"Open RANÀÇ ¹Ì¼º¼÷Àº º¸¾È °úÁ¦¿¡ ´ëóÇϱâ À§ÇØ Ç¥ÁØ, ÀÎÁõ, Å×½ºÆ® ÇÁ·¹ÀÓ¿öÅ©¸¦ °³¹ßÇÒ Çʿ䰡 ÀÖ´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù."
±âÁ¸ ¹°¸®ÀûÀÎ RAN ¹× Ŭ·ÎÁîµå vRAN ´ë½Å¿¡ Open RAN ¾ÆÅ°ÅØÃ³¸¦ äÅÃÇÏ´Â °ÍÀÇ »çÀ̹ö º¸¾È¿¡ ´ëÇÑ ¿µÇâÀ» Á¶»çÇϰí ÀÖ½À´Ï´Ù. RAN º¸¾ÈÀÇ °úÁ¦¸¦ ¾ÇȽÃŰ´Â Open RAN ÄÄÆ÷³ÍÆ®¿Í ±â´ÉÀ» °ËÁõÇϰí, Åë½Å»ç¾÷ÀÚ, Open RAN º¥´õ ¹× º¸´Ù ±¤¹üÀ§ÇÑ Open RAN ¿¡ÄڽýºÅÛÀÌ ¾î¶»°Ô ÀÌ·¯ÇÑ °úÁ¦¸¦ °æ°¨ÇÒ ¼ö ÀÖ´ÂÁö¿¡ °üÇÑ ±ÇÀå»çÇ×À» Á¦°øÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ Open RAN ¾ÆÅ°ÅØÃ³¸¦ äÅÃÇÏ´Â °ÍÀ¸·Î ¾òÀ» ¼ö ÀÖ´Â »çÀ̹ö º¸¾È»ó ÀáÀçÀû ÀÌÁ¡¿¡ ´ëÇØ¼µµ ³íÀÇÇϸç, ÀÌ·¯ÇÑ ÀÌÁ¡À» ¾î¶»°Ô ½ÇÇöÇÏ´Â °ÍÀÌ ÃÖ¼±ÀÎÁö¸¦ °í·ÁÇϰí ÀÖ½À´Ï´Ù.
"The immaturity of Open RAN means that standards, certification and testing frameworks still need to be developed in order to address security challenges."
This report explores the cyber-security implications of adopting Open RAN architecture instead of traditional physical RAN and closed vRAN alternatives. It examines the components and features of Open RAN that exacerbate RAN security challenges, and provides recommendations for how telecoms operators, Open RAN vendors and the wider Open RAN ecosystem can mitigate them. The report also discusses the potential cyber-security benefits that can emerge from adopting Open RAN architecture and considers how these benefits can best be realised.