top of page

Threat Landscape for Supply Chain Attacks

Writer's picture: Rachel HanlonRachel Hanlon

What are supply chain attacks?

Supply chain refers to the ecosystem of processes, people, organisations and distributors involved in the creation and delivery of a product. There are 4 key elements to a supply chain:

  • Supplier which is an entity that provides a product or service that another entity needs

  • Supplier Assets are elements used by the supplier to produce the product or service

  • Customer starts the chain of events when they decide to purchase the product or service provided by the supplier

  • Customer Assets are elements owned by the target

So, what is a supply chain attack? This type of attack is a combination of at least two different attacks, for example, if the first attack is on the supplier, that is then used to gain access to the asset (this may be the customer or another supplier). These attacks leverage the interconnectedness of the global markets – when multiple customers reply on the same supplier.


Attack techniques used to compromise the:

  • Supplier - Malware infection, Social Engineering, Brute-Force attack, Exploiting Software Vulnerability, Open-Source Intelligence

  • Customer - Trusted Relationships, Drive-by Compromise, Phishing, Malware Infection, Physical Attack or Modification

Assets targeted by the supply chain attack:

  • Supplier assets - Software libraries, Code, Configurations, Processes, Hardware, People

  • Customer Assets - Data, Personal data, Software, Bandwidth, Finical, People

Supply chain incidents

  • SolarWinds Orion: IT management and remote monitoring

  • Mimecast: Cloud Cyber Security Services

  • Leadger: Hardware Wallet

  • Kaseya: IT Management Services Compromised With Ransomware

Recommendations

To manage the supply chain cybersecurity risk customers are advised to define a risk criteria for different types of suppliers & services (e.g. single point of failure) and identify the different types of service providers.

Identification of supply chain risks related to their own business continuity is important, and understanding the impact of outages. It is also important to monitor supply chain risks and threats based on internal and external sources of information on findings and then in turn make their personal aware of the risks.

Implementing third party control assessments and ongoing monitoring is recommended to achieve this.

On the other hand, suppliers should ensure that the secure development of their products and services are consistently up to date with latest best practices. Suppliers need to ensure that their infrastructure that designs, develops, manufactures and delivers their products follows these cyber security best practices.

They should also consider implementing quality objectives such as to identify risks or security issues reported and using them as an instrument to improve overall quality or implementing a secure engineering process that is consistent with commonly accepted security practices.

Our recommendation is that to be best prepared, Organisations should at the very least align to ISO 27001 or even look for certification to show their supply chain that they have achieve a very high standard information security.


Reference




Comments


Testimonials

Ibec - For Irish Business

"Ibec engaged with VISO two years ago.  While our primary objective was to improve our information security posture, we were also looking for a long-term partner with expertise and knowledge of the continually evolving cyber landscape. The professionals at VISO are a pleasure to work with and their team is always on hand when we need them."

2-3 Prospect Road, Glasnevin, Dublin 9, D09 K5V2

Telephone: Ireland +353 1 9121331  U.K.  +44 20 30260575

 

We simplify Cyber Security 

Privacy Policy

  • Twitter
  • Facebook
  • LinkedIn

© 2022 proudly created by The Rainbow Vault

ISO 27001 Cyber Security standard_Awarded to VISO Cyber Security
cyberessentials_certification- awarded to VISO Cyber Security
bottom of page