As a continuation of our content detailing legislative changes affecting organisations with regard to cybersecurity and compliance, we wanted to take a closer look at the 2021 Telecommunications Security Act.
While not a new one, this piece of legislation details the measures which providers of this Critical National Infrastructure (CNI) must take with regard to the security of the services they provide, as well as the fines and measures which can be taken by regulators (in this case, OFCOM) to ensure compliance with the regulation.
These powers came into effect from October 1st 2022, and OFCOM is bolstering their capability to investigate and enforce compliance.
If a telecoms provider is found to not comply with these security duties, then 10% of relevant turnover could be jeopardized, or in the case of continuous failure, £100,000 per day.
For failure to provide information, or refusal to explain a failure to follow a code of practice, there are fines of up to £10 million, or £50,000 per day for continuous failure.
Detailed within The Telecommunications Security Act are 4 key areas of focus for companies:
In addition, there is a provision about monitoring providers' use of 'high-risk vendors'. This is essentially an expansion of the supply-chain risk, but specifically targeted at reducing inherent risk from using vendors which may be providing insecure hardware or software.
Key within the provisions is a requirement to be able to secure systems and networks, but also to be able to detect and respond to a security incident, with response plans in place in the event of a serious breach impacting availability or disclosing sensitive information. Regular readers will recognize these as the first four pillars of the NIST methodology.
This provision is intended to ensure that security is at the heart of service provision and not considered as an afterthought.
Many development and deployment principles within organisations have reduced the requirement for security within project and programme lifecycles, as the move toward more agile DevOps methodologies has been adopted, often security is seen as a constraint to these agile deployments.
This approach is in conflict with the cybersecurity objective to “move-left” with regard to security - ensuring a secure-by-design approach where security is considered at the first stages of programmes.
These principles should be extended to the transition from project to Business As Usual (BAU) operations, ensuring that support and maintenance of the network equipment continue to operate within the security guidelines. These should therefore be designed with usability in mind; a process which is cumbersome and seen to disrupt day-to-day operations will not be adopted by the parties responsible for those operations.
Organisations should ensure that:
This provision is intended to ensure that all elements of the software, hardware and services supply chain are not introducing vulnerabilities to the key networks and service provision.
With this objective in mind, CISOs must work with procurement functions and programme directors to ensure that adequate assessments are undertaken prior to the commencement of contracts for provision.
Plus, continual testing and assessment of security practices should be undertaken as the threat landscape evolves.
Consider the following:
This provision is intended to secure the most fundamental elements of the technical infrastructure, through the adoption of technical and process controls around accessing sensitive data and functionality.
Concepts such as network segmentation can prevent traversal from less-secure environments to critical parts of the infrastructure, while controlling the use of privileged accounts can reduce the capability of credential misuse.
Effectively segregating where sensitive data is stored reduces the risk that this data is breached from more common attack methods which, when combined with cyber-defence good practice, will reduce the likelihood of a breach.
Consider the following:
This provision is intended to ensure that organisations are aware of the internal and external threats facing the provision of their critical services.
In risk management terms, we would refer to this as a risk assessment, but in cybersecurity terms, this might be considered as Cyber Threat Intelligence (CTI).
Ensuring that you have documented risks and can tie these to assets is the first step in establishing an effective Risk and Control Matrix for your organisation. Mapping these risks to the systems, networks and infrastructure impacted then allows you to determine the effectiveness of the controls applied to the impacted systems.
Gaps in controls can then be identified and addressed as part of continuous improvement plans.
Consider the following:
The TSA is not detailing anything new which organisations should be doing, but raises the profile and requirement to demonstrate that these best practices are being handled.
The increased power to impose fines and penalties for non-compliance will force an increased level of focus on these practices and should ensure that sufficient attention to these is paid by both senior executives and shareholders.
The impact on the supply chain should not be underestimated, as providers to these organisations will have increased requirements to comply, replicating this effort across multiple sectors of the industry.
If you would like to know more about compliance with the requirements laid out in the TSA, or any other regulatory requirements, please contact us at info@turnkeyconsulting.com