"

6 Chapter 6

A Cybersecurity Framework for Ransomware Mitigation in Supply Chains

Marywinnie Mugah

Meenakshi Adakamaranahalli Lingaiah

Kavitha Adakamaranahalli Lingaiah

Preamble

This study posits a cybersecurity framework for ransomware mitigation in supply chains, with a particular focus on Maersk, one of the leading service providers in integrated global logistics. A.P. Moller-Maersk is a Danish multinational conglomerate that provides services such as port operation, warehousing, and supply chain management. Headquartered in Copenhagen, Maersk operates in over 130 countries and employs more than 100,000 people worldwide (Maersk, 2025).

Given its core business, Maersk is a suitable subject for this study due to the critical role it plays in the global supply chain and its experience with ransomware attacks, such as the NotPetya incident (Steinberg, Stepan and Neary, 2021). As a leading global logistics company handling a significant portion of maritime container trade, its operations are vital to the international supply chain. This makes it an appropriate case for evaluating the impact of ransomware attacks and developing effective mitigation frameworks. Furthermore, the organisation’s proactive approach and commitment to cybersecurity demonstrated through practices such as comprehensive backup systems and documented response plans, offer valuable insights into enhancing cybersecurity resilience in supply chains.

Executive summary

This study presents a cybersecurity framework for the mitigating ransomware attacks within supply chain environments, with a focus on a case study on Maersk’s experience during the NotPetya ransomware incident. It highlights the raising ransomware threat actors targeting digital supply chains, primarily by exploiting the interconnectedness of digital ecosystems and the potential for cascading impacts across multiple organisations.

Using NIST Cybersecurity Framework and MITRE ATT&CK as main frameworks, this study identifies critical risks in digital assets, third-party vendor relationships, human factors, and process gaps. This study emphasises vulnerabilities like weak software update controls, inadequate network segmentation, and immature incident response capabilities, which significantly surge the likelihood and impact of ransomware attacks in digital supply chain.

The Maersk NotPetya case demonstrates how a third-party software vulnerability (M.E.Doc) created an entry point for malware, which then propagated through a flat network architecture. This resulted in $250 million financial losses and operation downtime of 10days. This shows the importance of layered cyber defence strategies which includes preventive technical controls (e.g., firewalls, RBAC, MFA, SSDLC), procedural governance (e.g., vendor risk assessments, change management), and people-focused measures (e.g., awareness training, contractual security clauses).

This study also recognises newly arising risks such as Ransomware-as-a-Service (RaaS), geopolitical tensions, and AI-driven attack vectors, which creates a huge necessity for continuous improvements and adaptive security strategies. Future work is recommended in these areas like AI-driven behavioural analytics, automated compliance using RegTech and quantitative risk modelling (e.g., FAIR) to enhance executive decision-making.

By adopting the proposed frameworks which are rooted in defence-in-depth principles, organisations can strengthen their resilience, which would reduce ransomware risk exposures across the supply chain, and align with evolving regulatory requirements such as GDPR, NIS2 and EU AI Act.

1. Introduction

1.1 Background

Cybersecurity has evolved into a crucial aspect in securing digital assets in the digital landscape. Organisations have continually invested in cybersecurity to keep up with the increasing sophistication and frequency of cyber-attacks. Moreover, cybersecurity regulations have continuously been formulated, making significant contributions to shielding digital assets such as sensitive data shared between business partners as well as maintaining the integrity of critical digital infrastructure. Effective cybersecurity measures prevent massive losses and disruptions that result from cyberattacks, while also enhancing digital security trust, which in turn fosters innovation and economic growth (Amin, 2024).

1.1.1 Definitions of key terms and concepts

The definitions below serve as a foundation for the study.

Ransomware: Malicious software that encrypts data and denies access until a ransom is paid (Datta and Acton, 2024).

Defence in Depth (DiD): A cybersecurity strategy that employs a multilayered approach to protect digital assets (Datta and Acton, 2023).

RaaS (Ransomware as service): A Cybercriminal business model in which ransomware kits are readily available in the dark web for deployment (Datta and Acton 2024).

Mean Time to Detect (MTTD): A metric that measures the average time it takes for an organisation to detect a security incident (Khan,2023).

Mean Time to Respond (MTTR): A metric that measures the average time it takes for an organisation to mitigate, contain, and recover from security incident ((Khan,2023).

Recovery Time Objective (RTO): The maximum acceptable amount of time a system can be down after an incident.

