Industry Guides

Telecommunications Supply Chain Security: Protecting Critical Infrastructure

Telecom networks are critical infrastructure that depend on complex software supply chains. Here's how carriers and equipment providers should approach security.

Alex
Infrastructure Security Lead
7 min read

Telecommunications infrastructure is the backbone of modern society. When telecom networks go down, everything goes down -- emergency services, financial transactions, government communications, and the internet itself. That makes telecom software supply chain security a matter of national importance, not just corporate risk management.

The telecom industry faces a unique combination of challenges: massive software complexity, long equipment lifecycles, a mix of proprietary and open-source components, and threat actors that include nation-states with strategic interest in communications infrastructure.

The Telecom Software Landscape

Modern telecom networks are software-defined. The shift from hardware-centric to software-centric architectures -- particularly with 5G and cloud-native network functions -- has dramatically expanded the software supply chain attack surface.

5G Core Networks. 5G networks are built on cloud-native principles. The 5G core runs as containerized microservices, often on Kubernetes, using open-source components extensively. Each network function (AMF, SMF, UPF) is a software application with its own dependency tree.

RAN Software. Radio Access Network equipment increasingly runs on general-purpose hardware with software-defined functionality. Open RAN initiatives are accelerating the use of open-source components in what was traditionally a proprietary domain.

OSS/BSS Systems. Operations and Business Support Systems manage everything from network provisioning to billing. These are complex software platforms with deep integration into carrier operations.

Customer-Facing Platforms. Mobile apps, self-service portals, and customer management systems all depend on software supply chains that need protection.

Network Management. Tools for monitoring, configuring, and troubleshooting network equipment often have broad access to network infrastructure, making them high-value supply chain targets.

Why Telecoms Are Prime Targets

Telecommunications companies sit at the intersection of several threat actor interests:

Intelligence collection. Access to telecom infrastructure enables interception of communications at scale. Nation-state actors have repeatedly targeted telecom companies for this purpose. The Salt Typhoon campaign in 2024, attributed to Chinese state actors, specifically targeted U.S. telecom providers to access lawful intercept systems.

Disruption capability. Compromising telecom software could enable an adversary to disrupt communications during a crisis or conflict. This makes telecom supply chains a strategic target for military and intelligence organizations.

Data access. Telecom companies hold vast quantities of metadata -- who called whom, when, from where. This data is valuable for intelligence purposes and for criminal exploitation.

Pivot points. Telecom networks connect to virtually every other sector. Compromising telecom infrastructure can provide pathways into banking, government, healthcare, and energy networks.

Regulatory Framework

FCC and CISA Guidance

The FCC has been increasingly active on telecom supply chain security, driven in part by concerns about specific foreign equipment vendors. CISA has designated the communications sector as critical infrastructure and provides specific guidance for telecom supply chain risk management.

NIST Frameworks

NIST SP 800-161 (Cybersecurity Supply Chain Risk Management) provides a comprehensive framework that telecoms should map their programs against. NIST's work on SBOMs and software security applies directly to the telecom sector.

International Standards

3GPP security specifications include supply chain considerations, particularly for 5G network functions. GSMA has published security guidance that addresses software supply chain risks. European telecoms face additional requirements under the NIS2 Directive and the EU Cybersecurity Act.

Building a Telecom Supply Chain Security Program

Network Function SBOM Management

Every network function deployed in your infrastructure should have an associated SBOM. For 5G cloud-native functions, this means:

  • Capturing container image compositions (base images, packages, libraries)
  • Tracking Kubernetes operator and controller dependencies
  • Documenting sidecar containers and service mesh components
  • Including configuration management tool dependencies

For legacy network equipment, work with vendors to obtain component inventories. Many traditional telecom equipment vendors are now capable of producing SBOMs, though the quality and completeness vary.

Vendor Risk Assessment

Telecom vendors range from global equipment manufacturers to small specialized software companies. Your vendor risk assessment for software supply chain should evaluate:

  • Does the vendor have a secure development lifecycle?
  • Can they provide SBOMs for their products?
  • What is their vulnerability disclosure and response process?
  • Do they have supply chain security controls for their own dependencies?
  • What is their track record on security patches and updates?

For critical network infrastructure vendors, consider conducting deeper assessments -- reviewing their build processes, evaluating their dependency management practices, and assessing their susceptibility to supply chain compromise.

Open Source Management in Telecom

The telecom industry's embrace of open source (OpenStack, ONAP, Open RAN) brings enormous benefits but also supply chain risks. Telecom open-source management should include:

  • Component vetting. Before adopting open-source components for network functions, evaluate the project's security posture, maintainer community, and vulnerability history.
  • Internal mirroring. Critical open-source dependencies should be mirrored internally rather than pulled directly from public repositories.
  • Contribution tracking. If your organization contributes to open-source telecom projects, ensure that your contributions don't inadvertently introduce proprietary information or security weaknesses.
  • License compliance. Telecom open-source usage often involves complex licensing interactions. Track licenses as part of your SBOM program.

Continuous Vulnerability Monitoring

Telecom networks can't afford the downtime that comes with emergency patching. Your vulnerability management approach should include:

  • Predictive monitoring. Don't wait for vulnerabilities to be publicly disclosed. Monitor component health indicators -- maintainer activity, security issue response times, dependency freshness -- to identify at-risk components before they become vulnerable.
  • Impact assessment. When a vulnerability is disclosed, quickly determine which network functions are affected and what the operational impact would be. This requires current SBOMs for all deployed components.
  • Coordinated patching. Network function patches need to be tested, validated, and deployed without service disruption. Your vulnerability response process should include coordination with NOC teams and maintenance windows.
  • Compensating controls. When immediate patching isn't feasible (and in telecom, it often isn't), deploy compensating controls -- network segmentation, WAF rules, IDS signatures -- to mitigate risk while patches are prepared.

Firmware and Embedded Software

Telecom infrastructure includes significant amounts of firmware and embedded software that traditional SBOM tools may not capture. Cell site equipment, routers, switches, and specialized hardware all run firmware that needs supply chain monitoring. Work with equipment vendors to obtain firmware composition information and establish update processes.

The 5G-Specific Challenge

5G introduces specific supply chain security challenges:

Disaggregation. Traditional telecom equipment came from a single vendor as an integrated system. 5G architectures increasingly disaggregate hardware and software, which means more vendors, more components, and more complex supply chain relationships.

Edge computing. 5G edge deployments push compute infrastructure to thousands of distributed locations. Each edge node runs software that needs supply chain management, at a scale that manual processes can't handle.

Network slicing. 5G network slicing means that the same infrastructure serves multiple virtual networks with different security requirements. Supply chain vulnerabilities in shared components affect all slices.

How Safeguard.sh Helps

Safeguard.sh provides telecommunications companies with automated SBOM generation and continuous vulnerability monitoring at the scale that telecom networks demand. The platform handles container-based network functions, traditional software applications, and can ingest vendor-provided SBOMs to give carriers a unified view of their software supply chain.

For telecom operators deploying cloud-native 5G core networks, Safeguard.sh integrates with container build pipelines to track every component in every network function. When a new vulnerability is disclosed, the platform immediately identifies affected network functions, enabling NOC teams to assess operational impact and prioritize response.

Safeguard.sh helps telecoms maintain the continuous supply chain visibility that critical infrastructure requires, without the manual effort that makes supply chain security impractical at telecom scale.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.