Carnegie Mellon University
Browse
file.pdf (1.1 MB)

Evaluating and Mitigating Software Supply Chain Security Risks

Download (1.1 MB)
report
posted on 2010-05-01, 00:00 authored by Robert J. Ellison, John Goodenough, Charles B. Weinstock, Carol C. Woody
The Department of Defense (DoD) is concerned that security vulnerabilities could be inserted into software that has been developed outside of the DoD's supervision or control. This report presents an initial analysis of how to evaluate and mitigate the risk that such unauthorized insertions have been made. The analysis is structured in terms of actions that should be taken in each phase of the DoD acquisition life cycle.

History

Date

2010-05-01

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC