Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services.
Addressing the most pressing cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE) has collaborated with technology vendors to demonstrate how organizations can verify the genuineness of their acquired computing devices’ internal components.
How organizations can decrease the risk of a compromise in their supply chain, which may reduce risks to customers and end users, will be presented in this webinar. A summarized overview of NCCoE and developed reference architecture will be provided, including the following three solution scenarios from NCCoE’s Supply Chain Assurance Project:
- How to create verifiable descriptions of components and platforms
- How to verify the integrity and provenance of computing devices and components within the single transaction between an original equipment manufacturer and a customer
- How to continuously monitor the integrity of computing devices and components at subsequent stages in the system’s life cycle in the operational environment
Architecture builds will also be discussed, along with demonstrations of how component manufacturers can create artifacts bound to their integrated systems and how customers can utilize these artifacts to test and verify their components and systems.