{"id":90266,"date":"2019-12-09T09:00:03","date_gmt":"2019-12-09T17:00:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90266"},"modified":"2023-09-26T09:28:51","modified_gmt":"2023-09-26T16:28:51","slug":"improve-cyber-supply-chain-risk-management-microsoft-azure","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/09\/improve-cyber-supply-chain-risk-management-microsoft-azure\/","title":{"rendered":"Improve cyber supply chain risk management with Microsoft Azure"},"content":{"rendered":"

For years, Microsoft has tracked threat actors exploiting federal cyber supply chain vulnerabilities. Supply chain attacks<\/a> target software developers, systems integrators, and technology companies. Tactics often include obtaining source code, build processes, or update mechanisms to compromise legitimate applications. This is a key concern for government cybersecurity in the cloud, as the expanding digital estate requires movement towards a Zero Trust security<\/a> model.<\/p>\n

\"Infographic<\/a><\/p>\n

There are several techniques to attack cyber supply chains in Information Communications and Technology (ICT) products and services. Supply chain attacks are most concerning because they target vulnerabilities in your infrastructure before you even deploy your assets and software.<\/p>\n

Attackers can:<\/p>\n