HOME

TheInfoList



OR:

__NOTOC__ Supply chain security (also "supply-chain security") activities aim to enhance the
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
of the
supply chain In commerce, a supply chain is a network of facilities that procure raw materials, transform them into intermediate goods and then final products to customers through a distribution system. It refers to the network of organizations, people, activ ...
or
value chain A value chain is a progression of activities that a firm operating in a specific industry performs in order to deliver a valuable product (i.e., good and/or service) to the end customer. The concept comes through business management and was f ...
, the transport and
logistics Logistics is generally the detailed organization and implementation of a complex operation. In a general business sense, logistics manages the flow of goods between the point of origin and the point of consumption to meet the requirements of ...
systems for the world's
cargo Cargo consists of bulk goods conveyed by water, air, or land. In economics, freight is cargo that is transported at a freight rate for commercial gain. ''Cargo'' was originally a shipload but now covers all types of freight, including tra ...
and to "facilitate legitimate trade".Government of Canada
Agreement between Canada and the European Union on Customs Cooperation with Respect to Matters Related to Supply-Chain Security
signed 4 March 2013, accessed 18 August 2021
Their objective is to combine traditional practices of
supply-chain management In commerce, supply chain management (SCM) is the management of the flow of goods and services including all processes that transform raw materials into final products between businesses and locations. This can include the movement and stor ...
with the security requirements driven by threats such as
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
,
piracy Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and other valuable goods. Those who conduct acts of piracy are called pirates, v ...
, and theft. Typical supply-chain security activities include: * Credentialing of participants in the supply chain * Screening and validating of the contents of cargo being shipped * Advance notification of the contents to the destination country * Ensuring the security of cargo while in transit, for example through the use of locks and tamper-proof seals * Inspecting cargo on entry


Overview

According to the
Office of the Director of National Intelligence The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Comm ...
in the United States, "adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and information used every day by the government, businesses, and individuals." Local police departments often lack the resources to properly address supply chain security.


History

The terrorist attacks of 9/11 were the defining event for modern supply chain security. Before 9/11 supply chain security was primarily the concern of the
insurance Insurance is a means of protection from financial loss in which, in exchange for a fee, a party agrees to compensate another party in the event of a certain loss, damage, or injury. It is a form of risk management, primarily used to hedge ...
and risk management industries; after the attacks more structured approaches were implemented. Early efforts were dominated by concerns over the use of maritime shipping to deliver weapons of mass destruction. From 2001 to 2006 efforts focused on the physical security of goods and shipments but from 2012 on focus shifted to cybersecurity as the awareness of cyber threats grew. In February 2021 US President Joe Biden made supply chain security one of his administration's priorities.


