IT disaster recovery, cloud computing and information security news

According to a new ENISA report – ‘Threat Landscape for Supply Chain Attacks’, which analysed 24 recent attacks, strong security protection is no longer enough for organizations when attackers have already shifted their attention to suppliers. This is evidenced by the increasing impact of these attacks such as downtime of systems, monetary loss and reputational damage.

According to the report novel protective measures to prevent and respond to potential supply chain attacks in the future while mitigating their impact need to be introduced urgently.

In order to compromise targeted customers, attackers focused on the suppliers’ code in about 66 percent of the incidents analysed. This shows that organizations should focus their efforts on validating third-party code and software before using them to ensure these were not tampered with or manipulated.

For about 58 percent of the supply chain incidents analysed, the customer assets targeted were predominantly customer data, including Personally Identifiable Information (PII) data and intellectual property.

For 66 percent of the supply chain attacks analysed, suppliers did not know, or failed to report on how they were compromised. However, less than 9 percent  of the customers compromised through supply chain attacks did not know how the attacks occurred. This highlights a gap in terms of maturity in cyber security incident reporting between suppliers and end-users.

The report includes an extensive number of recommendations for customers to manage the supply chain cyber security risk and to manage the relationship with suppliers.

Recommendations for customers include:

  • Identifying and documenting suppliers and service providers;
  • Defining risk criteria for different types of suppliers and services such as supplier and customer dependencies, critical software dependencies, single points of failure;
  • Monitoring of supply chain risks and threats;
  • Managing suppliers over the whole lifecycle of a product or service, including procedures to handle end-of-life products or components;
  • Classifying of assets and information shared with or accessible to suppliers, and defining relevant procedures for accessing and handling them.

The report also suggests possible actions to ensure that the development of products and services complies with security practices. Suppliers are advised to implement good practices for vulnerability and patch management for instance.

Recommendations for suppliers include:

  • Ensuring that the infrastructure used to design, develop, manufacture, and deliver products, components and services follows cyber security practices;
  • Implementing a product development, maintenance and support process that is consistent with commonly accepted product development processes;
  • Monitoring of security vulnerabilities reported by internal and external sources that includes used third-party components;
  • Maintaining an inventory of assets that includes patch-relevant information.

Read the report.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.