img
img
img
img

The O-RAN ALLIANCE Security Work Group Continues to Advance O-RAN Security

In 2025, the O-RAN ALLIANCE Security Work Group (WG11) achieved major accomplishments that further strengthened the O-RAN security posture.

  • The European Telecommunications Standards Institute (ETSI) and the Alliance for Telecommunications Industry Solutions (ATIS) published the four O-RAN security specifications.
  • Operator Priorities for security were addressed across O-RAN specifications.
  • Security standardization across the O-RAN architecture was strengthened, with particular focus on Open Fronthaul and Service Management and Orchestration (SMO).
  • Made progress on meeting the CISA “Initial” Zero Trust Maturity Level [7].
  • WG11 hosted the second annual Zero Trust Architecture (ZTA) Standardization Workshop.
  • The O-RAN Security Assurance Program was established with GSMA NESAS using O-RAN Security Assurance Specifications (SCAS).
  • WG11 identified its strategic focus areas for securing O-RAN in 6G.

As O-RAN continues to gain real world deployment experience, WG11 will continue strengthening the security posture with a continuing focus on the Operator Priorities in 2026.

ETSI and ATIS publication

WG11 provides security requirements across the O-RAN architecture, including architecture elements and interfaces, as shown in Figures 1 and 2. 2025 marked a major milestone for the O-RAN ALLIANCE with the European Telecommunications Standards Institute (ETSI) and the Alliance for Telecommunications Industry Solutions (ATIS) publication of its four primary security documents: O-RAN Security Requirements and Controls Specifications [1], O-RAN Security Protocols Specification [2], O-RAN Security Test Specifications [3], and O-RAN Threat Management and Risk Assessment Technical Report [4]. Additionally, the Telecommunications Technology Association (TTA) signed a cooperation agreement to adopt the O-RAN standards. ETSI, ATIS and TTA publication is an acknowledgement of the maturity of the O-RAN ALLIANCE security specifications by standards development organizations (SDOs).

Figure 1. High LevelArchitecture of O-RAN [5]

Figure2. O-RAN Logical Architecture [5]

Operator Priorities for Security

In early 2025, the O-RAN ALLIANCE polled its operator members for their deployment priorities and WG11 used the security-related priorities to guide its 2025 work. The Operator Priorities indicate their shift from evaluating the O-RAN architecture to deploying O-RAN networks.

The Operator Priorities for security address requirements for real-world implementation of O-RAN network deployments. The security priorities are:

  • Specify mandatory support for TLS/mTLS 1.3 on applicable O-RAN interfaces (see Table 1)
  • Complete Open Fronthaul CUS-Plane and M-Plane security requirements and security tests
  • Establish an O-RAN security assurance program for security certification of O-RAN products
  • Continue maturing the O-RAN Zero Trust Architecture
  • Complete the O-Cloud security requirements and security tests
  • Define certificate management requirements for multi-vendor O-RAN deployments

These priorities highlight the practical challenges facing operators as they move to O-RAN.

WG11 responded to the call to action by partnering with the O-RAN Open Fronthaul work group (WG4) on Open Fronthaul security the O-Cloud work group (WG6) on O-Cloud security specifications and tests, and the O-RAN Testing Integration Focus Group (TIFG) on security assurance. WG11 also completed studies on certificate management, applied a zero trust framework to fill security gaps, and advanced the O-Cloud security architecture. The specified security requirements and controls have achieved a high-level security posture based upon a ZTA, as shown in Tables 1 and 2. Further details about these security requirements can be found in [1].

Table 1: O-RAN Interface Security

Security Controls Non-Fronthaul Interfaces Open Fronthaul Interface
A1 O1 O2 E2 Y1 R1 C-plane U-plane S-plane M-plane
Confidentiality TLS TLS TLS IPsec TLS TLS MACsec (optional) PDCP, MACsec (optional) MACsec (optional) TLS/SSH
Integrity TLS TLS TLS IPsec TLS TLS MACsec (optional) PDCP, MACsec (optional) MACsec (optional) TLS/SSH
Authentication mTLS mTLS mTLS IPsec mTLS mTLS 802.1X PNAC, MACsec (optional) 802.1X PNAC, MACsec (optional) 802.1X PNAC, MACsec (optional) mTLS/SSH (mandatory), 802.1X PNAC, MACsec (optional)
Authorization OAuth NACM OAuth OAuth OAuth 802.1X PNAC 802.1X PNAC 802.1X PNAC NACM, 802.1X PNAC
Data Origin Authenticity TLS TLS TLS IPsec TLS TLS MACsec (optional) PDCP, MACsec (optional) MACsec (optional) TLS/SSH
Replay Prevention TLS TLS TLS IPsec TLS TLS MACsec (optional) PDCP, MACsec (optional) MACsec (optional) TLS/SSH

