Showing 1 - 10 of 31 results for the Supply Chain Assurance
In this section of the research report, the authors attempt to integrate development and acquisition practices with risk-based evaluations and mitigations.
This research focuses on methods for analyzing security-related design weaknesses that cannot be corrected easily during operations.
In this paper, the authors highlight the approach being implemented by SEI researchers and provides a summary of the status of this work.
This presentation describes the parts of the software supply chain, how vulnerabilities have been introduced, and the actions developers can employ to avoid or mitigate the risks inherent in an assembly-based software development strategy.
In this section of the research report, the authors summarize the research that focuses on addressing security in early phases of acquisition and software development.
In this report, the authors consider current practices in software supply chain analysis and suggest some foundational practices.
In this report, the authors provide guidance for helping DoD acquisition programs address software security in acquisitions.
In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.
In this report, the authors describe how to improve the resilience of U.S. Postal Service products and services
In this December 2009 presentation, John Bergey and Tim Morrow explore how required secure coding standards can be specified and integrated in a system acquisition.