Cybersecurity Supply Chain Risk Management (C-SCRM) is the strategic process of identifying, assessing, and mitigating risks associated with the information and communication technology (ICT) supply chain. Virtually every technical asset, whether hardware or software, is the result of highly complex, distributed technology supply chains involving dozens of entities including manufacturers, suppliers, sub-suppliers, system integrators, and more. This creates many opportunities for cybersecurity risk both intentional (e.g. counterfeit products, insertion of malicious code) and unintentional (e.g. accidental vulnerabilities).
C-SCRM is a critical discipline designed to address these risks and safeguard the integrity and availability of digital assets throughout their lifecycle. According to NIST’s C-SCRM project, it includes “identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of ICT/OT product and service supply chains. It covers the entire life cycle of a system (including design, development, distribution, deployment, acquisition, maintenance, and destruction).”
NIST’s Cybersecurity Framework 2.0 notes that the “primary objective of C-SCRM is to extend appropriate first-party cybersecurity risk management considerations to third parties, supply chains, and products and services…” As such, C-SCRM requires enterprises and government agencies to implement the appropriate controls and procedures to identify, assess, and respond to risks from their technology supply chains.
C-SCRM requires organization-wide collaboration and coordination, often involving many job roles and functions. This can include the need for IT and procurement teams to evaluate prospective vendors and products in terms of their supply chain risk and to verify that all received assets conform to vendor-supplied software bills of materials (SBOMs). Security and vulnerability management teams will need to regularly assess assets to verify the integrity of all critical components and code and to identify any vulnerabilities or misconfigurations. Incident response teams will need to include procedures to mitigate supply chain risks when they are identified.
NIST’s Cybersecurity Framework 2.0 addresses cybersecurity supply chain risk management within the GOVERN function (GV.SC) as well as within the IDENTIFY, PROTECT, DETECT, RESPOND, and RECOVER functions as follows:
Eclypsium protects the digital supply chain and gives enterprises tools to verify that the devices they buy are authentic, free from vulnerabilities, and haven’t been tampered with at any point.
With a simple scan, organizations can verify the integrity of new devices and have detailed insight to hold suppliers accountable.
To learn more, visit our Supply Chain Security solutions page.
The post Key Considerations for Successful Cybersecurity Supply Chain Risk Management (C-SCRM) appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
*** This is a Security Bloggers Network syndicated blog from Eclypsium | Supply Chain Security for the Modern Enterprise authored by Chris Garland. Read the original post at: https://eclypsium.com/blog/key-considerations-for-successful-cybersecurity-supply-chain-risk-management-c-scrm/