Security requirements for suppliers

Securing the supply chain

Commitment to secure supply chain practices

At Nokia, we believe in collaborating with suppliers, partners, and industry leaders to foster innovation and deliver products and services with trusted experts who excel in their fields, ensuring the highest standards of security. In an interconnected and complex business environment, maintaining strong information security practices across the supply chain is important to protect organizational assets and maintain customer trust. We are committed to establish robust and ethical security practices throughout our supply chain to safeguard our operations, customers, and data. Towards this purpose, we expect suppliers to demonstrate adherence to Nokia’s supplier security principles described in this section.

Supplier security principles and their application

Nokia has defined supplier security principles to guide the security practices of our suppliers. These principles are designed to be applied throughout the entire lifecycle of our supplier relationships – from onboarding, through the delivery of services or products, and even during the phase out process. Nokia ensures that security remains a top priority at every stage, reflecting the growing importance of cybersecurity in the supply chain.

Nokia regularly reviews supplier security principles to ensure they remain aligned with the latest security frameworks and industry best practices. By embedding these principles into our supplier relationships, we are creating a resilient and secure supply chain framework.

Supplier security principles are more than just a set of requirements to prove compliance; they represent an opportunity for Nokia and its suppliers to lead the way in building a secure and resilient supply chain. By adhering to these principles, we can collectively strengthen defenses, protect sensitive data, and mitigate supply chain risks. 

Together, we can build a supply chain that is not only secure but also responsible and forward-looking.

Our supplier security principles

Compliance and audits

Suppliers shall enable Nokia to periodically conduct audits and assess supplier security practices, including during material changes in the relationship.

Adherence to security requirements

Suppliers shall comply with applicable security laws and  Nokia’s security requirements by implementing necessary controls to maintain robust security.

Security incident management and reporting

Suppliers shall promptly report any security incidents affecting Nokia or Nokia’s customer data through defined communication channels.

People management​

Suppliers shall conduct background checks for individuals with access to Nokia data or systems. Additionally, supplier shall provide ongoing cybersecurity training and awareness programs to their employees.​

Management of supplier’s supply chain risks

Suppliers shall manage the cybersecurity risks of their own third parties involved in delivering services or products to Nokia.

Communication of changes​

Suppliers shall notify Nokia of any control environment changes that could impact security of services or products delivered to Nokia or Nokia customers.

Contract ramp down clauses

Suppliers shall ensure that Nokia’s assets are returned upon contract termination and data in supplier’s custody is either returned in a readable format or securely destroyed as agreed with Nokia.

Summary of our supplier security principles

Audit evidence list

Organizational controls

  • Independent security audit reports (e.g., SOC 2 Type 1/2, ISO 27001 with statement of applicability)
  • Information security policy
  • Risk management policy
  • Vulnerability and patch management policy
  • Information classification policy
  • Business continuity and disaster recovery plans/ test reports
  • Data privacy policy
  • BYOD Policy (*if organization allows use of personal devices)
  • Backup and restoration management policy
  • Malware protection policy
  • AI governance policy (*if supplier uses AI in scope of relationship or provide services which involves use of AI)
  • Physical security policy
  • Encryption policy
  • Cloud security policy (*if supplier provides cloud services or uses cloud to host its infrastructure)
  • Secure software development lifecycle (SDLC) policy (*if supplier uses software in scope of relationship or develops software for Nokia)
  • Incident management policy and plan
  • Sample incident ticket and Demonstrate use of the tool used for incident reporting
  • Third-party risk management (TPRM) / Supply chain risk policy
  • Sample third party assessment report/ Due diligence evidence
  • Change management policy

Technological controls

  • Vulnerability scan results and tool evidence
  • Backup and restoration test results and logs
  • Encryption implementation evidence (for data at rest, in transit, and in use)
  • Incident reporting tool evidence
  • Access provisioning and deprovisioning sample
  • Network or endpoint security measures evidence (IDS, IPS, Firewall, SIEM, DLP, Anti-malware solution etc.)
  • Patch management deployment tool and samples evidence
  • Sample incident ticket
  • Demonstrate use of the tool used for incident reporting

People controls

  • HR security or background check process (describing how individual identity is verified to avoid impersonation, if organization
  • Joiners and leavers process
  • Security awareness program/training records including Nokia security trainings (if applicable)
  • NDA sample signed between supplier and its employees