[1]The fix for IT supply chain attacks:

    As [2]I've written previously, I'm very skeptical of [3]Bloomberg's
    report about the Chinese placing hardware spy chips on server
    motherboards used by U.S. companies. China is actively spying on
    U.S. businesses all the time, I believe, and has already stolen most
    of the intellectual property secrets they are interested in. The
    Chinese are on their way to becoming the world's leading economic
    power, and manufacturing computer chips is a big part of that
    equation. I don't think they would jeopardize that business so
    blatantly.

    If any good is to come out of the Bloomberg article, it is bringing
    the problem of the supply chain to the forefront. If nearly every
    computer device and chip is made by potential adversaries, how can
    you ever be assured that what you are buying doesn't have
    intentional bugs or even spying chips?

    The supply chain is the aggregation of all entities that provide the
    products and services needed for other entities to provide their
    products and services to their customers. Theoretically, any entity
    can knowingly or unknowingly introduce insecurity that impacts the
    final product. This is the exact issue that the Bloomberg authors
    and their anonymous sources allude to: that a spy chip can be placed
    on motherboards that eventually get placed into servers used by
    foreign companies.

IT supply chain risk has always existed

    This is not a new issue. …

Keeping the supply chain status quo is not an option

    So, one solution is no solution: Keep things as-is. As far as we
    know, incidents of nations using supply-chain malicious inducements
    are rare. If a nation-state compromised the supply chain too
    routinely, none of the other nations would buy its chips. It would
    be a self-solving solution. We've made it so far, so good, using
    this "strategy."

When do you use a detect-and-regulate supply chain strategy?

    … Well, for one, the military already has programs to prevent supply
    chain issues for its most critical infrastructure. Many levels of
    the U.S. government have programs that look for malicious supply
    chain issues. That's precisely why I don't believe that we have a
    widespread issue of Chinese spying chips all over the U.S.

    The question is at what level of the supply chain do we start
    requiring stricter oversight and monitoring? …

    The opposite school of thought to the "keep the status quo" argument
    is that we need to check all computer devices for spying hardware,
    software and firmware. This can be done by government or industry
    groups (like the Underwriter's Laboratories [UL] or Consumer
    Reports). The problem is that all governments want to spy on people
    - its own people, and those in other countries. Asking the
    government to make sure everything is secure and not spying is
    asking for the fox to guard the henhouse. At the same time, I'm not
    sure we can do what needs to be done without governmental
    involvement.

The supply chain security solution needs to be global

    … Every nation needs a nationally created and funded regulatory
    group that can look for supply chain issues but isn't directly
    governed by the government. It's not perfect. It's like asking the
    foxes to pay for the shepherds who protect the henhouse, but I don't
    see any other realistic way for a supply chain security solution to
    actually work. Or we can keep the status quo and hope for the best.

  (Via [4]CSO Online)

  I agree with the article in large part. I disagree that government
  action and international agreements are the way to address supply chain
  risks. It is vulnerable in a multitude of ways independent of hardware
  hacking like the Bloomberg report claims. Compromising hardware not
  only requires physical access but its own reliance on a supply chain.

  I tend toward industry and market forces addressing all aspects of
  supply chain insecurity. Redundancy, resiliency, supplier diversity,
  quality assurance, and monitoring are best done by those with the most
  at risk. Governments are too mercurial, international agreements and
  treaties often are not worth the paper they are printed on, and special
  interests can introduce new risks into the equation through self
  interest and a lack of vision.
  Also on:

  [5]Twitter
    __________________________________________________________________

  My original entry is here: [6]The fix for IT supply chain attacks. It
  posted Wed, 17 Oct 2018 13:18:36 +0000.
  Filed under: business,

References

  1. https://www.csoonline.com/article/3313665/techology-business/the-fix-for-it-supply-chain-attacks.html#tk.rss_all
  2. https://www.csoonline.com/article/3311836/security/why-i-don-t-believe-bloomberg-s-chinese-spy-chip-report.html
  3. https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
  4. http://www.csoonline.com/index.rss
  5. https://twitter.com/prjorgensen/status/1052550504243494920
  6. https://www.prjorgensen.com/?p=2204