iTnews

Defence explores blockchain to reduce IT supply chain risks

By Justin Hendry on Aug 31, 2020 6:54AM
Defence explores blockchain to reduce IT supply chain risks

Tries to secure its supplier ecosystem.

The Department of Defence is planning to build a proof-of-concept that will allow it to track the provenance of IT products using blockchain technology.

The department’s chief information office group expects to kick off the “discovery project” next month in a bid to secure its supplier ecosystem and reduce unforeseen security risks.

The three-month project will test if distributed ledger technology can “operationalise” a supply chain risk management (SCRM) framework and address two case studies.

A SCRM framework is essentially a register that uses metrics to score certain risks, allowing an organisation to determine the impact if that risk was to materialise and their preparedness.

One of the two case studies will test whether blockchain can be used to ascertain the provenance of IT products, while the other looks at volatile liquids like petroleum and oil.

A Defence document published last year indicates that the majority of the department’s procurements are currently from “untrusted suppliers and supply chains”.

It also states that the department places a lack of focus on the full “capability life cycle”, including not only the initial procurement perspective, but sustainment and disposal.

“Defence is not actively monitoring supply chain security risks/threats," the document states, adding that this leads to the “unknown provenance of products and services being used”.

In one instance, a laptop bought from a store was used on the Defence Protected Network, only to be found to contain a backdoor flaw introduced during manufacturing weeks later.

Defence puts the cost of remediating a compromise to its network at between $4 million and $5 million, though suggests this could be much higher depending on the extent of the breach.

The department would not comment directly on the particulars of the two blockchain proof of concepts or whether a SCRM framework had been developed.

Last year, initial operating capacity for a “commodity ICT SCRM” was slated for the 2020-21 financial year, followed by final operating capacity in 2022-23.

“Defence’s effort to bolster ICT system security through the adoption of sound supply chain processes and practices continues to develop and mature,” a spokesperson told iTnews.

“Logically, this may include exploring various options including consideration for the use of existing or emerging technologies.

“Defence does not provide direct comment on the specifics of its approach to cybersecurity.”

The department has invited one supplier to apply for the project through a brief on the Digital Marketplace.

But the brief is a mere formality, as Defence first approached the market through a similar brief last month, in which 12 sellers responded.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
blockchaincybercyber securitydefencedistributed ledgerdltgovernmentitsecuritysoftwarestrategysupply chain

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Justin Hendry
Aug 31 2020
6:54AM
0 Comments

Related Articles

  • Clean Energy Regulator swaps Fujitsu for Digital61
  • Defence cancels SkyGuardian drones to fund REDSPICE cyber plan
  • ATO gets $151m for better storage, security
  • Service NSW to bring facial verification to digital channels
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

Digital Nation

CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.