Supply Chain as Kill Chain: Security in the Era of Zero Trust
Image Description
Common Information
Type Value
UUID ff7b59da-d114-4ec6-b4bc-f5cde51f9892
Fingerprint cff82aa45efc1c735b021392d320aa5398fc31d0e2aa20e4fcf1a54a9e766120
Analysis status DONE
Considered CTI value 1
Text language
Published Oct. 28, 2022, 12:59 p.m.
Added to db April 14, 2024, 11:24 a.m.
Last updated Aug. 30, 2024, 10:57 p.m.
Headline Supply Chain as Kill Chain: Security in the Era of Zero Trust
Title Supply Chain as Kill Chain: Security in the Era of Zero Trust
Detected Hints/Tags/Attributes 167/4/50
Attributes
Details Type #Events CTI Value
Details Url 1
https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/24/quad-joint-leaders-statement/.
Details Url 1
https://www.europarl.europa.eu/doceo/document/a-9-2021-0313_en.html
Details Url 1
https://www.lexology.com/library/detail.aspx?g=2ea3fe56
Details Url 1
https://fidoalliance.org/overview/.
Details Url 1
https://nvd.nist.gov/products/swid#:
Details Url 1
https://nvlpubs.nist.gov/nistpubs/legacy
Details Url 1
https://csrc.nist.gov/glossary/term/predisposing_condition.
Details Url 1
https://csrc.nist.gov/glossary/term/likelihood_of_
Details Url 1
https://csrc.nist.gov/glossary/term/impact#:
Details Url 1
https://www.redhat.com/en/topics/linux/what-is-a-golden-
Details Url 1
https://hackernoon.com
Details Domain 245
shutterstock.com
Details Domain 1
www.c4isrnet.com
Details Domain 45
www.whitehouse.gov
Details Domain 1
magazines.isc2.org
Details Domain 2
www.pymnts.com
Details Domain 28
eur-lex.europa.eu
Details Domain 360
attack.mitre.org
Details Domain 1
threatmodel.venafi.com
Details Domain 604
www.trendmicro.com
Details Domain 71
success.trendmicro.com
Details Domain 132
trendmicro.com
Details Domain 2
about.att.com
Details Domain 16
www.europarl.europa.eu
Details Domain 4
www.lexology.com
Details Domain 4
fidoalliance.org
Details Domain 62
nvlpubs.nist.gov
Details Domain 82
csrc.nist.gov
Details Domain 37
www.redhat.com
Details Domain 10
hackernoon.com
Details File 1
www.c4
Details File 27
www.py
Details File 1
ukraine-cyberattack-2022.html
Details File 2
apache-log4j-vulnerability.html
Details File 2
m-22-09.pdf
Details File 1
security-benefits-software-bill-of-materials.html
Details File 1
a-9-2021-0313_en.html
Details File 5
detail.aspx
Details File 1
nistspecialpublication800-30r1.pdf
Details MITRE ATT&CK Techniques 52
T1195
Details Url 1
https://www.c4isrnet.com/it-networks/2022/01/19/biden-signs-memorandum-to-secure-
Details Url 1
https://magazines.isc2.org/pages/2021/.
Details Url 1
https://www.pymnts.com/news/security-and-risk/2021/bidens-executive-order-brings-zero-trust-policy-
Details Url 2
https://attack.mitre.org/techniques/t1195/.
Details Url 1
https://threatmodel.venafi.com/techniques/vt0004/002.
Details Url 1
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/3132/ransomware-raises-the-stakes-with-
Details Url 1
https://www.trendmicro.com/en_us/research/22/b/ukraine-cyberattack-2022.html
Details Url 1
https://success.trendmicro.com/dcx/s
Details Url 1
https://www.whitehouse.gov/wp-
Details Url 1
https://about.att.com/innovationblog/2022/security-benefits-software-bill-of-materials.html