{"id":6257,"date":"2025-08-15T15:18:31","date_gmt":"2025-08-15T14:18:31","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/why-is-supply-chain-security-important\/"},"modified":"2025-12-15T16:15:58","modified_gmt":"2025-12-15T16:15:58","slug":"why-is-supply-chain-security-important","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/","title":{"rendered":"Why Is Supply Chain Security Important?"},"content":{"rendered":"<p>The SolarWinds cyberattack of late 2020 could mark the moment businesses finally confront the scale of challenge they face in securing their supply chains.<\/p>\r\n<p>SolarWinds reads like a hacker\u2019s fantasy: compromise a single obscure company and in doing so gain secret access to thousands of its highly-prized customers across the world. Better still, none of the victims would suspect a thing because, after all, SolarWinds was a trusted supplier nobody worried about. If security company FireEye <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener\">hadn\u2019t joined the dots<\/a> in December this extraordinary incident might have gone unnoticed for years rather than months.<\/p>\r\n<p>SolarWinds isn\u2019t the only recent example of this phenomenon. In April, a vulnerability in developer auditing tools produced by a company called Codecov allowed attackers to <a href=\"https:\/\/www.reuters.com\/technology\/codecov-hackers-breached-hundreds-restricted-customer-sites-sources-2021-04-19\/\" target=\"_blank\" rel=\"noopener\">target hundreds of its customers<\/a>. Likewise, the targeting of Accellion\u2019s File Transfer Appliance (FTA) product using multiple zero-day vulnerabilities which left several hundred customers still using it badly exposed. What made the latter particularly telling was that the FTA was a 20 year-old old product, a good example of how even legacy supply chains organisations think they\u2019ve moved on from can come back to bite them years later.<\/p>\r\n<p>None of this was exactly new. In 2011 the encryption IP behind RSA\u2019s highly-regarded SecureID hardware authentication tokens <a href=\"https:\/\/www.wired.com\/story\/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told\/\" target=\"_blank\" rel=\"noopener\">was compromised by hackers<\/a>, which led to the company having to replace 40 million expensive tokens at huge expense after attacks against customers were detected. Everyone thought RSA was an unlucky one-off and everyone, we now know, was wrong.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Is a Supply Chain?<\/h2>\r\n<p>Supply chains vary by industry sector but can include not only technology providers, but potentially any third-party with which an organisation has a trusted relationship.\u00a0 Every organisation, including SMEs, will have a list of these, usually outsourcing or commercial partners of one sort or another. The danger they pose is proportional to the amount of access they have to a company\u2019s systems, its data, and in some cases its premises.<\/p>\r\n<p>From a cybersecurity point of view, the problem is that no matter how well an organisation secures its own infrastructure, it can\u2019t be sure that its partners are doing as good a job. The security state of that partner is often taken on trust. Organisations can\u2019t just cut themselves off from outsiders in an era when technology, data sharing and outsourcing have become fundamental to doing business.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Zero Trust<\/h2>\r\n<p>Can such a problem with supply chains ever be solved? Around 15 years ago a group of inspired British CISOs from the Jericho Forum came up with an idea which eventually coalesced into what is now called \u2018zero trust security\u2019. You\u2019ll find <a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">various overlapping definitions<\/a> of what this means but it can be reduced to a simple principle: assume the worst and trust nobody. In the last decade, the rapid growth in cybercrime has turned it from a collection of discussion documents read by a small group of thinkers to the cybersecurity equivalent of the ten commandments.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Supply Chain Security Best Practices<\/h2>\r\n<p>Zero trust principles and best practices can be applied to SME supply chain security in different ways.<\/p>\r\n<ol>\r\n\t<li>Audit your supply chain, breaking down the list of suppliers into categories depending on the level or risk they pose and their access to your company\u2019s network and data. This will include tech organisations (software, cloud, managed service providers, payment processors), professional services (legal, building security, etc), and partners (component makers, data partners).<\/li>\r\n\t<li>Expand the compliance required from each partner, for example by asking for penetration test reports, notification of data breaches, GDPR violations. Cloud providers should be able to provide System and Organisation Controls (SOC) reports to meet SOC 1, 2, or 3. You have a patching regime but does your trusted supplier? If they don\u2019t and your data is in their hands it\u2019s as if your company is as vulnerable as they are.<\/li>\r\n\t<li>Lock down supplier privileges offered to suppliers and apply multi-factor authentication to any access they are given. Remember, stolen credentials are a major risk factor, including when they are stolen from third parties. Do the same for interfaces such as VPNs (which are not infallible by the way) and Remote Desktop Protocol (RDP), both of which are popular targets for ransomware attackers.