Recovery Point Objective (RPO): The maximum acceptable amount of data loss measured in time.

NIST (National Institute of Standard and Technology): A U.S. federal agency that develops standards, including cybersecurity standards.

MITRE ATT&CK: A globally recognised framework and knowledge base that outlines the techniques and tactics of adversaries across the attack lifecycle.

Incident Response Plan: A strategic plan used by an organisation to detect, respond to, and recover from an incident, minimising damage and ensuring business continuity.

1.2 Objectives

Supply chains have witnessed a surge in ransomware attacks by threat actors, primarily due to the widespread impact these attacks can have on multiple organisations and individuals. A single compromised entity can disrupt operations across numerous stakeholders, amplifying both the overall damage and potential ransom payouts (Ghanbari, Koskinen and Wei, 2024).

This study aims to address these challenges with the specific objectives of this research being:

  • To develop a cybersecurity framework that effectively mitigates ransomware attacks in supply chains.
  • To evaluate the risks posed by third-party vendors and establish risk management practices that enhance supply chain security.
  • To analyse real world case studies of ransomware attacks in supply chains to understand their impacts and derive actionable mitigation strategies.

1.3 Scope

This study aims to mitigate ransomware attacks within supply chains by focusing on several key areas. It begins with the identification of critical digital assets within the organisation and an examination of common ransomware attack vectors targeting supply chains. Additionally, the study evaluates risk assessment frameworks to identify high-risk areas within the organisation’s operations. Moreover, it reviews relevant regulatory requirements and analyse the role of governance in enforcing robust cybersecurity measures.

1.4 Approach

To gain a deeper understanding of ransomware attack vectors and propagation mechanisms, this study involves a thorough analysis of real-world ransomware incidents using the NotPetya attack. This case serves as an example of how ransomware, initially targeting a single entity, can rapidly escalate to the larger supply chain through lateral movement (Steinberg, Stepan and Neary, 2021).

The MITRE ATT&CK framework serves as the threat taxonomy for mapping adversary tactics, techniques, and procedures (TTPs) associated with ransomware attacks, particularly within supply chain environments. Using world threat intelligence, the framework enables detailed attribution of threat actor behaviour across the threat lifecycle (Roy et al., 2023). This granular mapping will support the identification of specific techniques used by threat actors in high-profile attacks, thereby enhancing the mitigation strategies.

Overall, the study incorporates the National Institute of Standards and Technology (NIST) Cybersecurity Framework to structure and evaluate ransomware mitigation strategies. Its five core functions: Identify, Protect, Detect, Respond, and Recover (Bernroider and Walser, 2018) offers a comprehensive and scalable model for enhancing cyber resilience. Furthermore, the framework high adaptability for organisations across the supply chain ecosystem.

2. Risk Identification

Risk identification is a fundamental process in Cyber Supply Chain Risk Management since organisations heavily rely on digital technologies, cloud-based services, third- party vendors, and open-source products (Hammi et al., 2023).

An organisation may build a highly secure cyber infrastructure however, threat actors who are unable to infiltrate the system directly may exploit digital supply chain products to enter the system and implant ransomware compromising the integrity, confidentiality and availability of data and business operations.

2.1 Asset identification and Risk Register.

To efficiently manage cyber risks, companies must identify, categorise, and assess their digital assets.

  • Key assets in the supply chain targeted by Ransomware discussed in below table

Asset Type

Assets

Risk (Further explained in Threat identification)

Physical Assets

Servers, data centres, networking hardware, IoT devices

  • Compromised Firmware’s
  • Weak security configuration
  • End-of-life hardware with outdated security patches
  • Counterfeit or untrusted hardware components

Digital Assets

Cloud based services, Software applications, open-source libraries, Code repositories

  • Unregularised Software usages policies
  • Vulnerabilities in open-source libraries
  • Unauthorised access to cloud services
  • Unregularised of patch management
  • Unapproved sources for code usage

Table 1: Key assets in the supply chain targeted by Ransomware

  • People, process risk in the supply chain targeted by Ransomware discussed in table 2

Asset type

Assets

Risk (Further explained in Threat identification)

Human Asset

Third party Developers, IT Administrators, Contractors

  • Phishing attacks
  • Weak Credentials
  • Insider threats
  • Social engineering

Process and policy

Third party vendor weak process and policy

  • Poor incident and change management
  • Weak access controls
  • Cyber security policies differences

Table 2: People, process risk in the supply chain targeted by Ransomware

image

Figure 1: Asset vulnerability

An organisation typically relies on at least one, if not all, of these digital supply chain assets. Since these assets are provided by third party vendors, the organisation does not have a complete control over their security and often lacks visibility into third-party dependencies. If any of these products contain a security vulnerability, attackers can exploit it to gain access to multiple organisation using the same product.

