News

Why Supply Chain Security Is The First Line of Defense

  • Tom Hollingsworth--securityboulevard.com
  • published date: 2025-06-30 00:00:00 UTC

None

<p><span style="font-weight: 400;">In the modern enterprise IT world, lines between physical and digital are blurry at best. Remote work, BYOD, and even highly-connected offices have redefined what “edge” really means. This also means that the attack surface for your users and their devices have expanded as well. If you ask a modern security team where they should focus their efforts you will probably hear answers like endpoint detection and software patches. Almost no one would start at the very beginning.</span></p><h3><b>Don’t Break Your Chains</b></h3><p><span style="font-weight: 400;">A holistic security approach has to take the device supply chain into account. A device has to be secured before it ever leaves the factory. The rising number of salacious stories about servers being compromised at some point in the supply chain has caused worry in the community. Reassurance that your endpoints are safe and sound along the way can define the relationship that an organization has with a supplier.</span></p><p><span style="font-weight: 400;">During Security Field Day in May, we had a chance to hear from </span><a href="https://techfieldday.com/appearance/dell-technologies-presents-at-security-field-day-13/"><span style="font-weight: 400;">Dell Technologies</span></a><span style="font-weight: 400;"> about how they are working to provide the kinds of security solutions that enterprise users need from a large company like Dell. Not surprisingly one of their big pillars was supply chain security:</span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwyXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> <div class="ai-rotate-option" style="visibility: hidden; position: absolute; top: 0; left: 0; width: 100%; height: 100%;" data-index="1" data-name="QVdTIEh1Yg==" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://devops.com/builder-community-hub/?ref=in-article-ad-1&amp;utm_source=do&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-1" target="_blank"><img src="https://devops.com/wp-content/uploads/2024/10/Gradient-1.png" alt="AWS Hub"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><iframe title="Dell Technologies Endpoint Security" src="https://player.vimeo.com/video/1089143162?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" width="800" height="450" frameborder="0"></iframe></p><p><span style="font-weight: 400;">Here are some highlights that Dell focused on that I think really speak to the bigger picture when it comes to the importance of the supply chain in the security process.</span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="0915b993555068446787e567-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="0915b993555068446787e567-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security must be integrated at inception. It must be a part of the design from beginning to end. If you try to bolt on security after the fact you leave gaping holes for threat actors to exploit. In the above example, Dell instills security in their designs from the initial chip designs all the way through to device assembly and delivery. This also means that the designs can’t be mined for potential weaknesses.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A chain is as strong as the weakest link. Likewise, the supply chain is only as secure as the weakest link. You might be able to assure yourself that your organization is secure. However, what about your partners? Can you be sure they are following the same procedures? Could you imagine what would happen if a nation-state-backed organization was able to compromise the supplier of a baseband management controller (BMC) of a server without the manufacturer knowing? You’d have a very nasty entry point that no one is totally sure of. In Dell’s case, partners are held to a high standard and frequently audited to ensure compliance. This creates a culture of security and accountability.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Verification goes deeper than just partners. How can you be sure that every part you’ve installed is the right part? Being able to insert parts into the chain could create havoc down the road. You need to have a verifiable way to ensuring the parts you selected for the device are the parts that are in the device. If that sounds daunting you’re on the right track. For a company like Dell the criticality of the identification process is easier to pull off. After all, if you already have a list of parts it’s easy to build a digital fingerprint for those components. Even better, that list can be provided to the customer at any time for verification purposes. It’s an auditors dream!</span></li> </ul><h3><b>Bringing It All Together</b></h3><p><span style="font-weight: 400;">There’s a lot more great ideas in the Dell video above. Dell has really thought about the whole process from inception to delivery. For a company that touches as many systems as Dell over the course of an endpoint’s lifetime this is crucial to build trust. Dell knows that this is a non-negotiable component of being a trusted supplier of equipment to a modern enterprise. Security analysts might focus on patching and software. They are the first people to warn about not scanning random QR codes or inserting USB drives into secured machines. However, thinking as deep as the supply chain is something that often escapes even the most attentive teams. Thanks to companies like Dell, supply chain security is at the top of mind along the way.</span></p><div class="spu-placeholder" style="display:none"></div>