Sága Wi-Fi 7 Routers
Designed for peak performance and easy refurbishment.
Find out more
The TSA was designed to address concerns across Government and Industry about the need for telecommunications companies/network providers to have resilient and secure networks all the way through their tech stack to ensure that the Internet infrastructure or CNI (Critical National Infrastructure) that we all now rely so heavily on can continue to work and is not open to compromise by bad actors.
It is a known fact that electronic espionage, disruption, and hacking are tools widely used by Governments across the world. It is almost an open strategy employed by the less democratic nations in the world to further their world view but also to disrupt the services and lives of their opponents.
Some recent examples of attacks undertaken to influence policy and cause disruption are:
Data from the US FBI Internet Crime report for 2023 shows the extent that critical infrastructure organisations were targeted by ransomware, which is only one of the attack vectors that the bad actors will use. View the report here: 2023_IC3Report.pdf
The same applies in the UK with the NCSC Annual Review of 2023. View here: NCSC – Annual Review 2023
Much of the TSA is focused on compliance by the public telecom providers/network operators and what they need to do within their networks, but one of the key components of the aligned Code of Practice is for Providers to protect what is known as the Exposed Edge and broadband CPEs fall into this category.
There is a recommendation for network operators to assess their tech vendors’ stance and the framework for this is for them to undertake a Vendor Security Assessment (VSA) which involves asking a number of key questions to get an understanding of the vendors’ current position on security relating to hardware and software.
Icotera have taken the framework of the VSA and analysed ourselves against all the criteria, so we understand where we stand against all components which provide us with a framework for continual improvement. For details on the Icotera VSA please reach out to Technical Program Manager UK and Ireland, Jim Lucking at: jlucking@icotera.com
The VSA covers nine high level key components which network vendors throughout the tech stack need to consider and assess themselves on.
Below the nine high level components there are many granular sub-items that provide guidance on what the vendor should investigate and address
VSA high level items
Being prepared for the TSA is crucial for all UK public telecom operators as it has legal obligations that must be met (depending on tiering and timescale these timelines can be more onerous), but as previously explained even if you are in a lower tier but you contract with a company in a higher tier (think Openreach, CityFibre, etc) you need to comply with the higher tier requirements and timelines.
But apart from the legal obligations it introduces some best practices for securing the network tech stack to minimise the attack surface and any potential malicious exploits.
Implementing its recommendations makes commercial and reputational sense to everyone involved
The assumption is that most, if not all telecom operators have started down the journey already, but if not, don’t delay.
1st steps:
Want to know more or to discuss how to handle the TSA legislation, please reach out to Jim Lucking, Technical Program Manager UK & Ireland at jlucking@icotera.com