<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin-top:0in;
margin-right:0in;
margin-bottom:8.0pt;
margin-left:0in;
line-height:105%;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
p.MsoNoSpacing, li.MsoNoSpacing, div.MsoNoSpacing
{mso-style-name:"No Spacing\,CISA Normal Text";
mso-style-priority:1;
mso-style-link:"No Spacing Char\,CISA Normal Text Char";
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.NoSpacingChar
{mso-style-name:"No Spacing Char\,CISA Normal Text Char";
mso-style-priority:1;
mso-style-link:"No Spacing\,CISA Normal Text";}
p.paragraph, li.paragraph, div.paragraph
{mso-style-name:paragraph;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.normaltextrun
{mso-style-name:normaltextrun;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">Today, the Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), through
the Enduring Security Framework (ESF), a cross-sector working group, published a paper titled,
</span></span><span style="font-family:"Franklin Gothic Book",sans-serif"><a href="https://www.cisa.gov/sites/default/files/publications/open-radio-access-network-security-considerations_508.pdf"><i>Open Radio Access Network Security Considerations,</i></a>
which assesses the benefits and<span class="normaltextrun"> security considerations with implementing Open RAN architecture.</span></span><span class="normaltextrun"><o:p></o:p></span></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p> </o:p></span></span></p>
<p class="MsoNoSpacing"><span style="font-family:"Franklin Gothic Book",sans-serif">Mobile network operators provide cell services with a vast deployment of antennas and radios on cell towers connected to base station equipment. The base station equipment converts
the wireless signals to data consisting of text messages, phone calls, streaming videos, and all the other pervasive applications offered today. The mobile network industry calls the radios, cell towers, and base station equipment converting wireless signals
to data the Radio Access Network (RAN). This assessment considers the security of a mobile industry initiative toward an Open RAN.</span><o:p></o:p></p>
<p class="MsoNoSpacing"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p> </o:p></span></p>
<p class="MsoNoSpacing"><span style="font-family:"Franklin Gothic Book",sans-serif">In developing this paper, the ESF’s Open RAN Working Panel focused on current designs and specifications for Open RAN architectures, and considered how these security considerations
compared to, or are distinct from, traditional, proprietary RANs. The ESF Working Panel also addressed the additional resources required to fulfill the vision of interoperable, multi-vendor RAN powered by cloud services and software.<o:p></o:p></span></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span class="normaltextrun"><o:p> </o:p></span></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span style="font-family:"Franklin Gothic Book",sans-serif">This guidance in this paper is provided “as is” based on knowledge and recommended practices in existence at the time of publication
document and was written for general informational purposes only. It is intended to apply to a variety of factual circumstances and industry stakeholders.<span class="normaltextrun"><o:p></o:p></span></span></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p> </o:p></span></span></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif">Download and share the
</span></span><span style="font-family:"Franklin Gothic Book",sans-serif"><a href="https://www.cisa.gov/sites/default/files/publications/open-radio-access-network-security-considerations_508.pdf"><i>Open Radio Access Network Security Considerations</i></a><i>
</i>paper.</span><o:p></o:p></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><o:p> </o:p></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="font-size:10.0pt;color:#1F497D">Cyber Security Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal" style="margin-bottom:0in;line-height:normal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image002.png@01D8C8F8.7716FEF0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="paragraph" style="margin:0in;vertical-align:baseline"><o:p> </o:p></p>
</div>
</body>
</html>