Supply Chain as Kill Chain: Security in the Era of Zero Trust
Common Information
Type | Value |
---|---|
UUID | ff7b59da-d114-4ec6-b4bc-f5cde51f9892 |
Fingerprint | cff82aa45efc1c735b021392d320aa5398fc31d0e2aa20e4fcf1a54a9e766120 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Oct. 28, 2022, 12:59 p.m. |
Added to db | April 14, 2024, 11:24 a.m. |
Last updated | Aug. 30, 2024, 10:57 p.m. |
Headline | Supply Chain as Kill Chain: Security in the Era of Zero Trust |
Title | Supply Chain as Kill Chain: Security in the Era of Zero Trust |
Detected Hints/Tags/Attributes | 167/4/50 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Url | 1 | https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/24/quad-joint-leaders-statement/. |
|
Details | Url | 1 | https://www.europarl.europa.eu/doceo/document/a-9-2021-0313_en.html |
|
Details | Url | 1 | https://www.lexology.com/library/detail.aspx?g=2ea3fe56 |
|
Details | Url | 1 | https://fidoalliance.org/overview/. |
|
Details | Url | 1 | https://nvd.nist.gov/products/swid#: |
|
Details | Url | 1 | https://nvlpubs.nist.gov/nistpubs/legacy |
|
Details | Url | 1 | https://csrc.nist.gov/glossary/term/predisposing_condition. |
|
Details | Url | 1 | https://csrc.nist.gov/glossary/term/likelihood_of_ |
|
Details | Url | 1 | https://csrc.nist.gov/glossary/term/impact#: |
|
Details | Url | 1 | https://www.redhat.com/en/topics/linux/what-is-a-golden- |
|
Details | Url | 1 | https://hackernoon.com |
|
Details | Domain | 245 | shutterstock.com |
|
Details | Domain | 1 | www.c4isrnet.com |
|
Details | Domain | 45 | www.whitehouse.gov |
|
Details | Domain | 1 | magazines.isc2.org |
|
Details | Domain | 2 | www.pymnts.com |
|
Details | Domain | 28 | eur-lex.europa.eu |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 1 | threatmodel.venafi.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 71 | success.trendmicro.com |
|
Details | Domain | 132 | trendmicro.com |
|
Details | Domain | 2 | about.att.com |
|
Details | Domain | 16 | www.europarl.europa.eu |
|
Details | Domain | 4 | www.lexology.com |
|
Details | Domain | 4 | fidoalliance.org |
|
Details | Domain | 62 | nvlpubs.nist.gov |
|
Details | Domain | 82 | csrc.nist.gov |
|
Details | Domain | 37 | www.redhat.com |
|
Details | Domain | 10 | hackernoon.com |
|
Details | File | 1 | www.c4 |
|
Details | File | 27 | www.py |
|
Details | File | 1 | ukraine-cyberattack-2022.html |
|
Details | File | 2 | apache-log4j-vulnerability.html |
|
Details | File | 2 | m-22-09.pdf |
|
Details | File | 1 | security-benefits-software-bill-of-materials.html |
|
Details | File | 1 | a-9-2021-0313_en.html |
|
Details | File | 5 | detail.aspx |
|
Details | File | 1 | nistspecialpublication800-30r1.pdf |
|
Details | MITRE ATT&CK Techniques | 52 | T1195 |
|
Details | Url | 1 | https://www.c4isrnet.com/it-networks/2022/01/19/biden-signs-memorandum-to-secure- |
|
Details | Url | 1 | https://magazines.isc2.org/pages/2021/. |
|
Details | Url | 1 | https://www.pymnts.com/news/security-and-risk/2021/bidens-executive-order-brings-zero-trust-policy- |
|
Details | Url | 2 | https://attack.mitre.org/techniques/t1195/. |
|
Details | Url | 1 | https://threatmodel.venafi.com/techniques/vt0004/002. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/3132/ransomware-raises-the-stakes-with- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/b/ukraine-cyberattack-2022.html |
|
Details | Url | 1 | https://success.trendmicro.com/dcx/s |
|
Details | Url | 1 | https://www.whitehouse.gov/wp- |
|
Details | Url | 1 | https://about.att.com/innovationblog/2022/security-benefits-software-bill-of-materials.html |