Once the attacker infiltrates the system, they can inject Ransomware and allow it to spread across multiple layers to maximum impact. The Ransomware can then be activated to encrypt data, rendering it inaccessible. Therefore, risk Identification is crucial, as it helps businesses to anticipate cyber threats and vulnerabilities and to develop effective mitigation strategies.

In the case of the Maersk ransomware attack, below mentioned the lack of proper asset management and risk identification is believed to have been a contributing factor.

Asset Type

Asset

Risk

Digital Assets

Third party software used here is M.E. Doc

  • Lack of software usage policy.
  • Unregularised patch update management.
  • Unregularised User privileges for installing and upgrading software.

Table 3: Maersk’s Asset Vulnerability

2.2 Threat Identification

Cyber Supply chain threats are diverse and constantly evolving. Vulnerabilities in the supply chain can lead to multiple types of cyber-attacks, including malware, ransomware, DDoS, phishing and social engineering, insider threats, API exploits, and more. Most of these attacks exploit weak links in the Supply chain, enabling attackers to gain access to multiple companies using the same compromised products. Once vulnerabilities are identified, any type of cyberattack becomes possible.

Ransomware poses a significant threat to cyber supply chains by targeting the risk associated with supply chain assets. Unlike traditional cyberattacks, ransomware attacks in supply chains can propagate across interconnected systems, simultaneously affecting multiple organisations. In the cyber supply chain, products within the supply chain layer can have access to the organisation’s critical operations and data. Companies often rely on multiple cyber supply chain products, creating a wide spectrum where attacker can identify vulnerabilities. The threat actor does not need to penetrate the organisation’s core cybersecurity systems directly instead; they can exploit a vulnerability in any of the cyber supply chain products to gain back door access and initiate an attack.

2.3 Vulnerability Assessment

Vulnerability assessment assesses the impact of the risk identified in case it materialises.

1.Physical assets: Physical assets such as servers, data centres, networking hardware, and IoT devices are typically purchased from a third-party vendor. As discussed above, several risks are associated with supply chain physical assets.

End-of-life hardware with outdated security patches, compromised firmware such as IPMI (Intelligent Platform Management Interface, which enables BIOS-level access to servers), weak security configurations like using HTTP port over HTTPS, counterfeit IoT devices, weak data centre security can create back door entry for ransomware attackers to get an entry into organisations using these vulnerable cyber supply chain assets. In 2018, Bloomberg alleged that Chinese intelligence had inserted malicious microchips into Supermicro motherboards. These mother boards were used in U.S tech companies, including Amazon and Apple. The malicious chips allowed remote attackers to alter the operating system kernel, creating a backdoor that could be used for various malicious activities, including injecting ransomware (Barbosa & Franco, n.d.).

2.Digital Assets: Companies, recognising the cost savings and advantages of cloud computing, are increasingly migrating their workloads to cloud infrastructure services. Many companies also rely on third-party vendors for various software solutions, including finance, HR, incident management, security, backup, and disaster recovery (DR) solutions. Additionally, various software solutions are used for operations of the organisation. Moreover, organisations are now utilising open-source software. A threat actor must find a single-entry point in any of these digital assets to inject ransomware. Few of the Threats are discussed below.

  • Unregulated Software usages policies: All software usage should be regulated and approved. If not, user may download and install any software, which can be malicious creating a vulnerability.
  • Vulnerabilities in open-source libraries: Using 3rd party libraries which are not approved can lead to malicious code injections and other security risks.
  • Unauthorised access to cloud services: Weak Security controls for accessing cloud resources can result in unauthorised access to critical resources.
  • Unregularised patch management: Patch management if not in place, can lead to usage of older updates with old security patches.

For the Maersk attack, the main attack vector was a third-party software M.E.Doc which is a widely used accounting software. The software installation and parch management were not regularised. The M.E.Doc software update provided an entry point for the Notpetya malware. EternalBlue & Eternal Romance which were known vulnerabilities in the windows operating system with older patch allowed NotPetya to move across networks without human interaction, affecting multiple layers. Again, unregularised patch management creating a gateway. Once the ransomware entered the system, it rapidly propagated across the network, causing massive disruption (Greenberg, 2018).

