Approach

Our approach to cyber security

Our globally consistent cyber security operating model is based on leading industry security standards published by the US National Institute of Standards and Technology. The model is designed to reduce risk by constantly identifying threats, defending, responding and continuously improving security.

We operate cyber capabilities with an in-house international team of over 900 employees. Our scale means we benefit from global collaboration, technology sharing, deep expertise and greater visibility of emerging threats. Our global security operations take inputs and telemetry from all the markets where we operate. We augment internal capabilities with third party specialist technical expertise where necessary, such as digital forensics, red teaming and penetration testing, and use specialist resources to test our telecommunications networks.

Strategy

Our strategy

Our vision is a secure connected future for customers and society. We are motivated by a clear purpose to inspire customer trust and loyalty through providing sustained cyber security and cyber resiliency, ultimately contributing to a secure society and an inclusive future for all.

Our cyber security strategy supports our vision and goals, and forms part of our wider business strategy. We regularly define and communicate updated priorities so all business areas are clear on our security investment priorities.

Cyber

Our cyber code

Every employee has responsibility for cyber security. The Vodafone Cyber Code has been designed to simplify and explain basic security controls and procedures to all employees. The Cyber Code is embedded in our Code of Conduct and is the foundation of how we expect all employees to behave for best practice in cyber security. It consists of seven areas where employees must follow good security practice.

Risks and controls

Laptop

The challenge

Risk management is fundamental to maintaining the security of our services across every aspect of our business. We dedicate significant resources to managing cyber security risk, which we separate into three main areas: internal, external and supply chain.

We conduct regular reviews of the most significant security risks affecting our business and develop strategies and policies to detect, prevent and respond to them. Our cyber security strategy focuses on minimising the risk of cyber incidents that affect our networks and services. When incidents do occur, we aim to identify the root causes and use them to improve our controls and procedures.

Risk

Our risk and control framework

Risk management is fundamental to maintaining the security of our services across every aspect of our business. We dedicate significant resources to managing cyber security risk, which we separate into three main areas: internal, external and supply chain. Most risks and threats are prevented from occurring and we expect most will be detected before they cause harm and need a response.

We have a common global methodology for cyber security risk management. By mapping threats and specific attack techniques to the controls that most significantly reduce risk, this allows gaps to be highlighted.

We have set targets for key controls to be effective, meaning they are well-implemented and cover the relevant systems. New targets are set each year. Our control framework evolves based on the threat landscape, technology changes, our strategic and business priorities, and changing regulation.

New technologies

We adopt new technologies, including mobile network enhancements, AI and quantum computing to better serve our customers and gain operational efficiency. Our Secure by Design process evaluates suppliers' hardware and software, modelling threats and understanding the risks before designing, implementing and testing the necessary security controls and procedures.

Network

Mobile Networks

Every new mobile network generation has brought increased performance and capability, along with new opportunities in security. We have updated our security standards to implement the latest 5G features in our core networks. We also test security in our radio networks using independent third-party testing companies. We continue to collaborate with other players in the Open RAN ecosystem to improve security, including adding requirements to the Open RAN specification, publishing internal security standards, and benchmarking vendors against these.

Quantum

Quantum computing

We are preparing for a time when quantum computers able to break certain cryptography are available at scale. Through our joint research with IBM, we have developed a risk-based approach to mitigate the risks of existing cryptography, which could be more easily broken by a quantum computer. We are identifying where we are using cryptography that is potentially vulnerable to attack from quantum computers, defining supplier requirements and developing the ability to update our cryptography when new threats emerge.

Car

Artificial intelligence

We take the responsible use of AI seriously and seek to balance the opportunities and security risks associated with AI. All of our work in this space is guided by our AI Framework and security teams across the business collaborate under our global responsible AI committee which agrees policy, mitigates threats, and identifies and selects use cases for implementation.

To reduce the risks of misuse, we limit access to public AI applications. We have developed an awareness programme and updated our policies to make it clear to our employees what data must not be shared with public AI applications. We have defined requirements for internal AI application development including risk assessment, designing for transparency and lack of bias, and providing the right degree of human oversight of results.

Threats

Threats and incidents

An important part of our operating model is to gather intelligence and insights about threats. We actively engage with stakeholders across industry, with regulators, standard-setting bodies and governments. Collaboration is vital to respond to threats, protect our organisation and workforce, and build safe online and digital spaces for customers and society.

As a global connectivity provider, we see a range of cyber threats. We use our layers of controls to try to identify, block and mitigate threats and reduce business or customer impact. Our global security operations capability handles billions of events and logs from sensors across our footprint, detecting potential threats and events.

