UK TSA Regulations: SOC Teams, Get Ready!

Hey Telco Security Ninjas,

The UK Telecommunications Security Act (TSA) compliance is coming and SecOPs teams will play a more prominent role in ensuring a resilient mobile network and keeping our 5G connections stable. First of all, thank you for your passion for cybersecurity and your hard work. You have a very important purpose and mission for the country's resilience.

With the rollout of UK TSA regulations, numerous departments and business stakeholders involved in digital services will come to rely on the support and service of the SecOps team. The scope of coverage and needed operating model will expand, requiring proactive preparation by the teams involved.

In this post, we will

  1. look at a brief overview of TSA - for more in-depth information read this blog
  2. review top SOC requirements extracted from the Code of Practice
  3. take a look at a practical, end-to-end operational SIEM use case

Tier 1 Provider Concerns about TSA: Tight Timelines and Additional Costs

During the TSA consultation process, tier 1 providers raised concerns regarding additional costs and tight timelines for implementation. Another raised issue was the possibility of an impact on 5G rollouts and beyond.

So what specific requirements does the legislation place on SOC teams? What practices may already be in place at your organization and what adjustments need to be made? Let's do a sanity and hygiene check. But first some good news. SOC teams are most likely to receive attention, funding, and support from management and business stakeholders as non-compliance could result in hefty fines.

SOC Teams, Get Ready for a GAP Analysis

The faster and more efficient the validation process for the necessary measures run, the lower the cost and friction for all stakeholders involved. This is great news for Splunk customers and our platform approach. As adaption is simple, and if specific assets are not currently monitored, adding coverage is a seamless process. Moreover, it provides an opportunity to assess the feasibility of standardizing on Splunk Enterprise Security and making progress toward mature Standard Operating Procedures (SOPs) with the support of Splunk SOAR capabilities.

The bad news is that this project requires collaboration with many different teams.

Measures Affecting the SOC Team

We reviewed the Code of Practice and extracted what we believe are the most crucial measures for you as a SOC team to validate. Please let us know if we missed any measures that are of utmost importance to you!

SOC Capabilities and Services Established:

Does the SOC Provide Security Monitoring for the Following:

Does Our SIEM Architecture Align with TSA Requirements?

In Practice: A SIEM Monitoring Use Case

Requirement:

Regulation 6 establishes the requirement to monitor and analyze access to security-critical functions of the public electronic communications network in order to be able to identify security risks at an early stage and investigate the root cause. Records must be kept secure for at least 13 months.

The Security Code of Practice describes many best practices for network and host-based monitoring as well as effective analyzes and operations within a SOC.

5.19 describes that a "story” must be to be created e.g. a session audit trail. “Monitoring data should link administrative actions to network administrators and onto tickets.” Because the TSA has a strong focus on the risk of third-party administrators of MSPs due to the supply chain hacking activity of the “APT10”, this is a perfect use case to set up monitoring and automate with your SIEM.

Scenario:

It is crucial to implement a procedural level change management process across all of the organization's most critical applications. The most common approach is to use the ticketing systems to document upcoming system maintenance activities and define the 5 W’s: Who, What, When, Where, and Why.

Security monitoring is greatly simplified by correlating change tickets with audit trails and activities. Changes made outside of the designated change windows can be treated as potentially malicious activities or anomalies, while changes made within the specified time window can be treated as “acceptable” or “trustworthy”. Depending on the risk appetite, trusted changes may also be subject to review.

Let’s decode this with an example. Let's assume a change management ticket in ServiceNow contains the following:

Peter performs maintenance work on 24.12.2024 from 11.00-15.00 on ericsson-5g-catalog-manager-lon1 - 5 to do a firmware update.

Peter comes from a third-party MSP. It’s organizationally specified that he uses the telco’s Citrix service as an admin hop client to connect to the telco’s backend infrastructure.

Data Needs

Correlations:

Multiple security correlation searches can now be set up, such as:

Since we are not bothered by a malicious administrator (insider threat) in this scenario, but rather we are concerned that a malicious foreign actor has stolen an administrator's identity, we must contact that administrator within a set timeframe.

This example establishes a minimum set of guard rails for monitoring with a very low false positive rate. Establishing an organizational change process is the foundation that this standardized process avoids reviewing individual security alerts without context and makes follow-up tedious for the SOC team.

Hope you enjoyed this blog where we connected regulation requirements with real-world operations.

Happy Splunking,

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.