a detailed technical analysis of the security risks across the O-RAN architecture and recommends security controls to mitigate those risks. Recommended security controls are provided with the goal to strive towards a ZTA that protects against internal and external threats, ensuring Open RAN deployments will be secure.

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

Open Radio Access Network (RAN): How Fast Can We Get There?
By Mark Poletti, CableLabs; Omkar Dharmadhikari, CableLabs; Srinivas Sriram, Delartech
2023
Internet of Things Security: Implement a Strong, Simple & Massively Scalable Solution
By Ron Ih, Kyrio
2018
Privacy Posture 2022 - The Intersection of Technology, Policy, Standards, and Security
By Brian Scriber, CableLabs
2022
Security of Open Distributed Architectures: Yet Another SDN and NFV Security Paper
By Steve Goeringer, CableLabs; Dr. Indrajit Ray, Colorado State University
2017
5G Security & Protection Framework
By Vasu Dalal & Patrick Nta, NOKIA
2021
Zero Trust Security Architecture for The Enterprise
By Sarah Weinstein, Christopher Zarcone, Stephen Zevan; Comcast
2022
Capitalizing on the Evolved Communications Experience
By Kjell Johansson, Ericsson Inc
2019
5G Fronthaul Over DOCSIS: Transporting O-RAN’s Split 7-2x over DOCSIS
By Mark Grayson & John Chapman, Cisco Systems
2021
A Supply Chain of Weak Links: Open Source Versus Proprietary Software Threat Analysis
By Brian A. Scriber, CableLabs
2023
Internet Service Providers and Cybersecurity: Device Identification and Security at the Edge
By Scott Dotto, Charter Communications; Justinas Bisikirskas, CUJO AI; Kyle Johnson, Charter Communications; Leonardas Marozas, CUJO AI; Tyson Vinson, Charter Communications
2023
More Results >>