<\/li>\r\n\t<li>Beware the back door of over-trusting the software chain of trust. As a recent <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwj91cbln_vwAhWiAmMBHaQwBQ0QFjAAegQIBhAD&amp;url=https%3A%2F%2Fwww.cisa.gov%2Fsites%2Fdefault%2Ffiles%2Fpublications%2Fdefending_against_software_supply_chain_attacks_508.pdf&amp;usg=AOvVaw3oQYERAa9xVWc8wKZOyADD\" target=\"_blank\" rel=\"noopener\">report on software supply chain security<\/a> from the US Cybersecurity and Infrastructure and Security agency (CISA) notes, this covers the hijacking of updates, undermining code signing, and compromises of open source libraries. SMEs might not realise that these dependencies exist or are part of the supply chain, but everyone is now exposed to some degree.<\/li>\r\n\t<li>Take seriously the need for regular penetration tests. These are an excellent way to get insight on the vulnerabilities that might be lurking in hidden supply chains or suppliers nobody has thought to assess for their security.<\/li>\r\n\t<li>Assume attackers are in your network and go looking for them. Remember, the dwell time before ransomware malware executes is a week or longer, which means that by the time the ransom note appears on a PC it\u2019s probably too late. The endpoint and other security products you use in conjunction with should be configured on this basis. If using a managed security service provider (MSSP), they need permission not only to detect an attack but to intervene if something is unfolding.<\/li>\r\n<\/ol>\r\n<h2>\u00a0<\/h2>\r\n<h2>Conclusion<\/h2>\r\n<p><a href=\"\/uk\/standards\/cyber-essentials\/insights\/top-8-cybersecurity-risks-for-your-business\/\">Cyber Security risks<\/a> are becoming among the most significant for today\u2019s businesses and it is clear that a robust approach to security will be required for most, if not all, organisations. Yet not all business risks are internal and, as this article shows, many risks result from supplier relationships.<\/p>\r\n<p>Having agreements in place with your suppliers to address these security risks is critical, as will be the need to ensure they are adhering to the terms of any agreement.<\/p>\r\n<p>If you would like to explore options for improving your business security contact us to speak with one of our advisers. We offer a range of services from <a href=\"\/uk\/standards\/cyber-essentials\/training\/\">e-learning for your staff<\/a> to <a href=\"\/uk\/standards\/cyber-essentials\/certification\/\">cyber essentials<\/a> and <a href=\"\/uk\/standards\/iso-27001\/certification\/\">ISO 27001 certification<\/a>. <a href=\"\/uk\/contact-us\/\">Complete this form<\/a> or call us on <strong>0800 404 7007<\/strong> \u2013 we\u2019re here to help!<\/p>","protected":false},"excerpt":{"rendered":"The 2020 SolarWinds cyberattack could mark the moment businesses confront the scale of challenge they face in securing their supply chains.","protected":false},"author":24,"featured_media":6258,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-6257","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Is Supply Chain Security Important?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Is Supply Chain Security Important?\" \/>\n<meta property=\"og:description\" content=\"The 2020 SolarWinds cyberattack could mark the moment businesses confront the scale of challenge they face in securing their supply chains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:15:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/castle-2688940_640.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"269\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Is Supply Chain Security Important?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/","og_locale":"en_GB","og_type":"article","og_title":"Why Is Supply Chain Security Important?","og_description":"The 2020 SolarWinds cyberattack could mark the moment businesses confront the scale of challenge they face in securing their supply chains.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:15:58+00:00","og_image":[{"width":640,"height":269,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/castle-2688940_640.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/","name":"Why Is Supply Chain Security Important?","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/castle-2688940_640.png","datePublished":"2025-08-15T14:18:31+00:00","dateModified":"2025-12-15T16:15:58+00:00","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/castle-2688940_640.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/castle-2688940_640.png","width":640,"height":269,"caption":"Why is supply chain security important?"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/why-is-supply-chain-security-important\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"Why Is Supply Chain Security Important?"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":4,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6257\/revisions"}],"predecessor-version":[{"id":6993,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6257\/revisions\/6993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/6258"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=6257"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=6257"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=6257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}