Navigating the Complex Terrain of Supply Chain Security in ICS Environments

  /  Video   /  Navigating the Complex Terrain of Supply Chain Security in ICS Environments
ics cybersecurity

Navigating the Complex Terrain of Supply Chain Security in ICS Environments

In the contemporary digital landscape, the security of supply chains has ascended to the forefront of concerns for industrial control systems (ICS). Cassie Crossley, Vice President for Supply Chain Security at Schneider Electric, sheds light on the comprehensive strategies and initiatives deployed to safeguard the supply chain against cyber threats. With an intricate web of software and hardware components forming the backbone of ICS environments, ensuring their security is not just a necessity but a relentless pursuit of resilience and reliability.

A Multifaceted Approach to Security

Schneider Electric’s response to the rising tide of supply chain threats is robust and holistic, encompassing over 13 targeted initiatives. These initiatives span the entire product lifecycle, from research and design to development and manufacturing, ensuring that security is not an afterthought but a foundational principle. Among these, product security, technology validation, and the provision of Software Bills of Materials (SBOMs) are critical pillars of their strategy. These elements collectively aim to enhance transparency and enable customers to understand their ICS components comprehensively.

Adhering to Rigorous Standards

Central to Schneider Electric’s cybersecurity framework is the adherence to the ISA/IEC 62443 standards, particularly the 4-1 segment, which focuses on the secure development lifecycle. This standard is instrumental in guiding the development process, ensuring that over 12,000 engineers globally engage in practices that mitigate risks from the outset. Such rigorous compliance elevates the security posture of Schneider Electric’s offerings and instills a culture of cybersecurity awareness and responsibility across the organization.

Collaboration and Oversight Across the Supply Chain

Recognizing the interconnected nature of supply chain security, Schneider Electric extends its cybersecurity protocols to encompass software and hardware suppliers. This involves a diligent process of ensuring suppliers adhere to secure design and development standards. In instances where suppliers may lack maturity in these areas, Schneider Electric implements compensating controls and mitigations, such as penetration testing, to uphold their stringent quality standards. This collaborative approach underscores the importance of a unified front in the battle against cyber threats, spanning across the entirety of the supply chain.

The Challenge of Software Bills of Materials (SBOMs)

The discussion around SBOMs highlights a critical area of concern and focus for supply chain security. As a proponent of SBOM transparency and visibility, Crossley recognizes the inherent challenges in achieving accuracy and reliability in the data provided by SBOMs. The journey towards dependable SBOMs is fraught with obstacles, primarily due to limitations in the tools available for evaluating software and firmware components. This quest for quality and precision in SBOMs is emblematic of the broader challenge in supply chain security—balancing transparency with the technical and regulatory complexities of the digital age.

As the cybersecurity landscape continues to evolve, Schneider Electric remains steadfast in its mission to safeguard the integrity and resilience of global supply chains. With unwavering dedication and expertise, it navigates the complexities of supply chain security.

This interview was recorded by Lucian Fogoros, Co-founder of IIoT World at the S4x24 event. The summary was created based on the video transcript with the assistance of The IIoT World Team reviewed it