Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

Choosing Secure and Verifiable Technologies

December 16, 2024 10:05 AM | Anonymous

Reposted from CISA/DHS

Today, the Cybersecurity and Infrastructure Security Agency (CISA), Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC) and other U.S. and international partners published, Choosing Secure and Verifiable Technologies. This guide assists senior leaders in understanding the threat environment and highlights the areas in pre-and post-purchase procurement of digital products and services that should be considered. To help organizations understand the risks with technology procurement, this guide outlines several possible attack vectors or actions used by threat actors to compromise networks.  Along with these risks, recommended mitigation strategies are provided for organization to implement to protect their networks. With an understating of the risks and mitigation strategies, organizations will find themselves empowered to demand evidence from manufacturers that their software development process aligns to Secure by Demand principles. The guide provides several key indicators, consequences, and questions to ask manufacturers that help organizations assess whither the product is secure and verifiable or outside their risk tolerance. Procuring organizations must establish, document, and understand the predetermined security requirements they need in a product or service. Organizations are encouraged to review and implement the recommended actions into their procurement process. An executive summary is also provided.

 See Original Post


  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved