With the recent increase in cyber threats, the security boundaries of organizations operating information systems are constantly getting thicker. As a result, the threat of supply chain attacks that find and attack relatively vulnerable points in the ...
With the recent increase in cyber threats, the security boundaries of organizations operating information systems are constantly getting thicker. As a result, the threat of supply chain attacks that find and attack relatively vulnerable points in the complex cyber supply chain of information systems, rather than direct attacks on information systems in operation. The Defense Information System of the Republic of Korea, which is responsible for the security of the Republic of Korea, is no exception to this threat, so it is necessary to improve its ability to respond to the threat of supply chain attacks. In this pater, we analyze major foreign policies, standards, and related response technologies. Then we propose a plan to manage threat of cyber supply chain of defense information system based on trust information.