Supply chain risk management (SCRM) has become one of the most significant areas of cybersecurity practice — and one of the most heavily updated sections of the CISSP 2024 exam outline. The SolarWinds attack in 2020, the Log4Shell vulnerability in 2021, and a cascade of subsequent supply chain compromises have made clear that an organisation's security posture is only as strong as its weakest supplier.

For the CISSP exam, SCRM is tested at the governance and process level: understanding the risks, knowing the assessment lifecycle, and recognising the controls and standards that address supply chain threats.

Why Supply Chain Attacks Are a Top CISSP Concern

The SolarWinds attack provides the defining case study for modern supply chain risk. Threat actors compromised the SolarWinds Orion software build environment and inserted malicious code into legitimate software updates. When customers downloaded and installed the update — trusting the vendor's software signing — they unknowingly deployed a backdoor. Approximately 18,000 organisations, including multiple US federal agencies, were affected.

The SolarWinds attack illustrates why supply chain security is qualitatively different from conventional perimeter security. Traditional defences assume that threats originate outside the organisation's trusted network. A supply chain attack exploits the trust relationships that organisations depend on — the trust in a vendor's software, hardware, or services. By compromising a trusted third party, attackers can bypass even the most rigorous internal security controls.

For the exam: supply chain attacks are significant because they exploit trust relationships. The attacker does not need to breach the target directly — they compromise a trusted supplier instead.

Supply Chain Risk Categories

The CISSP identifies several categories of supply chain risk that candidates must understand.

Product tampering involves malicious modification of hardware or software during manufacturing or distribution. A compromised device may contain backdoors, keyloggers, or covert communication channels installed before the customer ever receives it.