In today's interconnected world, mobile networks have become the backbone of our daily lives. They serve as the crucial communication infrastructure that keeps society functioning smoothly. From powering the energy sector and managing bustling harbors to ensuring security in defense operations, enabling smart city technologies, and supporting hospital operations, private mobile networks are indispensable in countless critical settings.
This prominence, however, paints a big target onto their back. All of these sectors rely on equipment from vendors, integrators, or service providers. Many of them have little to no knowledge about telecommunication security, as it’s not their primary focus. Yet, they all recognise the need for secure and resilient mobile networks.
Purchasing decisions often hinge on price points and services, such as bandwidth, the number of connected devices, and coverage. Security is frequently taken for granted. Companies need to ask themselves why a vendor would invest in security if there is no clear benefit, only additional costs. In a market with tight margins, it might seem more practical to stick to the bare essentials.
If a company wants security, it must specify and demand it in the contract and ensure its delivery, just like any other software, hardware, or service. But how do you measure mobile network security? What kinds of questions should be asked of vendors?
To start with baseline security, consider the 3rd Generation Partnership Project (3GPP) Security Assurance Specifications (SCAS). This set of specifications includes test cases for basic security measures that should be in place. Here are some important points to consider when requesting SCAS from a vendor:
Supply chain security is becoming a mandatory requirement for many businesses, particularly due to regulations like NIS2. Here are some selected items to evaluate a vendor's supply chain security:
No security is perfect, so it’s best to be prepared and account for vulnerabilities during procurement:
There are numerous other items required to properly capture security for mobile networks in a contract and during the procurement process, but the points above should serve as a starting point for any company looking to acquire mobile network software, hardware, or services. For more details, feel free to contact us and discuss further the hard security requirement for your use case.