Visible to the public Key Practices in Cyber Supply Chain Risk Management: Observations from IndustryConflict Detection Enabled

TitleKey Practices in Cyber Supply Chain Risk Management: Observations from Industry
Publication TypeReport
Year of Publication2021
AuthorsJon Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
Series TitleKey Practices in Cyber Supply Chain Risk Management
Pagination1 - 31
Date PublishedFebruary 2021
InstitutionNational Institute of Standards and Technology
Report NumberNISTIR 8276
Keywordsbest practices, C-SCRM, cyber supply chain risk management, external dependency management, ICT SCRM, Information and Communication Technology Supply Chain Risk Management, key practices, risk management, supplier, supply chain, supply chain assurance, supply chain risk, supply chain risk assessment, supply chain risk management, supply chain security, third-party risk management
Abstract

Many recent data breaches have been linked to supply chain risks. For example, a recent high- profile attack that took place in the second half of 2018, Operation ShadowHammer, compromised an update utility used by a global computer manufacturer.1 The compromised software was served to users through the manufacturer’s official website and is estimated to have impacted up to a million users before it was discovered. This is reminiscent of the attack by the Dragonfly group, which started in 2013 and targeted industrial control systems.2 This group successfully inserted malware into software that was available for download through the manufacturers’ websites, which resulted in companies in critical industries such as energy being impacted by this malware. These incidents are not isolated events. Many recent reports suggest these attacks are increasing in frequency. An Incident Response Threat Report published in April 2019 by Carbon Black highlighted the use of “island hopping” by 50 % of attacks.3 Island hopping is an attack that focuses on impacting not only the victim but its customers and partners, especially if these partners have network interconnections. Symantec’s 2019 Security Threat Report found supply chain attacks increased by 78 % in 2018.4 Perhaps more worrying is that a large number of these attacks appear to be successful and cause significant damage. A November 2018 study, Data Risk in the Third-Party Ecosystem, conducted by the Ponemon Institute found that 59 % of companies surveyed experienced a data breach caused by one of their third parties.5 A July 2018 survey conducted by Crowdstrike found software supply chains even more vulnerable with 66 % of respondents reporting a software supply chain attack, 90 % of whom faced financial impacts as a result of the attack.

URLhttps://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8276.pdf
Citation Keynode-79981