3.Human Asset process and policies: Organisations outsource operations to third-party vendors for better cost optimisation. These outsourced vendors are often provided with access to the organisation’s critical operations and data, as vendors often require privileged access to internal systems, cloud environments, and sensitive corporate data (Hammi et al., 2023). Cyber supply chains involve software developers, IT administrators, and contractors who interact with enterprise applications, industrial control systems (ICS), and cloud platforms, creating potential entry points for cyber threats (Yeboah-Ofori et al., 2021).

Without strict access controls, background checks, and contractual security agreements, third-party vendors can become weak links, exposing organisations to insider threats, ransomware Infections, and software supply chain compromises. Also, with Cyber security policies differences exposes all the cyber risk present within the third-party vendors company possess into the main organisation (Robinson, Corcoran, & Waldo, 2022).

The Toyota Ransomware Attack (2022) is a notable example, where Konjima industries, a supplier that provides essential components for Toyota, was targeted by the LockBit ransomware, due to the attack Toyota was forced to halt production across all its domestic plants (Aggarwal, 2023).

2.4 Risk Scenarios in Cyber Supply chain Ransomware attack

Risk scenarios help organisations understand realistic cyber threats that can compromise the integrity, confidentiality and availability of critical systems and data. A ransomware attack through the cyber supply chain can lead to financial losses, operational disruptions, and reputation damage (Hammi et al., 2023; Yeboah-Ofori et al., 2021).

Below we outline examples of high impact, medium impact, and low impact scenarios.

2.4.1 High-Impact Risk Scenarios

Scenario: Ransomware Attack on a software vendor

Threat: An attacker infiltrates the organisation through a third-party software using a third-party software update and deploys ransomware. This compromised software is used across the organisation in all environments like Test, Development, Pre-Production, and production. The ransomware spreads across the entire organisation, encrypting data at different levels and causing widespread disruption.

  • Impact:
  • Data Unavailability: Unavailability of critical Data, Data is encrypted and cannot be accessed.
  • Operational disruption: Unavailability of data leading to business down, leading to heavy financial losses.
  • Data compliance lost: Data being unavailable would lead to compliance loss leading to heavy fines and reputational damage.
  • Real-World Example: The Maersk NotPetya attack leading to Maersk operations down for 10 days and causing financial losses exceeding $250 million (Cartwright & Cartwright, 2023; Hammi et al., 2023; Aggarwal, 2023).

2.4.2 Medium-Impact Risk scenarios

Scenario: Ransomware infection via Compromised Vendor Endpoint

Threat: A vendor with remote access to the organisation’s network had an endpoint compromised with ransomware because of weak endpoint security. This ransomware spread to all shared drives and non-critical systems, but it was contained before reaching core production systems.

Impact:

  • Data Unavailability: Some shared fields and non-critical data got encrypted leading to impact with non-critical functions.
  • Operational delay: noncritical processes slow down due to data being unavailable.
  • Remediation Costs: Requires cleanup, forensic analysis, and partial recovery from backups.

Real-World Example: The Kaseya VSA ransomware attack (2021) spread via compromised IT management software to MSP customers, causing localised outages but was contained before impacting critical infrastructure (Ghanbari, Koskinen and Wei, 2024).

2.4.3 Low-Impact Risk Scenarios

Scenario: Phishing Attack on a Supply Chain Employee

Threat: A Phishing email tricks on a User within the human element of the supply chain. The attacker successfully deceives the employee and installs spyware that monitors user activity and accesses confidential information.

Impact:

  • Data integrity lost: User data is exposed and can be tampered.
  • Confidentiality: Attackers harvest user credentials, gaining access to internal enterprise systems.
  • User financial details exposed.
  • IT team once identified

Real-World Example: The Target Data Breach (2013) resulted from a phishing attack on a third-party HVAC vendor, granting attackers access customer records (Yeboah-Ofori et al., 2021; Robinson, Corcoran, & Waldo, 2022).

3. Risk Assessment

Risk assessment plays an important role in determining the severity and the likelihood of cyber threat that impact the cyber supply chain. After risk identification, assessing the risks is the next step. This process helps organisations prioritise security efforts by evaluating the identified risks, its severity, and impact, and how they can compromise the confidentiality, integrity, and availability of critical business assets. Once categorised in terms of High Risk, medium risk and low risk threats, the risks can then be prioritised, and appropriate solutions can be implemented based on their criticality. An effective risk assessment would include a risk register, risk evaluation, and visualisation tools like risk matrix to guide mitigation strategies (Hammi et al., 2023).

