Pillar A: CybersecurityA13

Supply Chain Security

SBOM, vendor risk assessment, software supply chain attacks, dependency management.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Supply Chain Security.

What is Supply Chain Security?

Supply chain security addresses the risks introduced by an organization's dependencies on external vendors, software libraries, hardware components, and service providers. The SolarWinds attack in 2020 and the Log4Shell vulnerability in 2021 demonstrated that a single compromised dependency can cascade into thousands of affected organizations, making supply chain attacks one of the most devastating vectors in modern cybersecurity.

The Software Bill of Materials (SBOM) has emerged as a foundational control — a machine-readable inventory of all components in a software product, analogous to a nutrition label for code. Executive Order 14028 made SBOMs a requirement for software sold to the U.S. federal government, and the NTIA and CISA have published minimum SBOM elements. Beyond SBOMs, supply chain security encompasses vendor risk management programs, secure software development attestation (SSDF), open-source dependency scanning, and hardware supply chain integrity verification.

The threat landscape includes compromised build pipelines (like the Codecov and 3CX attacks), typosquatting in package registries, malicious contributions to open-source projects, and counterfeit hardware components. Frameworks like SLSA (Supply-chain Levels for Software Artifacts) provide a maturity model for supply chain integrity, while tools like Sigstore enable cryptographic signing and verification of software artifacts.

Why it matters

Modern software is built on thousands of dependencies, and any one of them can become a vector for compromise. Supply chain security is the discipline of ensuring that trust in external components is verified, not assumed.

Supply chain security connects software development, vendor management, and threat intelligence. It ensures that the components organizations depend on — from open-source libraries to cloud services — do not introduce unmanaged risk.

Standards and frameworks

Roles where this matters

Career paths where this domain shows up as core or recommended.

🏗Security EngineerRecommended

Design, build, and maintain security infrastructure. The architects of an organization's defensive posture.

📋GRC / Compliance AnalystRecommended

Manage risk, ensure regulatory compliance, and build governance frameworks. Where security meets business strategy.

Cloud Security EngineerRecommended

Secure cloud infrastructure across AWS, Azure, and GCP. Specialize in the shared responsibility model and cloud-native controls.

💻AppSec / DevSecOps EngineerCore

Embed security into the software development lifecycle. Shift left to catch vulnerabilities before they reach production.

🏛Security ArchitectRecommended

Senior design role — defines how pillar A components fit together across identity, crypto, network, cloud, and data — and, increasingly, how pillar C bolts into it.

🐛Vulnerability Management LeadCore

Owns the end-to-end find → prioritize → fix → verify loop at scale, now increasingly AI-driven.

🖥ML Platform Security EngineerRecommended

Secures the platform that trains, stores, and serves ML models — multi-tenant GPU isolation, pipeline integrity, feature-store hygiene, secrets management in ML workflows.

🌐Threat Exposure Management / Attack Surface AnalystCore

External-first role: inventories what an attacker can see, tracks what's new, and drives closure through the org. The outside-in counterpart to vuln management.

📦Product Security EngineerCore

Embedded in a product team — owns threat modelling, secure design, libraries, dependency risk, and increasingly the AI-specific hardening of LLM features the product ships.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

CSSLPProfessional·ISC2Official page →

Certified Secure Software Lifecycle Professional

Secure SDLC, threat modelling, secure architecture across product teams.

GCSAProfessional·GIAC / SANSOfficial page →

GIAC Cloud Security Automation

Security-as-code: IaC hardening, CI/CD guardrails, automated cloud response.

Also touched

CCSPProfessional·ISC2Official page →

Certified Cloud Security Professional

Cloud security architecture: shared responsibility, identity, data protection, crypto, and cloud-native detection.

CISAProfessional·ISACAOfficial page →

Certified Information Systems Auditor

IS audit, governance, control testing, and assurance.

CISMLeadership·ISACAOfficial page →

Certified Information Security Manager

Security program management, risk, governance, and incident governance. The manager / CISO-track signal.

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CISSP-ISSAPExpert·ISC2Official page →

CISSP Information Systems Security Architecture Professional

Architecture concentration on top of CISSP — trust boundaries, identity / crypto / network composition, defense-in-depth design.

CRISCProfessional·ISACAOfficial page →

Certified in Risk and Information Systems Control

Enterprise risk identification, assessment, and response + IT controls.

GWEBProfessional·GIAC / SANSOfficial page →

GIAC Certified Web Application Defender

Defender-side AppSec — OWASP Top 10, API security, secure design patterns.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

People shaping this field

Researchers and practitioners worth following in this space.

CEO of Chainguard, co-creator of Sigstore

Co-creator of Sigstore and SLSA, supply chain security advocate

CISA Senior Advisor, led SBOM initiatives

Curated resources

Authoritative sources we ground Supply Chain Security questions in — frameworks, research, guides, and tools.

More in Cybersecurity

Test what you know about Supply Chain Security

39 questions available. Beginner to expert questions, scored against the global leaderboard.