Time
5 hours 19 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Transcription

00:01
Lesson 2.4 Supply chain risk management considerations.
00:05
In this lesson, the objectives will be one learned what supply chain risk management is and how it impacts cybersecurity and I are, and two will identify threats, risks and vulnerabilities associated with the supply chain
00:19
supply chain. Risk management is defined here as the discipline that addresses the threats and vulnerabilities of commercially acquired information and communications technologies, and that's from miter.
00:32
So we're going to talk just very briefly in this lesson about how supply chain risk management applies. Toe I are and some things that you should be aware of when you're making your I are planning, Uh, and just for the whole life cycle of incident response, how supply chain risk management can fit into that.
00:51
On the slide, you see a graphic that is, from Nest 800 won 61 that talks about
00:57
specific things to supply chain
01:00
on the left hand side. You see the threats. So here's some examples of threats within the supply chain
01:06
from an adversary insertion of counterfeits. So there's organizations and government agencies out there that have full time people that reverse engineer products that they get so for example, they'll taken order of 100 Cisco switches. They'll take apart a couple of them out of that order.
01:23
They'll make sure there's no implanted hardware that's taking the data and sending it to a different country,
01:30
or there are no other counterfeit devices inside. And there's been a lot of stories of this kind of thing happening where they didn't have a known supplier or that supplier was getting counterfeit things from other
01:45
fake businesses or criminal enterprises, and they were selling them is legitimate. So being able to look at circuit boards and components and things like that can identify this.
01:56
Also, tampering or theft could be another problem. And the insertion of malicious software like I mentioned some sort of compromise internally to the device that has firmware that's got malware as part of it.
02:10
Other non adversarial threats are a natural disaster, poor quality and products. So
02:15
having poor quality is not the result of an attack, but certainly can impact the organization and is a threat because maybe it doesn't stand up to the bandwidth requirements that it said it could, and that impacts the ability to do I. D. S. I. P s monitoring and prevention
02:34
of militias, signatures or things like that because it
02:38
can't handle the throughput.
02:39
Also, poor practices and engineering and manufacturing and acquisition and management.
02:45
On the right hand side, you see the vulnerabilities. So these air weaknesses to the supply chain our weaknesses to the entities in the supply chain or dependencies on power and telecom. So vulnerability could be that you have. You get one really important component
03:00
from a very small business. And that business has no disaster recovery plans, no coupe continuity of operations.
03:07
And they're susceptible to all sorts of problems because of maybe physically, geographically, where that business is located. So that could be a vulnerability to the supply chain.
03:17
Internal vulnerabilities can include things like information systems and components, organizational policies and processes, maybe a lack of governance or poorly written procedures.
03:29
And you take those threats and vulnerabilities and you go down to the likelihood What's the probability of a threat explode? Exploiting the vulnerability
03:38
eso an adversarial example is what's their capability and intent.
03:43
And maybe they have discovered that the Palo Alto firewalls that you use are vulnerable to a exploit that we know our adversaries. Air currently using
03:54
on the non adversarial side. What's the occurrence likelihood based on history? Do we know? Even though that small business I mentioned, that's in a poor location in the country? As faras natural disasters go, maybe they're susceptible to tornadoes
04:11
or things like that. And they also have no backup plans whatsoever if they get hit by one, although
04:17
in the last 10 years has never actually happened. So those are things to think through as well, and then the impact. So you have the likelihood and then what's the impact? And this should look familiar to you because it's what we went over with the risk register.
04:31
So if it does happen, how is it going to affect you? What's the impact to the mission or the business from data loss or modification or ex filtration of data from unanticipated failures or loss of system availability or from availability of components?
04:49
So if you've identified that you need a really important
04:53
piece of manufacturing equipment for your business, but it comes from an unreliable source,
04:59
then you might have some additional impacts to the organization if the risks that you've identified actually were to happen and when you boil all of this down. It's your overall risk to the organization, and that's where you come up with your risk mitigation strategies.
05:15
Do you simply accept that risk? Do you come up with a way to mitigate it? Do you transfer it to somebody else through insurance or other things?
05:23
And those are the conversations that you have to have at the executive level? But I would just wanted you to get an idea of supply chain risk management
05:30
and think through it from a cyber perspective. Most places can't afford to have someone reverse engineer every fifth switch on their network or look at the routers or look at the computers that you're buying.
05:44
So because of that, you may have to think about how it would impact your organization if something was found to be counterfeit. But also who are your suppliers, and is there any type of vetting that goes on? Do you just buy the allow people to buy things off eBay? I've seen that before,
06:01
allow people to use their personal computers on the corporate network.
06:04
Do you allow people to buy used equipment from different vendors? So think through that from a risk perspective. What are all the possible things that could happen, and is it something worth being worried about? But supply chain is a huge issue for especially organizations that
06:23
by a lot of things from external people
06:26
and making sure that you can follow the chain of supply from the manufacturer all the way to you is really important, especially for critical components to the organization.
06:39
So quick question here. What is not a threat associated with supply chain risk management? So it's not a threat
06:46
miss configuration of a device, insertion of malware or counterfeit devices?
06:57
The answer here is a mis configuration of a device that may be a vulnerability and cause you to be open to something. But it's not a threat. It's not an action that's taken against you. So insertion of malware and counterfeit devices would both be considered threats where Miss Configuration would be considered, Ah, vulnerability
07:16
and not a threat.
07:17
So in summary, we looked at why supply chain risk management is important and how it impacts cybersecurity and I are, and how to identify threats, risks and vulnerabilities associated with the supply chain

Up Next

Incident Response Lifecycle

This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity incident response.

Instructed By

Instructor Profile Image
Josh Moulin
Instructor