3.1 Risk Register and analysis

A risk register is a structured tool used to document identified threats, vulnerabilities, potential impacts, and likelihoods. It helps decision-makers visualise the areas where the cyber supply chain is most exposed, and which areas must be prioritised. Risks associated with the assets identified during the risk identification phase are now assessed based on their potential impact, as shown below (Yeboah-Ofori et al., 2021).

Risk ID

Threat

Vulnerability

Asset Affected

Impact

Likelihood

Risk Rating

R1

Ransomware in software updates

Weak update validation

Software supply chain

High

High

High

R2

Cloud API exploit

Misconfigured cloud access

Cloud platforms

High

Medium

High

R3

Insider threat

Excessive privileges

Enterprise systems

Medium

Medium

Medium

R4

Phishing/social engineering

Untrained personnel

Human assets

Medium

High

High

R5

Malware in open-source code

No dependency vetting

Application software

Medium

Medium

Medium

R6

DDoS attack on vendor system

No redundancy or response plan

Third-party systems

Low

Medium

Low

Table 4: Risk register

Real-World Risk Register in cyber supply chain.

ID

Risk Description

Vulnerability

Risk origin

Impact

Impact Severity

Migration Status

1

Outdated OS

EternalBlue & Eternal Romance (Notpetya)

Vendor

Org level infrastructure going down. Business down

High

In-Progress

2

MFA for Vendor Login

Non-Fully compliant login policy

Vendor

Unauthorised access.

User level impact

Low

In-Progress

3

CIFS shares Accessible to Everyone including vendor

NTFS permissions for File shares open to Everyone

Internal

Unauthorised data access, Data Loss, Business Impact

Medium

Mitigated

4

No Network Segregation

All network exposed

Internal

Cyber-attack entire organisation can be impacted

High

In-Progress

5

SSH port open for entire firewall and vendor

Non optimal firewall

Internal

Unauthorised access. Possibility of Brute force attack

High

Mitigated

6

Ransomware/malware identified

Ransomware/Malware identified by intrusion detection system

Vendor

Several layers in infrastructure affected leading to data loss and business down

High/Immediate

Mitigated

Table 5: Real World risk register

This register represents real-world type of risk register, combining observations of types of threats and their impact. Some risks like outdated OS, No Network Segregation can be associated with the Maersk attack (Yeboah-Ofori et al., 2021).

3.2 Risk Evaluation

Once the Risk have been identified, assessed, and logged in a risk register, the next step is to evaluate their significance in the context of the organisation’s objectives, business continuity, and its risk tolerance. This involves not just understanding the technical risks but also to evaluating how each threat could disrupt the data integrity, operational availability, compliance regulations and companies’ reputation. For example, Maersk, being a major player in the logistics sector, faced severe consequences from a ransomware attack such as data loss, service disruption, compliance loss and reputation loss. Implying affecting Availability should be rated to be more Critical, Confidentiality, Integrity become severe (Hammi et al., 2023).

ID

Threat

CIA

Likely

Impact

Tolerance

Priority

R1

Ransomware in updates

A, I

High

Severe

Low

Critical

R2

Cloud API exploit

C, I

Medium

Major

Low

High

R3

Insider threat

C

Medium

Moderate

Medium

Medium

R4

Phishing

C, A

High

Moderate

Medium

High

R5

Malware in open-source code

I

Medium

Moderate

Medium

Medium

R6

DDoS on vendor

A

Medium

Minor

High

Low

Table 6: Risk Evaluation

Explanation of Evaluation Criteria:

  • CIA: shows which aspect of security is at risk, Confidentiality (C), Integrity(I), or Availability (A).
  • Likelihood: Based on supply chain vulnerability, shows likelihood of attack possibility.
  • Impact: Measures the potential damage or impact of the Risk.
  • Tolerance: Organisation ability to manage consequences.
  • Risk Priority: Shows if risk needs immediate action or can be addressed later.
  • (Robinson, Corcoran, & Waldo, 2022).

3.3 Risk Matrix

A risk matrix is a tool used to map and prioritise risks based on their changes of occurrence and how significant impact it can create. In our context of cyber supply chain, we can have clear overview of which risks that would be posing a bigger challenge and which must be actioned first. Below is a heat map showing the likelihood of the attack to the severity of the attack (Hammi et al., 2023).

image

Figure 2: Risk Matrix

Implications for Risk Management

This risk matrix allows security leaders to visualise risk concentrations and find out the hot zones and target in investing to mitigate this risk as below.

