NCSC SCRM Best Practices
Title | NCSC SCRM Best Practices |
Publication Type | Miscellaneous |
Year of Publication | 2019 |
Keywords | critical infrastructure, cyber threats, economic espionage, malicious activity, NCSC, R&D, SCRM, structural integrity, Supply chain exploitation, Supply chains |
Abstract | Supply chain exploitation, especially when executed in concert with cyber intrusions, malicious insiders, and economic espionage, threatens the integrity of key U.S. economic, critical infrastructure, and research/development sectors. |
URL | https://www.dni.gov/files/NCSC/documents/supplychain/20190405-UpdatedSCRM-Best-Practices.pdf |
Citation Key | node-80002 |