Cross-platform or transversal requirements apply to all O-RAN architecture elements and interfaces. Table 2 lists the mandatory O-RAN requirements for each category of transversal requirements, with details provided in [1].

Table 2: O-RAN Cross-Platform Security Requirements

Category Mandatory Requirements
Application Lifecycle Management • Application signing by vendor
• Signature validation by SMO
• Secure deletion of sensitive data
• Secure decommissioning of applications
Network Protocols and Services • Provider documentation of all required network protocols/services
• Default disablement of unused network protocols/services
Robust Protocol Implementation • Handle unexpected inputs without functional compromise
Robustness of OS and Applications • Known vulnerabilities in the OS and applications be documented by their providers
Password based Authentication • Mitigate risks from password authentication attacks where password authentication is implemented
Software Supply Chain Security • Vendor signed, NTIA compliant SBOM with every O-RAN software delivery
Security Log Management • Identification of security events to log
• Collection of security logs from all O-RAN elements
• Least privileged access controls on security logs
• Logging of anomalous events
• Confidentiality and integrity protection of log data at rest and in transit
• Rotation of logs to prevent data loss
• Use of Micro-perimeters to protect logs
• Time stamping of all logged events
• Inclusion of identity of O-RAN element generating event
Certificate Management Framework • Support of CMPv2
API Security • Support of OWASP API Project security
• Support of certificate-based authentication using mTLS 1.3
• Confidentiality and integrity protection of data in transit with TLS 1.3
• Least privileged authorization using OAuth 2.0
• Input validation
Trust Anchor Provisioning • Pre-provisioning of certificates that chain back to a vendor or operator CA in PNFs
AI/ML Security • Model integrity, confidentiality, authentication, and authorization
• AI authentication and authorization
• Secure data sourcing, sanitization, and transformation
• Data poisoning prevention
• Adversarial training
• Differential privacy
• Model splitting
• Feature selection training
• Model distillation
• Model agility via retraining
• Model ensemble methods
• Explainable models
• AI/ML energy and latency obfuscation
• Robust AI/ML models
Continuous Security Monitoring • Generate alarms for abnormal resource utilization
• Support counters to detect potential authentication attacks
• Support counters and alarms for DDoS attack detection

Creating a security assurance program

Operators want security tests that can be used by third party testers to certify that a vendor provided O-RAN element, such as an O-RU, meets the O-RAN security requirements and controls defined in [1]. In addition to defining and refining tests for the security controls, WG11 has partnered with the O-RAN Test and Integration Focus Group (TIFG) and Global System for Mobile Communications Association (GSMA) to define security assurance specifications (SCAS) that ensure each O-RAN architecture element is securely implemented according to its specifications. SCAS documents will be publicly available in 2026.

O-RAN and Zero Trust Architecture

The O-RAN ALLIANCE has publicly committed to pursue a Zero Trust Architecture in accordance with the US National Institute of Standards and Technology (NIST) SP 800-207 [6]. The NIST seven tenets of zero trust include per session dynamic access control based on least privilege, data and resource protection, and monitoring of all resources. In 2024, WG11 began its zero trust analysis of the O-RAN security specifications and controls to identify gaps in the specifications in order to meet Initial stage of maturity level defined in the US Department of Homeland Security Cybersecurity Infrastructure Security Agency (CISA) zero trust maturity model (ZTMM) [7]. The gap analysis uses the Identity, Data, Networks, Applications and Workloads, and Devices pillars of the ZTMM. In 2025, WG11 filled gaps in the O-RAN security specifications by enhancing requirements for least privilege access control, pre-configured expiration time on authorization decisions, data and model protection, and application package protections. WG11 also analysed the ZTMM Cross-cutting Capabilities (visibility and analytics, automation and orchestration, and governance) to determine which are in scope for O-RAN definition. Still requiring additional specifications are backup capabilities, network segmentation policies and monitoring, supply chain protections, defining asset data needed for operator inventories, and O-Cloud hardware accelerator abstraction layer (AAL) protections.

