Why Supply Chain Security Is The First Line of Defense
现代企业IT中物理与数字边界模糊,远程办公和BYOD扩大了攻击面。端点检测和软件补丁是常见安全重点,但供应链安全同样关键。Dell Technologies从设计到交付全面融入安全措施,并严格审核合作伙伴及组件验证,以确保设备供应链的安全性与信任度。 2025-6-30 13:56:53 Author: securityboulevard.com(查看原文) 阅读量:10 收藏

Avatar photo

In the modern enterprise IT world, lines between physical and digital are blurry at best. Remote work, BYOD, and even highly-connected offices have redefined what “edge” really means. This also means that the attack surface for your users and their devices have expanded as well. If you ask a modern security team where they should focus their efforts you will probably hear answers like endpoint detection and software patches. Almost no one would start at the very beginning.

Don’t Break Your Chains

A holistic security approach has to take the device supply chain into account. A device has to be secured before it ever leaves the factory. The rising number of salacious stories about servers being compromised at some point in the supply chain has caused worry in the community. Reassurance that your endpoints are safe and sound along the way can define the relationship that an organization has with a supplier.

During Security Field Day in May, we had a chance to hear from Dell Technologies about how they are working to provide the kinds of security solutions that enterprise users need from a large company like Dell. Not surprisingly one of their big pillars was supply chain security:

Techstrong Gang Youtube

AWS Hub

Here are some highlights that Dell focused on that I think really speak to the bigger picture when it comes to the importance of the supply chain in the security process.

  • Security must be integrated at inception. It must be a part of the design from beginning to end. If you try to bolt on security after the fact you leave gaping holes for threat actors to exploit. In the above example, Dell instills security in their designs from the initial chip designs all the way through to device assembly and delivery. This also means that the designs can’t be mined for potential weaknesses.
  • A chain is as strong as the weakest link. Likewise, the supply chain is only as secure as the weakest link. You might be able to assure yourself that your organization is secure. However, what about your partners? Can you be sure they are following the same procedures? Could you imagine what would happen if a nation-state-backed organization was able to compromise the supplier of a baseband management controller (BMC) of a server without the manufacturer knowing? You’d have a very nasty entry point that no one is totally sure of. In Dell’s case, partners are held to a high standard and frequently audited to ensure compliance. This creates a culture of security and accountability.
  • Verification goes deeper than just partners. How can you be sure that every part you’ve installed is the right part? Being able to insert parts into the chain could create havoc down the road. You need to have a verifiable way to ensuring the parts you selected for the device are the parts that are in the device. If that sounds daunting you’re on the right track. For a company like Dell the criticality of the identification process is easier to pull off. After all, if you already have a list of parts it’s easy to build a digital fingerprint for those components. Even better, that list can be provided to the customer at any time for verification purposes. It’s an auditors dream!

Bringing It All Together

There’s a lot more great ideas in the Dell video above. Dell has really thought about the whole process from inception to delivery. For a company that touches as many systems as Dell over the course of an endpoint’s lifetime this is crucial to build trust. Dell knows that this is a non-negotiable component of being a trusted supplier of equipment to a modern enterprise. Security analysts might focus on patching and software. They are the first people to warn about not scanning random QR codes or inserting USB drives into secured machines. However, thinking as deep as the supply chain is something that often escapes even the most attentive teams. Thanks to companies like Dell, supply chain security is at the top of mind along the way.

Avatar photo

Tom Hollingsworth

Tom Hollingsworth, CCIE #29213, is a 20-year veteran of the networking industry. He spent over a decade as a Senior Network Engineer for an education-focused reseller, specializing in the implementation and operation of advanced technologies. Tom is well versed in the mechanics of campus and data center networks, voice and collaboration systems, and data center virtualization. Tom has also been a vocal member of the networking community. He is active on Twitter as @NetworkingNerd, and writes on his blog at http://NetworkingNerd.net, as well as being a columnist for Network Computing. He has been a speaker and panel moderator for TechUnplugged and Interop, in addition to serving as the Interop Networking Track Chair and Infrastructure Advisory Board member. Tom has been a regular guest on industry podcasts, including Packet Pushers and Network Collective. Tom is currently serving as the event lead for Networking, Wireless, and Security on the Tech Field Day event series. He speaks daily with companies on the forefront of exciting new ideas and incredible new solutions and works with industry influencers to help the greater networking community understand how they work and how networking professionals can take advantage of them in everyday practice.

tom-hollingsworth has 5 posts and counting.See all posts by tom-hollingsworth


文章来源: https://securityboulevard.com/2025/06/why-supply-chain-security-is-the-first-line-of-defense/?utm_source=rss&utm_medium=rss&utm_campaign=why-supply-chain-security-is-the-first-line-of-defense
如有侵权请联系:admin#unsafe.sh