Fraud and Security at the GSMA
The GSMA continually enhances the security support offered to its membership as the threats targeting the mobile ecosystem emerge. Our vision is to provide value for our membership in three main areas:
- Industry collaboration by convening membership to define industry specifications, threat management guidelines, promoting baseline controls and conducting external collaboration to ensure industry alignment.
- Providing expertise through subject matter experts by supporting solution and service offering development to internal and external stakeholders, as well as promoting industry Fraud and Security awareness.
- Defining the future by looking forward by assessing, analysing and reporting on the industry threat landscape. This is also done through engagement with standards bodies and reviewing new technologies to ensure adequate protection by design.
Fraud and Security Group
The GSMA’s Fraud and Security Group (FASG) drives the industry’s management of fraud and security matters related to mobile technology, networks and services.

T-ISAC
The GSMA Telecommunication Information Sharing and Analysis Center (T-ISAC) is the central hub of information sharing for the Telecommunication Industry.

Securing the 5G Era
This article discusses several 5G era security controls, including their limitations, due to this a certain level of technical knowledge is required.

Coordinated Vulnerability Disclosure (CVD)
The GSMA Coordinated Vulnerability Disclosure (CVD) programme gives security researchers a route to disclose a vulnerability impacting the mobile ecosystem meaning the impact can be mitigated before it enters the public domain.

GSMA Mobile Cybersecurity Knowledge Base
A comprehensive 5G Cybersecurity Knowledge Base to help stakeholders identify, map and mitigate risks.

Supply Chain Toolbox
The GSMA Supply Chain Toolbox outlines a number of services and guidelines to help operators and their suppliers to better understand security and to access best practice.

Security Algorithms
A variety of security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks. Details of the various algorithms and how they can be obtained are provided on this page.

Publications
This is the go-to place for Security publications including GSMA’s Annual Security landscape report.