  • Critical and high Risks (R1, R2, R4): These should get immediate mitigation like software update integrity verification, enhanced endpoint protection, phishing awareness training, etc.
  • Medium Risks (R3, R5): Which can be monitored closely and controlled steadily like security insider access reviews, role-based access control (RBAC) implementation, and zero trust architectures.
  • Low Risks(R6): These may be addressed after critical and medium risks, for example, by enabling load balancing to mitigate DDoS attacks.

By aligning risks to organisational tolerance, the matrix makes sure that the high-priority threats to CIA principles receive the necessary attention and resources (Hammi et al., 2023). This would help transform complex cyber threats into a intuitive and actionable format allowing the risk management teams to focus on what matters most supporting evidence-based decision making sure the risks are systematically prioritized and addressed (Yeboah-Ofori et al., 2021; Robinson, Corcoran, & Waldo, 2022).

4. Risk Mitigation Strategies & Controls 

Once the risks are identified, assessed, and evaluated, the next step would be building risk mitigating strategies. Effective risk mitigation strategies within the digital supply chain require a layer-by-layer security approach, aligned with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and MITRE ATT&CK tactics and techniques. This should incorporate preventive and detective controls, along with systematic security policies, and informed by adversary behaviour, would create a resilient cyber ecosystem (Kwon et al., 2023; Ahmed et al., 2022).

4.1 Preventive Measures 

Preventive measures focus on building measures to reduce the chances of cyber threats infiltration and materialising. Preventing is the critical part of any risk mitigation strategy (Hammi et al., 2023).

4.1.1 Technical controls

Firewalls and Network segmentation: Deploying network segmentation and perimeter defences like firewalls would help limit lateral movement within the infrastructure. This would isolate sensitive systems, and it would minimise the blast radius in case of any compromise. This would align with MITRE mitigation like M1030, which is network segmentation, and NIST CSF PR.AC-5, making sure critical assets are separated logically and ingress and egress traffic is controlled.

Role based access controls (RBAC), zero trust policies, Multi Factor Authentication (MFA) : Implementing RBAC and enforcing Zero Trust security principles will help in ensuring the users have only limited access necessary. MFA Authentications would help in securing from attacks like brute force password attacks, phishing attacks etc. MFA adds an extra layer of validation, making it significantly harder for attackers to gain unauthorised entry (Ahmed et al., 2022).

Secure software Development and management Lifecycle (SSDLC): Adopting SSDLC practices like static/dynamic analysis, peer reviews, secure configuration management, upgrade control, reduce the risk of the software vulnerability that can be exploited (Ahmed et al., 2022).

Cloud Hardening:  Enabling stronger encryption, disabling default credentials, and removing unnecessary services fortifies cloud infrastructure.

Endpoint protection for vendors Supply chain partners can become a weak links. Using Endpoint Detection and Response (EDR) tools in the vendor-managed devices would help in reducing risk which can exploit compromised endpoints (Aljoghaiman & Sundram, 2023).

Backup/Disaster recovery in case of compromise, Backup and DR solutions would help business to restore to last available safe restore points. Recovery and restore plans must be pre-build and tested validated and documented with RPO (Recovery point object) and RTO (Recovery Point object) and accepted by business.

Preventive Technical Control

Mapped MITRE ATT&CK Technique

Mapped NIST CSF Control

Firewalls and Network Segmentation

M1030 – Network Segmentation

PR.AC-5

Role-Based Access Control (RBAC), Zero Trust, MFA

M1036 – Multi-Factor Authentication

PR.AC-4, PR.AC-6

Secure Software Development Lifecycle (SSDLC)

T1190 – Exploit Public-Facing Application

PR. IP-3

Cloud Hardening

M1042 – Encrypt Sensitive Information

PR.DS-1, PR.IP-1

Endpoint Protection for Vendors

M1049 – Antivirus/Antimalware

PR.PT-1

Backup/Disaster Recovery (DR)

M1053 (Data Backup); M1051 (Disaster Recovery)

PR.IP-9, PR.IP-10, RC.RP-1

Table 7: Technical controls

4.1.2 Procedural Controls 

Vendor Risk Assessment:  Structured evaluation of the vendor is performed, including security posture, compliance history, and operational maturity, which helps in identifying risks involved and prioritising these risks and systematically preventing them.

