1-11 Flashcards
Who are the 4 participants in the supply chain?
Suppliers, Distributors, Manufacturers, and Retailers
How are supply chains infiltrated?
Software: compromise development, malicious code injection, update tampering. Hardware: Tampering with manufacturing, inserting malicious components, counterfeits.
What are some ways to mitigate Supply Chain Risks?
Diversify suppliers, develop contingency plans, collaborate with key stakeholders across the supply chain
What is SCRM?
Supply chain risk management - implementation of strategies to manage uncertainty, identify vulnerabilities, mitigate risks, and ensure continuity.
What are some SCRM endevours?
- Strategic alignment with enterprise risk management program.
- Supply chain due diligence. Investigating as many layers in supply chain as much as possible
- Dual or multi sourcing whenever possible.
- Supply chain security mechanisms.
Contracts and agreements.
What is a Silicon Root of Trust?
Cryptographic hardware security module. Device integrity, secure boot, attestation, authentication, and lifecycle security
What is a PUF?
Physically Unclonable Function - Unique and hard to replicate hardware identifier
What is an SBOM?
Software Bill of Materials: Very detailed list of components, libraries, cryptographic signatures, and metadata used in software development of a software application.