
How confident are you in not only your network security but also the integrity and reliability of your supply chain?
In a seemingly continuous stream of recent data breaches and ransomware attacks, every organization has to ask that question. Many businesses might get high marks for fortifying their own network security. But malicious actors are taking an indirect but effective means of breaching those defenses by attacking third parties in a company’s supply chain.
In April, this growing and global problem led the Cybersecurity and Infrastructure Security Agency (CISA) and National Institute of Standards and Technology (NIST) to issue guidance on defending against software supply chain attacks. The guidance followed on the heels of the SolarWinds software breach, a headline-grabbing supply chain attack that affected public and private organizations around the world.
Supply chain insecurity isn’t just an issue for the traditional software or IT industry, and any organization can become a target.
More recently, the world’s largest meat supplier, JBS, fell victim to a ransomware attack that disrupted the meat supply chain in multiple countries. The attack temporarily shut down operations at meat plants in the U.S., Canada, and Australia, drove up wholesale meat prices, and forced food distributors including grocery stores and restaurants to search for new suppliers.
John Linkous, founder and principal adviser at Phalanx Security, a consulting firm providing enterprise security strategy and services, says:
“Just because somebody is a vendor that has a really well-known name in security, or IT or software technology, or physical assets like ATMs, doesn’t necessarily mean their systems are fully secure.”
Supply chain attacks can take many specific forms – too many to address within the scope of this article.
“Bad actors can combine multiple types of attacks into a complex chain of incidents, which means your best form of protection is to take a comprehensive approach across your entire supply chain.” – John Linkous
(For more information about types of supply chain attacks, Linkous highlights many of them as well as these preventive steps in a free on-demand webinar as part of the #Curio Virtual Tech Summit presented by Sayers.)
Avoid being the next victim of a supply chain attack by following these nine steps to protect your organization:
Additional ways to assess your vendors’ level of security include automated tools such as BitSight and SecurityScorecard. Take advantage of free, downloadable questionnaires for your third-party vendors from organizations including:
“Monitor your trust boundaries with things like whitelisting and default-deny policies, implementing behavioral analysis at the asset or user level, and having some sort of continuous monitoring and alerting capability,” Linkous says.
In that example, you would either have to rely on the MRI vendor to provide a software upgrade or patch, or mitigate the risk yourself. A growing practice in healthcare environments is network segmentation – dividing your network into multiple segments or subnets. That MRI machine or other healthcare delivery equipment would sit on separate segments than your email servers, which pose a different risk level.
The conversation with your vendors about third-party assessments doesn’t have to be awkward. First, ask if they have any type of verification related to their cybersecurity controls and the integrity of their supply chain. If they’re a manufacturing company, for example, they might already be ISO 9000 certified, which requires organizations to maintain some degree of supplier integrity.
If they don’t have those controls in place yet, make the process as collaborative as possible. Help them understand why you’re asking questions about their environment. “If they’re handling your financial transactions in some way,” Linkous advises, “make sure they understand you’re asking that question because, if that data is compromised in any way or there are issues with its custody or data integrity, you’re on the hook as much as they are.”
Your customers are going to look to you to be accountable, regardless of whether it was one of your downstream vendors who had the data breach. Instead of dealing with the repercussions of guilt by association after an attack, take proactive steps now to secure your entire supply chain.
Questions? Contact us at Sayers today about your security and compliance questions for your organization as well as your supply chain.
Additional Resources:
Maintaining Supply Chain Cybersecurity in a Global Economy. Free 30-minute on-demand webinar by security expert John Linkous, with real-world examples of technology supply chain threats and impact.