July 28, 2022 By Mike Elgan 3 min read

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) recently published updated guidance for reducing cybersecurity risks in supply chains.

Titled “Software Supply Chain Security Guidance,” the update is NIST’s response to directives issued by an executive order by President Joe Biden, designed to improve cybersecurity in the United States.

This NIST guidance is assumed to target federal agencies. However, NIST points out that it can apply to all kinds of organizations. It’s one of the most thorough references out there for cyber supply chain risk management. 

Don’t want to read a 326-page document? Here are the 10 key takeaways that can inform your efforts to secure your supply chain.

Consider specific components of vulnerabilities

NIST suggests an atomized view of vulnerabilities. They call for considering not only products but each specific component. Don’t forget “the journey those components took to reach their destination,” either.

Supply chains at risk

Supply chains are more at risk than ever. Companies manufacture products all over the world, and those products are complex. Different manufacturers from different places may assemble individual components from parts coming from around the world. Each of the dozens, hundreds or thousands of sources for the parts that go into complex machinery, computers and other devices may themselves fall victim to attacks aimed at breathing supply chains. All of this is true of software as well as hardware.

Customize guidelines

The NIST guidelines aren’t one-size-fits-all dictates. Instead, the agency designed the principles and practices to be customized. The document says, “Enterprises should identify, adopt, and tailor the practices described in this document to best suit their unique strategic, operational, and risk context.”

Automation is essential

You can’t follow the NIST guidelines without automation. In fact, businesses need to automate their risk management workflow in today’s complex supply chain world.

Every employee matters

It takes a village to secure an enterprise. This document dragoons every worker into service as cybersecurity guardians. Plus, it points out that all organizations are interconnected. Finding vulnerabilities in one component of your supply chain often protects others.

Don’t skip appendix A

Appendix A contains the most important updates. This is the guidelines’ extensive list of “security controls,” which are either safeguards or countermeasures. NIST sorts them into “families,” such as “access control,” “incident response,” “risk assessment” and many others. This is the part that received the greatest amount of bolstering and additions in the new guidelines.

Zero trust matters

The NIST guidance calls for zero trust in supply chains. They don’t belabor the ‘zero trust’ buzzword, but the idea is embedded in the security controls. Under the “access control” family, for example, the document says that “organizations must limit information system access to authorized users, processes acting on behalf of authorized users, devices (including other information systems), and the types of transactions and functions that authorized users are permitted to exercise.”

The “access enforcement” section also points out that “information systems and the supply chain have appropriate access enforcement mechanisms in place.” The guidance contains a lot more about what that means, how enforcement should work and other details. It all adds up to zero trust.

Supply chain connections

The updated NIST guidance makes it clear that supply chain infrastructure and resources aren’t something separate. Instead, they include information technology and operational technology. NIST also calls out Internet of Things devices, software and services.

Something for everyone

It’s not just developers who should read, study and refer to the “Software Supply Chain Security Guidance.” Instead, NIST points out that it has a very broad target audience. The new guidance is relevant to managers, engineers, business owners, developers, project managers, procurement managers and anyone with procurement responsibilities. NIST also designed it for all logistics leaders, system integrators, property managers, continuity planners, anyone involved in privacy, component producers and, of course, everyone involved in cybersecurity.

Prioritize the right risk

Prioritization is key to supply chain risk management. The guidance goes into some detail on risk, how to develop a formal understanding of where the greatest risk lies in the supply chain and how to prioritize and take action on those biggest risks. It also offers advice on viewing risk on three levels: the enterprise, business process and operational levels.

With endless time, personnel and resources, you could follow the updated NIST “Software Supply Chain Security Guidance” to the letter. In the real world, the document provides a comprehensive, if inevitably aspirational, catalog of risks and remedies for securing supply chains. The guidance can provide a practical roadmap by combining risk prioritization with automation, artificial intelligence and other tools. Plus, it’s a valuable educational tool for the many employees who don’t see themselves as needing to put security first.

More from Risk Management

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Roundup: The top ransomware stories of 2024

2 min read - The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure and supply chains, raising the stakes for victims and increasing the motivation to cooperate.Here are the biggest ransomware stories of 2024.Ransomware payments reach record highRansomware payments surged to record highs in 2024. In the first half of the year, victims…

83% of organizations reported insider attacks in 2024

4 min read - According to Cybersecurity Insiders' recent 2024 Insider Threat Report, 83% of organizations reported at least one insider attack in the last year. Even more surprising than this statistic is that organizations that experienced 11-20 insider attacks saw an increase of five times the amount of attacks they did in 2023 — moving from just 4% to 21% in the last 12 months.With insider threats on the rise, it’s critical for businesses to recognize the real dangers that originate from inside…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today