文字のサイズ
- 小
- 中
- 大
Why vulnerability controls, including supply chain, should be automated and in-house
What are the supply chain security strategies learned from the logistics and manufacturing industries?
Vulnerability Mitigation Strategies, Including Supply Chain Security, Should be Automated and In-House
Reasons why logistics and sporting goods manufacturers should automate and internalize vulnerability countermeasures, including the supply chain, which is often a challenge.
The Ministry of Economy, Trade and Industry (METI) report, “Basic Concept for Strengthening Supply Chain Countermeasure System (Draft),” recommends that companies should ensure the resilience of their entire supply chain and raise the level of overall security by making the status of countermeasures visible, as digital collaboration among companies continues and supply chains expand.
In reality, however, cyber-attacks are becoming more sophisticated and sophisticated, and the required security measures are also increasing.
Vulnerability assessment is one of the most important security measures.
In reality, however, many organizations do not effectively implement such measures due to a lack of expertise, skills, and human resources.
To conduct effective vulnerability assessments on an ongoing basis and to apply the results to countermeasures, highly skilled personnel are required.
Moreover, the need to conduct continuous vulnerability assessments in order to improve coverage and accuracy can increase costs without limit.
The ideal solution to these problems is to implement a tool that enables appropriate vulnerability assessments to be performed without specialized knowledge, including those in charge of business departments, and that automates much of the process.
He reiterated the need to strengthen security with a view to the entire supply chain.
In addition to explaining the reasons why vulnerability assessments, which are particularly important, are not being conducted effectively, the report introduces examples of a general logistics company and a sporting goods manufacturer that, faced with the challenge of vulnerability assessments in their web systems and websites, introduced tools to automate and autonomously perform the assessments.
The report summarizes the necessity of automating and internalizing vulnerability diagnosis, efforts to put it into practice, and recommended tools, so companies seeking to improve the security of their entire organization are encouraged to request the report.