当前位置:网站首页>How to deal with the security risks of the third party in the supply chain
How to deal with the security risks of the third party in the supply chain
2022-07-18 21:33:00 【Software testing network】
“ No one is an island ” This famous sentence applies to both individuals , It also applies to enterprises . An enterprise is the product of its supply chain and its ecosystem , It is also the product of its own operation —— Even the largest enterprises need the support of third parties .

In terms of the technology stack deployed by the enterprise , Nothing is more real than this . Although service-based enterprises do not need physical supply chains , Because it doesn't sell manufactured goods , But it needs a dense third-party network to provide software and services .
Hidden but growing attack surface
On the safety side , People often talk about the attack surface , This is also the part where enterprises are exposed to cyber threats . People often learn about this in some articles about digital transformation , While digitalization is essential for operational efficiency and business growth , But it also increases the risk .
As enterprises digitize their processes , Its attack surface is not only all its online operations ; It has grown to cover its broader supplier and supplier network .
This represents a huge risk , According to the survey , Many people do not consider this risk . although 56% Enterprise estimate of 2022 In, the number of reported incidents of software supply chain attacks will increase , But only 34% Of enterprises have formally assessed the risks they face . Another survey found that ,58% Of enterprises cannot determine whether the supplier's safeguard measures and security policies are sufficient to prevent data leakage .
More software means more risks
It's not difficult to see why , Because it is difficult to manage your own network security . From protecting new mobile users ( And its endpoints ) To protect data in transit and at rest , And ensure that employees maintain network security in mixed and remote work environments , Protecting enterprises in the digital age is a major challenge . And extend it to suppliers , It will only add another layer of complexity .
Enterprises must be able to trust their suppliers to have the same enterprise security protocols and Standards . In terms of cyber security , People hope that technology enterprises can become one of the leaders , But for any enterprise , Those who think they are safe are dangerous .
What will happen to enterprises that want to protect themselves from the increasing risks in their software supply chain ? Now , This means that they must take the initiative 、 Continuous monitoring and rapid response , Greatly strengthen the third party 、 Supplier and supply chain risks .
Three steps to prevent software supply chain security vulnerabilities
The first step is to , Enterprises need to know the problems they face . This means understanding how information flows between their businesses and suppliers . Knowing this can do two things : It can draw a defense map and deploy resources to alleviate potential weak areas ; It allows enterprises to understand what legal data is , And identify potential threats .
This is crucial , Because the rapid sharing of information is the core of digital enterprises . If the information is intercepted through heavy security checks , Enterprises may keep safe , But it may also lose the opportunity . Know what data should be entered , And where the data may be hijacked or directed , Can improve operational performance , At the same time, it provides more protection .
This defense is improved by the second step : Continuous monitoring . This means never assume that something is legal , Until it proves that it is legal . let me put it another way , Take a zero trust approach and constantly check every interaction and participation . People may know the story of some home buyers being hijacked by hackers when they receive emails from lawyers asking for funds to be deposited into different accounts . Usually , These emails are legal , Just because the lawyer's account may be leaked . therefore , Unsuspecting buyers will follow the instructions , Only when the lawyer calls to ask where the funds are , They realized their mistakes .
The same thing can happen in business relationships , In addition to the transfer of funds , It may be an infected application downloaded , Or an infected email attachment , Allow bad actors to access corporate networks and data . Through continuous monitoring , Check the system and vulnerabilities repeatedly , And immediately identify any violations .
This leads to the third step : Quick response . Once a violation occurs , Whether inside the enterprise or as part of a third party , Event response plans must be initiated . In an event like this , The worst thing anyone can do is do nothing ; Even turn off all devices and notify the customer , It's better than not reacting .
But it does need a plan . Because having a larger attack surface does mean more kinds of potential violations . When these events involve third-party compromise , A response plan should be developed based on the supplier's comments : How will they react ; What will communication look like ; As an enterprise , How to deal with ? Every enterprise has different stakeholders and processes to adapt , But when making plans to mitigate the impact of cyber attacks , Nothing should be assumed .
summary
in the final analysis , This is a case of when, not whether, violations will occur , This is the same for every enterprise upstream and downstream of the supply chain , This is due to the interconnected world . But enterprises should not be afraid . If a clear proactive response plan can be implemented , Continuously monitor every supplier interacting with the enterprise , Clearly understand the location of the weak point , And know what the worst situation is . This will enable any enterprise and third party to better respond quickly , And mitigate the impact of future cyber threats .
边栏推荐
- 淺學js中的關系運算符
- R语言ggplot2可视化:使用ggpubr包的ggballoonplot函数可视化分面气球图(可视化由两个分类变量组成的列联表)、facet.by参数指定分面变量
- Sql笔记
- Data statistical analysis cases (comparative analysis, sales comparison analysis, year-on-year, double coordinate diagram, month on month, shift, contribution analysis (Pareto Law), differentiation an
- Classic application method of installing HAP on Hongmeng development board
- 基于单片机倾角检测仪设计分享
- The University of Leuven recruited postdoctoral researchers to use ai/ml to analyze images of solar activity areas and predict flares
- Flutter draws very interesting Bezier curve animation
- R语言使用glm函数构建泊松对数线性回归模型处理三维列联表数据构建饱和模型、使用step函数基于AIC指标实现逐步回归筛选最佳模型
- [C language brush leetcode] 134 Gas station (m)
猜你喜欢

Data statistical analysis cases (comparative analysis, sales comparison analysis, year-on-year, double coordinate diagram, month on month, shift, contribution analysis (Pareto Law), differentiation an

Duplicate disk: how does the backpropagation process of pooling layer, average pooling and maximum pooling backpropagate

Sword finger offer 53 - ii Missing numbers from 0 to n-1

Use of prettier code formatting tool

Mathematical modeling does not know latex typesetting | it teaches you how to use beautiful latex formulas gracefully in word

Mathematical modeling - Classification Model (based on logistic regression)

MySQL -- string function

Linux服务器装mysql数据库(详细教程)

Embedded development: seven techniques for accelerating firmware development

About SQL: orcale SQL, why is the foreign key inventory ID statement of the merchant table invalid
随机推荐
将一个文件夹中的内容复制到另一个文件夹中
R语言使用data.table包对dataframe行数据进行排序(基于多字段、变量进行数据行排序,不重新排序实际的数据变化)、并计算排序后分组的累积加和值
【黄啊码】MySQL入门—2、使用数据定义语言(DDL)操作数据库
On array method reconstruction and re encapsulation -foreach map -- push (), unshift (), shift (), map (), filter (), every (), some (), reduce ()
[C language brush leetcode] 676 Implement a magic Dictionary (m)
R language uses LM function to build regression model and BoxCox function of mass package to find the best power transformation to improve the fitting degree of the model (determine the best λ Paramet
putchar()
Do you know the answers to the common questions in the interview of senior programmers? With answer
Win10 how to convert FAT32 format disks into NFTs format without formatting
Leetcode high frequency question: image intersection and union ratio IOU calculation method and hand tearing code
关于#sql#的问题:orcale sql, 为什么MERCHANT table的外键inventory—id 语句是无效的
科技云报道:构建可观测性的核心能力是什么?
sentinel
如何应对供应链中第三方的安全风险
OSPF special area
Unity about some possible reasons and solutions for using addforce of rigidbody but it doesn't work
Layoffs are coming
图执行引擎那些事(一)
Hystrix deployment
鲁汶大学招募博士后研究员,利用AI/ML对太阳活动区图像进行分析和耀斑预测...