Department of Homeland Security identifies top threats to supply chain security in 2019 report

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency’s Information and Communications Technology (ICT) Supply Chain Risk Management Task Force released its 2019 interim report[1] in September. The task force was established to advise public and private sectors organizations on means for assessing and managing risks associated with the ICT supply chain.

Supply chain security has become a major issue for the United States government and the Trump administration, which has passed several acts and executive orders to improve security — especially cybersecurity — within the vast procurement networks that feed into the U.S. government supply chain. A webinar cited by the report estimates the U.S. government invests USD 500 billion in ICT products and services and this, coupled with multiple reports detailing the many threats to supply chains (e.g., reports from Symantec Corp.[2] and the National Counterintelligence and Security Center[3] ), demanded a serious effort to understand the threats.

The Cybersecurity and Infrastructure Security Agency’s task force was split into four working groups, each addressing a different element of the supply chain:

  • Working group 1: Information sharing – Development of a common framework for the bi-directional sharing of actionable supply chain risk information across the community.

  • Working group 2: Threat evaluation – Identification of processes and criteria to better understand and evaluate threats to ICT supplies, products, and services.

  • Working group 3: Qualified bidder Lists and Qualified Manufacturer Lists (QBL/QML) – Identification of market segments and evaluation criteria to establish Qualified Bidder and Qualified Manufacturer Lists that address considerations of vendor and product inclusion and exclusion.

  • Working group 4: Policy recommendations to incentivize purchase of ICT from original equipment manufacturers & authorized resellers – Policy recommendations principally aimed at stopping the growing problem of counterfeit ICT procurement.

This document is only available to subscribers. Please log in or purchase access.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field