Visible to the public Defending Against Software Supply Chain Attacks Conflict Detection Enabled

TitleDefending Against Software Supply Chain Attacks
Publication TypeReport
Year of Publication2021
Series TitleCybersecurity and Infrastructure Security Agency
Pagination1-16
Date PublishedApril 2021
InstitutionNational Institute of Standards and Technology
TypeWhite Paper
Keywordscompromise resilience, cyber threats, software vendors, Supply Chain Attacks
Abstract

A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code to compromise the software before the vendor sends it to their customers. The compromised software then compromises the customer’s data or system. Newly acquired software may be compromised from the outset, or a compromise may occur through other means like a patch or hotfix. In these cases, the compromise still occurs prior to the patch or hotfix entering the customer’s network. These types of attacks affect all users of the compromised software and can have widespread consequences for government, critical infrastructure, and private sector software customers. This document provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the National Institute of Standards and Technology (NIST) Cyber Supply Chain Risk Management (C-SCRM) framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate risks.

URLhttps://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attack...
Citation Keynode-79936