We classify security incidents on a scale according to severity, measured by potential business and customer impact. In the event of a cyber breach, disclosure is made to the relevant authorities in line with local and global regulations and laws and a risk assessment considering the impact on customers. We complete post-incident reviews to learn the lessons from incidents and any improvements needed.

Report

Report a vulnerability

We value the expertise and help of the cyber security community in helping us maintain our high security standards. You can report any suspected security vulnerabilities related to our services or products.

Reporting vulnerabilities

We value the expertise and help of the cyber security community in helping us maintain our high security standards. You can use this site to report any suspected security vulnerabilities related to our services or products.

If you are aware of a vulnerability that could affect Vodafone’s services or products, please contact us via the link disclosed under “How to Report a Vulnerability”. Our security specialists will review all submissions and, where required, work with you to make sure we are able to fix any potential issues as quickly as possible.

Rules of engagement

Vulnerability disclosure policy guidelines

As a responsible member of the cyber security community, your expertise can help us fix potential issues faster and more effectively. If you find a suspected vulnerability relevant to Vodafone, please let us know so we can fix the problem as soon as possible.

  • Do submit your reports in English
  • Do exercise caution and restraint with regard to personal data and do not intentionally engage in attacks against third parties, social engineering, denial-of-service attacks, physical attacks on any Vodafone property or spamming or otherwise causing a nuisance to other users.
  • Do provide Proof-of-Concept or sufficient information to enable reproduction of the vulnerability, so that it can be verified, reproduced, and possible remedies identified. Generally, identification of the vulnerable target, a description of the vulnerability and operations carried out to exploit the vulnerability are sufficient, but more details and information might be required in the case of complex vulnerabilities.
  • Do not abuse the vulnerability by causing disruption through your actions.
  • Do not share information about the vulnerability with others until it has been resolved in accordance with the Vodafone Responsible Disclosure policy timeframes.
  • Do submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.

  • Treat submitted reports confidentially and will not share the finder’s personal details with third parties without their authorisation, unless required in order to do so to comply with legal obligations.
  • Resolve all submitted reports as quickly as possible.
  • Vodafone do not operate a bug bounty or hall of fame programme.

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:

  • Clickjacking on pages with no sensitive actions
  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
  • Attacks requiring MITM or physical access to a user's device.
  • Previously known vulnerable libraries without a working Proof of Concept.
  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.
  • Missing best practices in SSL/TLS configuration.
  • Any activity that could lead to the disruption of our service (DoS).
  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
  • Rate limiting or bruteforce issues on non-authentication endpoints
  • Missing best practices in Content Security Policy.
  • Missing HttpOnly or Secure flags on cookies
  • Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)
  • Vulnerabilities only affecting users of outdated or unpatched browsers [Less than 2 stable versions behind the latest released stable version]
  • Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors).
  • Tabnabbing
  • Open redirect - unless an additional security impact can be demonstrated
  • Issues that require unlikely user interaction
  • Static resources / public information "exposed" in storage buckets
  • Physical attacks towards any Vodafone property

If you want to report any other type of issue not related to security, please refer to the support or contact pages of the relevant Vodafone Local Market, Vodafone Partner Market or Vodafone Business website.

How to report a vulnerability

Please help us by providing as much information as possible about the problem you have discovered. If you have not yet done so, please remember to review our rules and guidelines previously announced before submitting the information here:

NEWS

All the latest

View all news
Vodafone Business Celebrates Win as Microsoft’s 2025 Telco Innovation Partner of the Year
14 Nov 2025
Technology

Vodafone Business Celebrates Win as Microsoft’s 2025 Telco Innovation Partner of the Year

1 min read

Vodafone Business has been named Microsoft’s 2025 Telco Innovation Partner of the Year. Find out more.

Protecting our customers from cyber threats across Europe and Africa
31 Oct 2025
Empowering People

Protecting our customers from cyber threats across Europe and Africa

4 min read

Discover how Vodafone’s dedicated teams protect customers, fight cyber threats, and keep us connected. Explore their inspiring stories and daily challenges.

Protecting our customers by securing the backbone of connectivity
31 Oct 2025
Empowering People

Protecting our customers by securing the backbone of connectivity

5 min read

Discover how Vodafone’s dedicated teams protect customers, fight cyber threats, and keep us connected. Explore their inspiring stories and daily challenges.

Discover more

Public

Privacy

We fiercely protect people's rights with our Global Privacy Programme. This is based on the EU's General Data Protection Regulation, while also respecting local laws. 

Code of conduct

Code of conduct

We seek to support children and their parents to become responsible digital citizens while they engage with technology in their everyday lives.