Key initiatives

There are a number of supply-chain security initiatives around the world, including: * The
Customs Trade Partnership against Terrorism The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrori ...
(C-TPAT), a voluntary compliance program for companies to improve the security of their corporate supply chains. *Operation Safe Commerce (OSC), a U.S. federal program designed to test and evaluate practices, policies and procedures aimed at improving the security of international containerized shipping. * The
World Customs Organization The World Customs Organization (WCO) is an intergovernmental organization headquartered in Brussels, Belgium. The WCO works on customs-related matters including the development of international conventions, instruments, and tools on topics su ...
(WCO) adopted the Framework of Standards to Secure and Facilitate Global Trade in 2005, which consists of supply-chain security standards for Customs administrations including
authorized economic operator According to the World Customs Organization (WCO), an authorized economic operator (AEO) is The growth of global trade and increasing security threats to the international movement of goods have forced customs administrations to shift their ...
(AEO) programs. * The
Container Security Initiative The Container Security Initiative (CSI) a.k.a. the 24-Hour Rule was launched in 2002 by the U.S. Bureau of Customs and Border Protection (CBP), an agency of the Department of Homeland Security. Its purpose was to increase security for container ...
(CSI), a program led by U.S. Customs and Border Protection in the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
(DHS) focused on screening containers at foreign ports. * The Global Container Control Programme (CCP), a joint United Nations Office on Drugs and Crime (UNODC)/World Customs Organization (WCO) initiative working to establish effective container controls at select ports across the globe with the aim to prevent trafficking of drugs, chemicals and other contraband and to facilitate trade by strengthening cooperation between the customs, trade and enforcement communities. * The
Global Trade Exchange The Global Trade Exchange (GTX) is, or was, a controversial Homeland Security intelligence project, related to maritime-ports data-mining, being one of three pillars of the Safe Ports Act-related Secure Freight Initiatives. The Global Trade Excha ...
, a DHS data-mining program designed to collect financial information about shipments, with the objective of determining the safety of cargo shipments. * Pilot initiatives by companies in the private sector to track and monitor the integrity of
cargo containers Containerization is a system of intermodal freight transport using intermodal containers (also called shipping containers and ISO containers). Containerization is also referred as "Container Stuffing" or "Container Loading", which is the pro ...
moving around the world using technologies such as
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromag ...
and GPS. *The
BSI Group The British Standards Institution (BSI) is the national standards body of the United Kingdom. BSI produces technical standards on a wide range of products and services and also supplies certification and standards-related services to business ...
undertakes an annual survey of supply chain risk exposure, identifying and updating the main supply chain security concerns. In its 2020 report,
drug smuggling The illegal drug trade or drug trafficking is a global black market dedicated to the cultivation, manufacture, distribution and sale of prohibited drugs. Most jurisdictions prohibit trade, except under license, of many types of drugs through ...
, cargo theft of
pharmaceuticals A medication (also called medicament, medicine, pharmaceutical drug, medicinal drug or simply drug) is a drug used to diagnose, cure, treat, or prevent disease. Drug therapy ( pharmacotherapy) is an important part of the medical field and re ...
and medical supplies and increasing warehouse and facility theft were identified as particular concerns. * The
International Organization for Standardization The International Organization for Standardization (ISO ) is an international standard development organization composed of representatives from the national standards organizations of member countries. Membership requirements are given in A ...
(ISO) has released a series of standards for the establishment and management of supply-chain security. ISO/PAS 28000 ''Specification for Security Management Systems for the Supply Chain'', offers public and private enterprise an international high-level management standard that enables organisations to utilize a globally consistent management approach to applying supply-chain security initiatives. ISO/IEC 20243 is The
Open Trusted Technology Provider Standard The Open Trusted Technology Provider Standard (O-TTPS) (''Mitigating Maliciously Tainted and Counterfeit Products'') is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the Internatio ...
(O-TTPS) (''Mitigating Maliciously Tainted and Counterfeit Products'') that addresses supply-chain security and secure engineering. *The EU-US Summit held in
Lisbon Lisbon (; pt, Lisboa ) is the capital and largest city of Portugal, with an estimated population of 544,851 within its administrative limits in an area of 100.05 km2. Lisbon's urban area extends beyond the city's administrative limits w ...
in November 2010, highlighting the need for their international "partnership to bring greater prosperity and security" for citizens on both sides of the Atlantic, provided a foundation for the
Transatlantic Economic Council The Transatlantic Economic Council (TEC) is a body set up between the United States and European Union to direct economic cooperation between the two economies. Establishment and chairmanship The TEC was established by an agreement signed on Ap ...
to build on, announcing at its December 2010 meeting an agreement "to deepen transatlantic cooperation in supply chain security policies".U.S.-EU Transatlantic Economic Council
Joint Statement
17 December 2010, accessed 23 December 2020
* The
Common Criteria The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard ( ISO/IEC 15408) for computer security certification. It is currently in version 3.1 revision 5. Common Criteria ...
offers with EAL 4 an opportunity to include necessary evaluations that assure supply chain security for IT products


International agreements

*Efforts for countries around the world to implement and enforce the
International Ship and Port Facility Security Code The International Ship and Port Facility Security (ISPS) Code is an amendment to the Safety of Life at Sea (SOLAS) Convention (1974/1988) on Maritime security including minimum security arrangements for ships, ports and government agencies. ...
(ISPS Code), an agreement of 148 countries that are members of the
International Maritime Organization The International Maritime Organization (IMO, French: ''Organisation maritime internationale'') is a specialised agency of the United Nations responsible for regulating shipping. The IMO was established following agreement at a UN conference ...
(IMO). *The European Union and the
Government of Canada The government of Canada (french: gouvernement du Canada) is the body responsible for the federal administration of Canada. A constitutional monarchy, the Crown is the corporation sole, assuming distinct roles: the executive, as the ''Crown-i ...
entered into an Agreement on Customs Cooperation with Respect to Matters Related to Supply-Chain Security in March 2013.


