Visible to the public NCSC SCRM Best PracticesConflict Detection Enabled

TitleNCSC SCRM Best Practices
Publication TypeMiscellaneous
Year of Publication2019
Keywordscritical infrastructure, cyber threats, economic espionage, malicious activity, NCSC, R&D, SCRM, structural integrity, Supply chain exploitation, Supply chains
Abstract

Supply chain exploitation, especially when executed in concert with cyber intrusions, malicious insiders, and economic espionage, threatens the integrity of key U.S. economic, critical infrastructure, and research/development sectors.

URLhttps://www.dni.gov/files/NCSC/documents/supplychain/20190405-UpdatedSCRM-Best-Practices.pdf
Citation Keynode-80002