Куда я попал?
Supply Chain Compromise Mitigation
Apply supply chain risk management (SCRM) practices and procedures (Citation: MITRE SE Guide 2014), such as supply chain analysis and appropriate risk management, throughout the life-cycle of a system.
Leverage established software development lifecycle (SDLC) practices (Citation: NIST Supply Chain 2012):
* Uniquely Identify Supply Chain Elements, Processes, and Actors
* Limit Access and Exposure within the Supply Chain
* Establish and Maintain the Provenance of Elements, Processes, Tools, and Data
* Share Information within Strict Limits
* Perform SCRM Awareness and Training
* Use Defensive Design for Systems, Elements, and Processes
* Perform Continuous Integrator Review
* Strengthen Delivery Mechanisms
* Assure Sustainment Activities and Processes
* Manage Disposal and Final Disposition Activities throughout the System or Element Life Cycle
A patch management process should be implemented to check unused dependencies, unmaintained and/or previously vulnerable dependencies, unnecessary features, components, files, and documentation. Continuous monitoring of vulnerability sources and the use of automatic and manual code review tools should also be implemented as well. (Citation: OWASP Top 10 2017)
ID: T1195
Version: 1.0
Created: 17 Oct 2018
Last Modified: 14 Jul 2020
Techniques Addressed by Mitigation |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1195 | Supply Chain Compromise |
|
References
- The MITRE Corporation. (2014). MITRE Systems Engineering Guide. Retrieved April 6, 2018.
- Boyens, J,. Et al.. (2002, October). Notional Supply Chain Risk Management Practices for Federal Information Systems. Retrieved April 6, 2018.
- OWASP. (2017, April 16). OWASP Top 10 2017 - The Ten Most Critical Web Application Security Risks. Retrieved February 12, 2019.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.