Additionally, O-RAN ALLIANCE WG11 held its 2nd annual ZTA Standardization Workshop, a forum for key stakeholders, including 3GPP members, to advance zero trust architecture (ZTA) in communications critical infrastructure.  The outcomes of the meeting, listed below, will lead to strong security standards built into 5G, 5G Advanced, and 6G.

  • Operator benefits of ZTA include strong security posture that lowers risk, lowers security cost, and enables technology evolution.
  • Continuous security monitoring is critical to achieve an end-to-end ZTA across the network and will require standardization of event signaling and interfaces to support diverse operator visibility and analytic systems.
  • Migration to post quantum cryptography (PQC) needs to be addressed in standards as a component of zero trust. This is the importance to operators of TLS 1.3, it supports quantum resistant algorithms.
  • ZTA for securing evolving AI technologies in a 6G network will need to be addressed in standards.

WG11 has active work items for ZTA, Secure AI, Continuous Security Monitoring, and PQC that will provide the foundation for secure O-RAN in 6G.

O-Cloud specifications and tests

The O-Cloud is a foundational architecture element of O-RAN because it enables the disaggregation of O-RAN software and hardware, giving operators the ability to use commercially available hardware in the RAN. Through security analysis, the O-Cloud security requirements and controls were enhanced in the areas of security logging, software integrity, certificate and key management, accelerator abstraction layer, admission controllers, and container and VM isolation. These requirements and controls are complemented by security test specifications that define how to verify implementation and support consistent assessment.

Certificate management for multi-vendor O-RAN deployments

Traditional RAN deployments are single vendor solutions, with all components of the eNodeB or gNodeB as well as the network manager provided by the same vendor. The gNodeB purpose-build elements are delivered with pre-installed vendor certificates signed by the vendor’s root of trust. Certificate management, including the certificate authority (CA) is typically handled by the network manager. The open interfaces in the O-RAN architecture enables a multi-vendor network with communication and management over standardized, open interfaces. To support certificate management, O-RAN has defined requirements using CMPv2 [6] covering the following use cases:

  • Initial certificate enrolment for O-RAN architecture elements,
  • Initialization and update of certificate roots of trust and trust anchors,
  • Certificate renewal, and
  • Maintenance of certificate revocation lists.

In 2026 WG11 will work with WG2, WG3, WG4, WG5, WG6 and WG10 to refine certificate management implementation details for each of these use cases.

Looking ahead to 2026

Operator priorities will continue driving WG 11. Key 2026 initiatives in WG11 are to

  1. Establish the O-RAN Security Assurance Program with
    • Updates to the test cases in the O-RAN Security Test Specifications [3]
    • Development of SCASes for the O-RU, O-DU, and SMO
    • GSMA NESAS for O-RAN
  2. Continue developing security specifications across O-RAN work groups to make them deployment ready. WG11 is already working with WG4 on Open Fronthaul, WG5 on D2 interface, and WG6 on O-Cloud.
  3. Update the initial O-RAN risk analysis in the O-RAN Threat Modeling and Risk Analysis [4] to reflect the improved O-RAN security posture provided by the specifications in the O-RAN Security Requirements and Controls Specifications [1] and O-RAN Security Protocols Specifications [2].
  4. Prepare for 6G security requirements in O-RAN, including AI security, continuous security monitoring, and PQC.

References

[1] O-RAN Security Requirements and Controls Specifications, version 14.0, O-RAN ALLIANCE, February 2026.

[2] O-RAN Security Protocols Specifications, version 14.0, O-RAN ALLIANCE, February 2026.

[3] O-RAN Security Tests Specifications, version 12.0, O-RAN ALLIANCE, February 2026.

[4] O-RAN Security Threat Modeling and Risk Assessment, version 8.0, O-RAN ALLIANCE, February 2026.

[5] O-RAN Architecture Description, version 16, O-RAN ALLIANCE, February 2026.

[6] NIST Special Publication 800-207, "Zero Trust Architecture", August 2020, https://doi.org/10.6028/NIST.SP.800-207

[7] Zero Trust Maturity Model (ZTMM), version 2.0, US DHS CISA, April 2023.

by O-RAN ALLIANCE’s Security Work Group (WG11)