Telecommunications networks face increasing security threats as they converge with IT technologies and rely more on virtualization and third party suppliers. This exposes sensitive subscriber data and critical network functions to risk. Regulators have established guidelines for telecom supply chain security, but recent breaches show these risks are not always adequately addressed. MNOs must implement stringent security for new services like 5G roaming to properly inspect, protect, and detect threats across complex interconnections between networks.