Change management controls: Uncontrolled changes lead to a major source of vulnerabilities. Proper change management control with proper approval workflows and rollback mechanisms would help in preventing unauthorised system alterations.

Secure Development Policies:   Enforcing a comprehensive software deployment policy, which would be covering everything from secure code standards to test procedures, would help in new software’s not introducing systemic vulnerabilities. For example, controlling GitHub push only after validation and approval (Aljoghaiman & Sundram, 2023; Hammi et al., 2023).

image

Figure 3: Processual controls

4.1.3 People controls

Contractual security requirements: Mandatory security clauses such as compliance with industry standards, breach notification timelines, audit provisions, and data protection terms.

Supply Chain Awareness:  Employees and vendors should be aware of the structure and risk implications of interconnected supply chains, which would help in building a security-conscious culture.

Behavioural Norms for Software Vendors: Evaluation of the vendor culture, whether they adopt secure by default and secure by design principles.

Cybersecurity training: Continuous training on phishing, data handling, incident reporting, and simulated attacks helps reduce the human attack surface (Yeboah-Ofori et al., 2021; Robinson, Corcoran, & Waldo, 2022; Aljoghaiman & Sundram, 2023).

People Control

Mapped MITRE ATT&CK

Mapped NIST CSF Control

Contractual Security Requirements

Trusted Relationship (T1199)

ID.GV-3

Supply Chain Awareness Training

Spear phishing via Service (T1194)

PR.AT-2

Behavioural Norms for Vendors

Supply Chain Compromise (T1195)

ID.SC-4

Cybersecurity Training

Phishing (T1566), Valid Accounts (T1078)

PR.AT-1

Table 8: People controls

4.2 Detective Measures 

Prevention is ideal; however, detecting and responding to an incident as early as possible also greatly reduces the damage that a risk can cause.

Detective measures include: –

  • Monitoring & Logging
  • Security Information and Event Management: Aggregate and correlate security events in real-time threat detection and mitigation before explosion.
  • Centralised logging: Centralised log collection is collected and analysed to reveal anomalies and enable forensic investigations (Kwon et al., 2023; Hammi et al., 2023).
  • Intrusion Detection & Threat intelligence
    • Network Intrusion Detection Systems: Monitoring the network for known threat patterns and identifying anomalies in network patterns aids in the detection of malicious activities.
  • Threat intelligence feeds: Integration of global threat feeds helps security teams recognise indicators of compromise based on the latest TTPs (Tactics, Techniques, and Procedures), aligning detection with current threat landscapes (Kwon et al., 2023; Ahmed et al., 2022).
  • Behavioural Analytics
    • Monitoring user and Entity behaviour using advanced analytics monitor systems to detect deviations from established baselines, helps in detecting insider threats, vendor threats, and account misuse. The table below specifies some controls related to behavioural analytics

Detective Measure

Mapped MITRE ATT&CK

Mapped NIST CSF Control

Security Information and Event Management (SIEM)

Anomaly Detection Techniques (General mapping)

DE.CM-1, DE.CM-7

Centralised Logging

T1005 -Data from Local System (log tampering), T1119 – Automated Collection

DE.CM-1, DE.CM-7

Network Intrusion Detection Systems (NIDS)

T1046 – Network Service Scanning, T1557 – Adversary-in-the-Middle

DE.CM-7, DE.CM-4

Threat Intelligence Feeds

Correlates to known TTPs from adversaries like Lasarus & menuPass

DE.CM-6, ID.RA-2

Behavioural Analytics

T1078 – Valid Accounts

DE.CM-8

Table 9: Detective controls

4.3 Corrective Actions & Incident Response 

Once a supply chain threat is detected or exploited, corrective actions and responses must be done swiftly, which are mentioned below: –

  • Incident response plans: Standard operating procedure (SOP) must be built with a communication plan with vendors, customers, and regulators.
  • Containment:  Removal or isolation of the compromised component.
  • Recovery: Rollback/restoration plans to be built and swift implementation of the plan to restore to the previous safe restore points.
  • Post incident reviews: Documentation of root cause, recovery timelines, and action for improvements (Hammi et al., 2023).

However, all the corrective actions & incident responses must be pre-built for various scenarios and need to be tested, validated, and approved with the business for various cases of attack. If the measures are not pre-built, the time taken for building a containment plan can allow the attack radius to exponentially grow and cause major damage.

