<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Supply-chain attacks - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/supply-chain-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/supply-chain-attacks/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 07 May 2024 07:03:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Supply-chain attacks - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/supply-chain-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 08:25:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Supply-chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23048</guid>

					<description><![CDATA[<p>In late October 2023, a third-party data breach incident sent shockwaves through the business world, affecting over 57,000 entities engaged in business with Bank of America. This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In late October 2023, a <span style="color: #53548a;"><strong>third-party data breach incident</strong> </span>sent shockwaves through the business world, affecting over <span style="color: #53548a;"><strong>57,000 entities</strong></span> engaged in business with <span style="color: #53548a;"><strong>Bank of America</strong>.</span> This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party suppliers play in an organization’s cybersecurity infrastructure.</p>
<p style="text-align: justify;">These incidents, commonly referred to as “<span style="color: #53548a;"><strong>supply-chain attacks</strong></span>”, involve targeting an organization’s downstream <span style="color: #53548a;"><strong>third parties</strong></span> (e.g., partners, vendors) to gain access to valuable systems. In the Bank of America case, the compromised third party responsible for this breach, was Infosys McCamish Systems (IMS), an insurance process management services provider.</p>
<p style="text-align: justify;">This breach resonates with the infamous <span style="color: #53548a;"><strong>SolarWinds</strong> </span>cyberattack, where Nobelium hackers inserted malicious code into the SolarWinds Orion platform, enabling them to infiltrate numerous government systems, including the U.S.’ Homeland Security, State, Commerce, and Treasury, as well as private systems worldwide.</p>
<p style="text-align: justify;">As corporate IT architectures are arguably a mere reflection of a company’s intricate web of business relationships, these events serve as a stark reminder that <span style="color: #53548a;"><strong>organizations are not isolated entities</strong> </span>but rather <span style="color: #53548a;"><strong>hubs of interconnected and co-dependent partners</strong> </span>and third parties. Achieving a robust cybersecurity posture requires more than individual efforts; it demands cultivating a <span style="color: #53548a;"><strong>secure ecosystem</strong></span> of thoroughly vetted trusted partners to effectively safeguard the entire supply chain required for product delivery (TPRM).</p>
<p style="text-align: justify;">However, building such an ecosystem poses challenges. Many companies lack the resources to exclusively select leading, cutting-edge, and trusted third parties or may lack the leverage to demand transparency from existing partners.</p>
<p style="text-align: justify;">Drawing lessons from the SolarWinds cyberattack, and amid heightened geopolitical tensions (see <a href="https://www.wsj.com/politics/national-security/fbi-director-says-china-cyberattacks-on-u-s-infrastructure-now-at-unprecedented-scale-c8de5983">Chinese cyberattacks on U.S. infrastructure at an unprecedented scale</a>), the Department of Defense recognized this challenge and responded with the development of a solution for securing the supply-chain ecosystem of the Defense Industrial Base (DIB) called the <span style="color: #53548a;"><strong>CMMC</strong></span>.</p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <span style="color: #53548a;"><strong>comprehensive framework </strong></span>designed to <span style="color: #53548a;"><strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)</strong></span>, that is <strong><span style="color: #53548a;">shared with contractors and subcontractors of the Department of Defense (DoD) </span></strong>through acquisition programs.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule Release, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model, poised to supplant the preceding CMMC 1.0 with a <span style="color: #53548a;"><strong>more pragmatic approach</strong></span>. Following its release, the proposed policy underwent a <span style="color: #53548a;"><strong>60-day open-comment period</strong></span>, which <span style="color: #53548a;"><strong>concluded on February 26, 2024</strong>.</span> The new regulation is anticipated <span style="color: #666699;"><strong>to <span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">be finalized by late 2024 or early 2025</span>.</strong></span></p>
<p style="text-align: justify;">The CMMC 2.0 is aimed at <span style="color: #53548a;"><strong>safeguarding sensitive national security information</strong></span> by protecting the Defense Industrial Base&#8217;s (DIB) sensitive unclassified information from frequent and increasingly complex cyberattacks. It streamlines requirements to <span style="color: #53548a;"><strong>three levels </strong></span>of compliance and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards. The specific security requirements and assessment types (self-assessment, third-party assessment, or DoD assessment) vary based on the level.</p>
<ul style="text-align: justify;">
<li><span style="color: #53548a;"><strong>Foundational</strong> </span>(Level 1): Targets organizations handling FCI (e.g., contract performance reports, organizational charts). Compliance mandates strict adherence to the 15 security requirements outlined in FAR clause 52.204-21, through an annual self-assessment.</li>
<li><span style="color: #53548a;"><strong>Advanced</strong> </span>(Level 2): Targets organizations handling CUI, including Controlled Technical Information, DoD Critical Infrastructure Security Information, Naval Nuclear Propulsion Information, and Personally Identifiable Information (PIIs). Compliance requires adherence to 110 security requirements based on NIST SP 800-171 Rev. 2. Assessments are conducted by third-party organizations known as CMMC Third Party Assessment Organizations (C3PAO) tri-annually or through an annual self-assessment, depending on the sensitivity of the underlying CUIs.</li>
<li><span style="color: #53548a;"><strong>Expert</strong> </span>(Level 3): Targets organizations handling CUI for DoD programs with the highest priority. Compliance entails adhering to the 110 security requirements based on NIST SP 800-171 Rev 2 and an <span style="color: #53548a;"><strong>additional 24 security requirements</strong></span> based on NIST SP 800-172. These organizations undergo tri-annual assessments conducted by the DoD’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).</li>
</ul>
<p style="text-align: justify;">Organizations must obtain a CMMC Level 2 Final Certification before scheduling a DIBCAC assessment for CMMC Level 3.</p>
<p style="text-align: justify;">The results of all assessments conducted on DIB organizations are consolidated within the <strong><span style="color: #53548a;">Supplier Performance Risk System (SPRS)</span></strong>. The SPRS (pronounced “Spurs”) is Department of Defense’s web platform that collects, processes, and retrieves data on supplier performance within the Defense Industrial Base, enabling the DoD to map the DIB&#8217;s business network cyber maturity, assess supplier performance, and evaluate risks related to contractual obligations.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-23041" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png" alt="" width="3557" height="1719" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png 3557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-1536x742.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-2048x990.png 2048w" sizes="(max-width: 3557px) 100vw, 3557px" /></p>
<p style="text-align: justify;">By deploying this mandatory certification model, the DoD is at the forefront of establishing a comprehensive, secure, end-to-end supply chain framework within the DIB, hopefully enhancing long-term U.S. national security. Simultaneously, the DoD underscores that security is no longer optional; it is an integral aspect of business operations.</p>
<p><span style="color: #666699;"><strong>CMMC 2.0 assessments are expected to become available around Q4 2024</strong> </span>(once 32 CFR is finalized). <span style="color: #666699;"><strong>Prime contractors will expect sub-contractors to achieve CMMC compliance before Q3 2025</strong></span>, when CMMC 2.0 takes effect. Starting October 1, 2025, CMMC certification will be mandatory at the time of contract award.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">If you require assistance navigating the intricate landscape of CMMC 2.0 compliance or need support on your path to certification, <span style="color: #53548a;"><strong>#Wavestone is ready to empower your journey</strong>.</span> Reach out today and elevate your cybersecurity readiness into a strategic advantage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
