How to Protect Your Business from Supply Chain Attacks

Disruptive Supply Chain Attacks

Log4j Vulnerability

Attackers gained unbridled access to computer systems, hitting countless systems worldwide. Most affected organizations struggled to fix the problem because they lacked a full asset inventory and couldn’t see their full exposure to the threat.

The SolarWinds Attack

Hackers targeted the supply chain by turning a software update into a huge cyberattack. Good internal software security practices alone are not enough. Robust risk management to mitigate risks from third-party security controls and protocols is vital.

The Importance of Software Bills of Materials

Organizations can use new tools to strengthen digital supply chain risk management, including software bills of materials (SBOM). SBOMs offer a standardized inventory of software parts, including versions, dependencies, and sources. Manufacturers or software suppliers should create SBOMs to increase the visibility of the components nested within each piece of software.

SBOM standards are still evolving, but some organizations will be required to provide them in the future. For instance, the White House's May 2021 cybersecurity executive order (EO) calls for software suppliers to the federal government to produce and deliver SBOMs. The aim is to provide better transparency and visibility into the supply chain. In response to the EO, the National Institute of Standards and Technology (NIST) has issued the Secure Software Development Framework (SSDF).

While there is no silver-bullet solution for software supply chain risk management, you can take a comprehensive approach that factors in these new tools as well as other leading practices.

Companies need a dedicated program to find and manage risks in their software supply chain. This program can help them make decisions at various levels. However, an isolated set of practices is not enough. Enterprises should create a cohesive and strategic approach tied into the broader cyber risk management framework.

You can create such a program if you don't have one yet. Here's a list of critical services that the program should provide:

  • A current supply chain inventory
  • Supplier software security evaluations
  • Automation and effective use of SBOMs
  • Advanced disaster recovery (DR) and IR
  • Integrating physical and cybersecurity
  • Predictive analytics and AI-driven risk assessment
  • Integrated risk management (IRM)
  • Sustainability and ethical considerations in digital supply chain practices

Enhancing Public-Private Partnership

Now more than ever, government and industry leaders must collaborate on digital supply chain security. Together, they can rapidly develop ways to deal with geopolitical changes and other emerging risks that could require organizations to unwind, reconstruct, and bolster their supply chains. For example, U.S. regulations on semiconductor trade with the People’s Republic of China (PRC) are spurring many organizations to build and enact contingency plans. Changing geopolitical and economic conditions can fuel greater public-private partnerships to help protect national interests in strategic areas like biotechnology, pharmaceuticals, clean energy, and advanced technology (e.g., semiconductors, AI, and quantum computing).

Get Our Guide

Download our guide for more information on Booz Allen's proactive approach to securing the digital supply chain and the next steps to creating a comprehensive security program.