Supply chain cyber security

Supply chain cyber security is a subset of supply chain security which focuses on the digital aspects of the traditional supply chain as well as the supply chain for electronic and digital goods.


See also

*
Authorized economic operator According to the World Customs Organization (WCO), an authorized economic operator (AEO) is The growth of global trade and increasing security threats to the international movement of goods have forced customs administrations to shift their ...
*
Hardware Trojan A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HT is the entire activity that the ...
*
Container Security Initiative The Container Security Initiative (CSI) a.k.a. the 24-Hour Rule was launched in 2002 by the U.S. Bureau of Customs and Border Protection (CBP), an agency of the Department of Homeland Security. Its purpose was to increase security for container ...
*
Counterfeit consumer goods Counterfeit consumer goods (or counterfeit and fraudulent, suspect items - CFSI) are goods, often of inferior quality, made or sold under another's brand name without the brand owner's authorization. Sellers of such goods may infringe on eith ...
*
Counterfeit electronic components Counterfeit electronic components are electronic parts whose origin or quality is deliberately misrepresented. Counterfeiting of electronic components can infringe the legitimate producer's trademark rights. Because counterfeit parts often have inf ...
*
Customs Trade Partnership against Terrorism The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrori ...
*
Global Trade Exchange The Global Trade Exchange (GTX) is, or was, a controversial Homeland Security intelligence project, related to maritime-ports data-mining, being one of three pillars of the Safe Ports Act-related Secure Freight Initiatives. The Global Trade Excha ...
* James Giermanski * Denise Krepp *
ISO 28000 ISO 28000:2022, ''Security and resilience – Security management systems – Requirements'', is a management system standard published by International Organization for Standardization that specifies requirements for a security management system ...
*
ISO 31000 ISO 31000 is a family of standards relating to risk management codified by the International Organization for Standardization. ISO 31000:2018 provides principles and generic guidelines on managing risks that could be negative faced by organizati ...
* The
Open Trusted Technology Provider Standard The Open Trusted Technology Provider Standard (O-TTPS) (''Mitigating Maliciously Tainted and Counterfeit Products'') is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the Internatio ...
(ISO/IEC 20243) * Package pilferage * Package theft *
Security risk In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environm ...
*
Supply-chain management In commerce, supply chain management (SCM) is the management of the flow of goods and services including all processes that transform raw materials into final products between businesses and locations. This can include the movement and stor ...
*
Track and trace In the distribution and logistics of many types of products, track and trace or tracking and tracing concerns a process of determining the current and past locations (and other information) of a unique item or property. This concept can be s ...
*
Trade facilitation Trade facilitation looks at how procedures and controls governing the movement of goods across national borders can be improved to reduce associated cost burdens and maximise efficiency while safeguarding legitimate regulatory objectives. Bus ...


References


External links

{{External links, date=March 2021
ICAO-WCO: Moving Air Cargo Globally - Air Cargo and Mail Secure Supply Chain and Facilitation Guidelines

IMO FAQ on the ISPS Code

MIT Project on Supply Chain Response to Terrorism

Supply Chain Risk Management Maturity Model

Stanford Global Supply Chain Management Forum

Supply chain security: adding to a complex operational and institutional environment, A Grainger (2007)

World Customs Journal: special issue on supply chain securityPort and Maritime Security OnlineChain of Perils: Hardening the Global Supply Chain and Strengthening America's Resilience

ISO 28002 supply chain security and resilience

Global Supply Chain Security, James Giermanski, Scarecrow Press, 2012 - 218 PagesImplementing a Robust Supply Chain Security & Risk Management
Supply chain management Security