Cybersecurity as a major supply chain risk domain

The digitization and interconnectedness of business is increasing the risk of cyberattacks, regardless of the level of security employed

Subscriber: Log Out

Editor’s Note: This is the first in a series on Cybersecurity in Supply Chains by SK Jeong, a University of Tennessee professor and digital supply chain researcher experienced in detecting vulnerabilities in software systems and economic impact of cyberattacks. He explores why cybersecurity matters to supply chain managers and what fundamental strategies managers should take. You can find the original post on the University of Tennessee Global Supply Chain Institute’s blog, where supply chain professionals can find essential reading from leading researchers and scholars on the latest trends and topics relevant to global supply chain management.

With the digitalization of business, cyberattacks have become a top risk. These attacks occur more frequently and cause significant losses in business value. Recognizing the severity of the risk they’re exposed to, leading companies have enhanced their cybersecurity measures. However, building a so-called security fortress does not prevent cyberattacks entirely. Instead of directly attacking well-protected target companies, cyber-attackers will often exploit suppliers with weaker protections to gain access and harm their primary targets.

A prominent example of a supply chain cyberattack is the 2020 SolarWinds incident. SolarWinds offers Orion software, an IT infrastructure tool used to monitor, analyze, and manage corporate IT systems. State-sponsored hackers infiltrated the software, inserting malicious code into a scheduled update. Customers, including U.S. federal agencies, state and local governments, and major corporations, were compromised when they executed the update. This breach affected around 18,000 SolarWinds customers.

For over a decade, scholars like me have documented the rising pattern of cyberattacks channeled through the supply base. What we began observing in the early 2010s accelerated with the COVID-19 pandemic. As the world moved online, the rapid and necessary adoption of digital tools, active use of digital services, and improved digital connectivity with suppliers increased business productivity but also induced more cyberattacks through the supply chain.

Importance of integrating  cybersecurity into supply management

A primary reason the supply chain is leveraged for cyberattacks is suppliers’ weak cybersecurity levels. Despite the rising risk, suppliers—often smaller companies—do not have sufficient measures to protect themselves against attacks. With fewer operational resources and limited capabilities, they’re left exposed. Even when made aware of the importance of cybersecurity, suppliers place more emphasis on key operational performance measures like speed and cost than cybersecurity-related measures. This inclination within supply management is akin to other emerging issues in the discipline (e.g., sustainability in the supply base).

Supply management thus plays an essential role in securing against cyberattacks. Cybersecurity must be integrated into the supplier selection process, and continuous supplier development in cybersecurity is necessary. After all, in today’s digitally connected environment, companies can remain vulnerable to cyberattacks originating from their supply chains regardless of their own defense level. In that regard, supply managers must take a leadership role in cybersecurity, orchestrating their supply chains in the same way they do when facing other key business issues.

Understanding the digital supply chain for cybersecurity

Like physical products, most software products are not built by a single supplier. They consist of multiple modules, potentially made of sublevel modules, forming “software supply chains.” Companies embedded in software supply chains face challenges akin to those in conventional supply chains. While recent studies consistently reveal that a significant portion of software modules rely on vulnerable components within their supply chains, it is difficult to map what constitutes a software supply chain below the first-tier supplier/module and how a software supply chain evolves over time. This challenge becomes more serious when hackers exploit vulnerabilities in a low-tier supplier/module in software supply chains.

In 2021, for example, Log4J, an obscure but widely used software that records computer system activities, was exploited through a security vulnerability that allowed malicious attackers to infiltrate the system without using valid passwords. Digital goods, by nature, can be readily and instantaneously accessed from the outside. As new vulnerabilities are disclosed, hackers may exploit them before they are resolved. Software products using vulnerable modules in their supply chains remain at risk of cyberattacks unless these issues are addressed.

Recent developments and best practices

In response to the rising risk of cyberattacks, government agencies and industry organizations have developed frameworks that supply chain managers should adopt.

Similar to traditional Bill of Materials practice, the Software Bill of Materials (SBOM) details the required software modules for a product. This helps organizations understand the components within their software, allowing for better tracking of potential vulnerabilities and responsive mediation of emerging issues in the software supply chain.

There is also a government-level movement toward creating standardized frameworks for managing supply chain cybersecurity. For example, the National Institute of Standards and Technology (NIST) released a Cybersecurity Supply Chain Risk Management framework, which underscores the issue’s importance and provides a systematic approach to helping companies consider factors involved in supply chain cybersecurity.

Beyond technical tools, managerial attention to potential cybersecurity concerns is crucial. Cyberattack strategies evolve as hackers and defenders interact, meaning no permanent solutions can exist. Collective and responsive actions across organizational boundaries can mitigate the impact of potential cybersecurity risks. For instance, despite the severity of the log4j vulnerability, many companies and communities were proactive in addressing the issue collectively, effectively minimizing the ramifications.

In the next post, we will explore recent supply chain cyberattack cases and what lessons we can learn from them.

About the Global Supply Chain Institute

The University of Tennessee's Global Supply Chain Institute (GSCI) is the preeminent hub for supply chain thought leadership and talent development. The pinnacle of GSCI’s efforts is UT’s Supply Chain Forum, which brings together more than 80 of the world’s most innovative and impactful companies twice a year to learn, network, and recruit the country’s top supply chain talent. 

 

SC
MR

Similar to traditional Bill of Materials practice, the Software Bill of Materials details the required software modules for a product, helping organizations understand the components within their software and better track vulnerabilities.
(Photo: Getty Images)
Similar to traditional Bill of Materials practice, the Software Bill of Materials details the required software modules for a product, helping organizations understand the components within their software and better track vulnerabilities.
What's Related in Cyber Security
It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Listen in

Subscribe

Supply Chain Management Review delivers the best industry content.
Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals.
×

Search

Search

Sourcing & Procurement

Inventory Management Risk Management Global Trade Ports & Shipping

Business Management

Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance

Software & Technology

Artificial Intelligence Automation Cloud IoT Robotics Software

The Academy

Executive Education Associations Institutions Universities & Colleges

Resources

Podcasts Webcasts Companies Visionaries White Papers Special Reports Premiums Magazine Archive

Subscribe

SCMR Magazine Newsletters Magazine Archives Customer Service

Press Releases

Press Releases Submit Press Release