Showing 1 - 10 of 30 results for the Supply Chain Assurance
This research focuses on methods for analyzing security-related design weaknesses that cannot be corrected easily during operations.
In this section of the research report, the authors attempt to integrate development and acquisition practices with risk-based evaluations and mitigations.
In this paper, the authors highlight the approach being implemented by SEI researchers and provides a summary of the status of this work.
In this section of the research report, the authors summarize the research that focuses on addressing security in early phases of acquisition and software development.
In this report, the authors consider current practices in software supply chain analysis and suggest some foundational practices.
In this report, the authors provide guidance for helping DoD acquisition programs address software security in acquisitions.
In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.
In this report, the authors describe how to improve the resilience of U.S. Postal Service products and services
In this December 2009 presentation, John Bergey and Tim Morrow explore how required secure coding standards can be specified and integrated in a system acquisition.
This plan is a government-provided customizable document that is part of the acquisition's government reference library.