# <center><i class="fa fa-edit"></i> 5G: OPEN RAN </center>
###### tags: `Internship`
:::info
The goal is to and understand how O-RAN ALLIANCE deals with security challenges
**Resources:**
[The O-RAN ALLIANCE Security Task Group Tackles Security Challenges on All O-RAN Interfaces and Components](https://www.o-ran.org/blog/2020/10/24/the-o-ran-alliance-security-task-group-tackles-security-challenges-on-all-o-ran-interfaces-and-components)
:::
# OUTPUT
## What makes O-RAN different?
Open RAN develops **Software Defined Networking (SDN)** and **Network Function Virtualization (NFV)** techniques by disaggregating the functions of a traditional RAN.
## O-RAN characteristics
- Speed service introduction and innovation,
- Introduce intelligence into RAN control,
- Enable interoperability among RAN components from different sources,
- Improve supply chain security,
- Reduce network OPEX and CAPEX costs.

```
O-RAN architecture
```
## O-RAN interface advantages
- Disaggregation improves security agility, adaptability and resiliency;
- Security updates and the introduction of new security functions to the RAN can be implemented by modifying a single software component;
- Network functions such as the Near Real-Time RIC, O-CU-CP, O-CU-UP, and O-DU, implemented as containerized microservices can leverage cloud native security advances;
- Hardware resource isolation, automatic reconfiguration, and automated security testing, which can improve both open source vulnerability management and security configuration management.
## O-RAN challenges
- The disaggregation of functions increases the RAN threat surface;
- The increase of the Open RAN dependence on secure development practices within open source communities;
- The use of AI in the RAN may lead to unanticipated consequences as it has in other domains;
- The increasing likelihood of attacks by compromised devices;
- The open fronthaul interface operating the lower layer split (LLS) interface (Due to the separation of the O-DU and O-RU) will cause potential new attack surface in the RAN.
## O-RAN solutions
*O-RAN ALLIANCE Security Task Group (STG) collaborates with O-RAN ALLIANCE Working Groups (WGs) to tackle security challenges on all O-RAN interfaces and components, based on the 3GPP security design practices.*
### STG solutions:
- **Build threat model**: to robust security requirements and solutions.
- **Study the threats to LLS interface**: to gain a thorough understanding that will drive the specification of security controls on the interactions between O-DU and O-RU.
- **Leverage existing O-RU security capabilities and investigating additional capabilities**: to secure the open fronthaul interface between the SMO and O-RU.
- **WG2, WG3 and the STG specify app authenticity controls**: to ensure that x/rApps cannot introduce vulnerabilities into the RAN.
- **Require the O-RAN Software Community (OSC) to adopt industry best practices in the OSC development pipeline**.
- **Leverage and build upon the 3GPP catalogue of security assurance requirements**.

```
PARTIAL VIEW OF THE EXISTING O-RAN SECURITY CONTROLS AND COMMUNITY’S PROGRESS
```
## Conclusion
- O-RAN ALLIANCE follows 3GPP, IETF to deploy and operate Open RAN with the same level of confidence as a 3GPP defined RAN.