Cyber supply chain: An approach to assessing risk - ITSAP.10.070

In today’s digital world, cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. actors use supply chain weaknesses for malicious activity, and every link in a global supply chain can pose a threat to cyber security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. . Organizations with valuable information or services should strengthen their cyber security defense by identifying, assessing, and mitigating the risks associated with the global and distributed nature of Information and Communication Technology (ICT) product and service supply chains. Together, these elements form the basis of a robust cyber Supply Chain Risk Management (SCRM) strategy. Organizations are encouraged to follow the Cyber Centre’s approach on page 2 of this publication to assess cyber supply chain risks.

 
Supply chain risk lifecycle
Long description immediately follows
Long description - Supply chain risk lifecycle

The image highlights the six stages of the supply chain lifecycle, with the associated risk for each stage as noted below:

  1. Standards and industry requirements
    • The associated risk is leveraging market influence
  2. Design
    • The associated risk is poor quality design practices
  3. Production
    • The associated risk is tampering
  4. Delivery and deployment
    • The associated risk is weak cyber security practices
  5. Operation
    • The associated risk is exploitation of vulnerabilities
  6. Maintenance
    • The associated risk is service provider compromise

The diagram demonstrates that within all of the six stages of the supply chain lifecycle, there are risks present. Throughout the lifecycle, the following should be considered:

  • Threat actors can influence products before they are even conceptualized.
  • Vulnerabilities can be introduced deliberately or accidentally during the design and production of a product.
  • Once the product is deployed, vulnerabilities can be discovered and exploited by threat actors during operation. Implementation of proper security controls within the environment is essential at this stage.
  • Products can be compromised during regular maintenance and patches, introducing new vulnerabilities or exploiting existing ones.

Cyber Centre’s SCI program: providing valuable insights for the Government of Canada (GC)

The Cyber Center’s Supply Chain Integrity IntegrityThe ability to protect information from being modified or deleted unintentionally or when it’s not supposed to be. Integrity helps determine that information is what it claims to be. Integrity also applies to business processes, software application logic, hardware, and personnel. (SCI) Risk Assessment framework is a comprehensive program developed to perform assessments on ICT products and services that will be deployed onto GC infrastructure. The aim of the program is to safeguard the confidentiality ConfidentialityThe ability to protect sensitive information from being accessed by unauthorized people. , integrity, and availability AvailabilityThe ability for the right people to access the right information or systems when needed. Availability is applied to information assets, software, and hardware (infrastructure and its components). Implied in its definition is that availability includes the protection of assets from unauthorized access and compromise. of the GC’s communications and data by fostering resilience against digital supply chain vulnerabilities and compromise CompromiseThe intentional or unintentional disclosure of information, which adversely impacts its confidentiality, integrity, or availability. .

Cyber Supply Chain risk assessments include recommendations for mitigation strategies and measures to help lower the risk against potentially vulnerable technologies, to ensure the protection of the GC’s information, networks, and IT infrastructure.

The Cyber Centre recommends using Cyber Supply Chain risk assessments as an important input into an organization’s existing risk management framework. If an organization uses the Cyber Centre’s IT security risk management: A lifecycle approach (ITSG-33), SCI risk assessments provide the inputs for security control Security controlA management, operational, or technical high-level security requirement needed for an information system to protect the confidentiality, integrity, and availability of its IT assets. Security controls can be applied by using a variety of security solutions that can include security products, security policies, security practices, and security procedures. SA-12(8). Another reference document that aligns with international standards is the Charter of Trust document Common risk-based approach for the Digital Supply Chain (PDF).

 

Elements of assessing supply chain risk

There are several items to consider when evaluating your supply chain. The Cyber Centre uses a multistep approach to assess cyber supply chain risk for connected products and services which involves the following key elements:

 

This assessment will be product-specific and should be conducted on a case-by-case basis. Sensitivity will vary depending on the specific context. Sensitivity should be assessed on a low/medium/high scale based on technological and contextual factors.

The product

  • The technology’s function – The role a product or service plays, and the impact on data Confidentiality, Availability, and Integrity if a compromise or disruption occurs.
  • Data processed – The type of data processed by a product or service may affect the attractiveness of the system to cyber threat actors. Data classification and aggregation of data influence the sensitivity and associated risk.

The context

Importance in the eco system – elements of Critical Infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. , Government networks of importance, and emerging disruptive technologies such as quantum computing Quantum computingA quantum computer can process a vast number of calculations simultaneously. Whereas a classical computer works with ones and zeros, a quantum computer will have the advantage of using ones, zeros and “superpositions” of ones and zeros. Certain difficult tasks that have long been thought impossible for classical computers will be achieved quickly and efficiently by a quantum computer. or Artificial Intelligence Artificial intelligenceA subfield of computer science that develops intelligent computer programs to behave in a way that would be considered intelligent if observed in a human (e.g. solve problems, learn from experience, understand language, interpret visual scenes). may be considered highly sensitive.

The procurement – Monetary value and diversity in options.

 

This assessment will be supplier-specific and should be conducted on a case-by-case basis. Confidence level in the Supplier: To determine a level of confidence in your suppliers, consider factors specific to their business, as well as their cyber security practices that align with international standards. The level of effort in Step 2 is dependent on sensitivity level

The supplier ownership

  • Foreign ownership, control and influence (FOCI) – How closely linked is a company and the government of a nation where it resides, including the potential likelihood of being compelled to carry out activities counter to Canadian interests.
  • Geopolitical context – The location of a company’s headquarters and operation centers, the legislative framework a company is bound to regarding data protection, and the domestic laws limiting exercise of government powers.
  • Business practices – Ethical behavior and adherence to legal and policy frameworks may indicate how trustworthy a company is. Transparent ownership, investment and contracting are also examined.

Cyber maturity

Standards and certification – Adherence to international technology standards and certifications in design, production and maintenance of products and services.

Data protection – Products or services designed to provide confidentiality, authenticity, integrity and availability of data. Data should be protected from unauthorized access throughout the data life cycle.

Cyber security policies – Proactive cyber security policies and safeguards, and security vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. management help to determine a company’s cyber security maturity.

 

Deployment models should be assessed for each product and be aligned to your organization’s internal posture. Consider the deployment in the context of your organization’s security posture. Determine whether the risk exposure from a specific supplier is acceptable, if stronger mitigations need to be put into place, or if an alternate technology or supplier needs to be selected to achieve the business function. The results of this assessment will determine appropriate mitigation measures, largely based on the security controls outlined in the Cyber Centre’s IT security risk management: A lifecycle approach (ITSG-33).

Your organization

Threat actors and tactics, techniques, and procedures – Looking at the lifecycle of supply chain, evaluate which threats the organization could face.

Cyber defense capabilities – Evaluate the security controls the organization has in place to protect against such threats.

Mitigation – The ability to implement mitigation advice to reduce residual risk Residual riskThe likelihood and impact of a threat that remains after security controls are implemented. .

Impact of compromise and resilience to recover – Effective incident handling of hacking attempts or data breaches the company has faced.

Based on organizational capability, is the risk exposure acceptable?

Date modified: