Identifying Supply Chain Cybersecurity Risks: Tips From Down Under

Fox Rothschild LLP
Contact

Fox Rothschild LLP

The Australian Cyber Security Center has published a guide on identifying cyber supply chain risks in suppliers, manufacturers, distributors and retailers.

A key area flagged is foreign control, influence and interference and suggests a questionnaire for the suppliers which includes the following questions:

  • What access might a foreign government gain in controlling or interfering with the business?
  • What access does the business’ products or services have within their customers’ environments?
  • Where does the business operate?
  • Where is the business headquartered?
  • Who has controlling shares in the business?
  • What are the nationalities of board members and key employees?
  • What ties do board members and key employees have to the government of countries they operate in?
  • Is there any evidence of corrupt or criminal activities by board members or key employees?

Other areas flagged include:

  •  Poor security practice
  •  Lack of transparency
  • Access and privileges

Read the full text of the Australian Cyber Security Center guide.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Fox Rothschild LLP | Attorney Advertising

Written by:

Fox Rothschild LLP
Contact
more
less

Fox Rothschild LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.