4.4 Compliance Measures 

Cyber supply chain risks intersect with legal and regulatory obligations.

  • Key regulations alignment

 Organisations must align with global and regional regulatory frameworks. If the organisation is compromised and this leads to compliance miss, it can lead to hefty fines and reputational loss. Organisations must take strict measures to safeguard the data, which can lead to compliance misses.

NIS2 directive (EU critical infrastructure protection): Energy, healthcare, transport, and digital services are under NIS2 Directives.

General Data Protection Regulation (GDPR): Policies on handling, collecting, storing, processing, and protecting personal data

EU AI Act for AI-based supply chain solutions: AI transparency, accountability, and risk classification.

Regulation

Scope

Key Focus Areas

NIS2 Directive

EU Critical Infrastructure Protection

Energy, healthcare, transport, and digital services

General Data Protection Regulation (GDPR)

Data Privacy and Protection

Collecting, storing, processing, and protecting personal data

EU AI Act

AI Governance in Supply Chains

Transparency, accountability, and risk classification of AI

Table 10: Regulatory controls

  • Contractual & compliance clauses: Organisations must make sure to have contractual clauses with vendors that include compliance requirements.
  • Awareness sessions and documentation: Awareness sessions and documentation should be there for corresponding departments (procurement, legal, and IT), outlining compliance responsibilities and escalation paths (Hammi et al., 2023; Robinson, Corcoran, & Waldo, 2022).

4.5 Residual Risk, Risk Acceptance & Transfer 

Even after all the above steps, residual risks might remain, especially in a dynamic and distributed environment like the cyber supply chain.

  • Risk Acceptance: High risks reduced to low-impact risks should be documented and signed off by leadership.
  • Risk Transfer: Use Cyber insurance and outsource legal firms with a reputation for legal and compliance management as contractors.
  • Effectiveness Review: Risk acceptance or transfer decisions should be periodically reviewed, especially after:

Security incidents

Regulatory changes

Onboarding of new vendors or services (Yeboah-Ofori et al., 2021).

Combining all the discussed measures will enable organisations to drastically reduce the likelihood of any cyber supply chain attacks. Ransomware attacks can be reduced to zero if all the measures are followed and adhered to without fail (Cartwright & Cartwright, 2023).

Applying the Risk Mitigation Framework to Maersk Supply chain: Analysing the Maersk supply chain ransomware attack shows the absence of failure of layered cybersecurity risk mitigation strategies leading to catastrophic operational, financial, and reputational losses. Below is an analysis of the Maersk’s control failures and mitigation opportunities, with reference to what was not followed and how it could have been avoided or mitigated (Greenberg, 2018).

Control Area

Observed Failure

Recommended Practice

Impact If implemented

Network Security

Flat network: malware spread globally

Isolate high-risk zones (e.g., Ukraine) using firewalls, VLANs, and micro-segmentation

Malware spread would be contained; blast radius minimised

Third-Party Risk

Unvetted vendor software (M.E.Doc) used

Conduct third-party risk assessments; mandate secure software procurement policies

Risky software could be flagged and isolated pre-deployment

User Awareness

No staff training on cyber supply chain risks

Enforce awareness programs and simulate supply chain attack scenarios

Could have prevented lateral movement via compromised users

Monitoring

No SIEM or threat detection; breach unnoticed

Implement SIEM and MITRE ATT&CK-based anomaly detection and alerting systems

Early detection and

faster containment of attack

Incident Response

No tested IR/DR plans; recovery relied on a single backup

Establish and test recovery plans with defined RTOs/RPOs; maintain geo-redundant backups

Quicker recovery, reduced operational downtime

Compliance

No cyber compliance framework or audit mechanism in place

Adopt NIS2, GDPR, and DORA-aligned internal policies; schedule regular audits

Enforced cyber hygiene and stronger legal defensibility

Table 11: Maersk Attack, Control Failures & Mitigation Opportunities

5. Implementation And Monitoring  

5.1 Implementation Plan 

To implement the risk mitigation strategies identified in the section above, a detailed plan is drawn up, including timelines and task owners. The timelines are categorised into three short, middle and long-term depending on their criticality. The table below summarises the implementation plan:

Mitigation Strategy

Timeline

Task Owner

Requirements

Deploy Firewall

Short term (0-3 months)

IT Operations

Firewall hardware/software, MFA tools

Network Segmentation

Short term (0-3 months)

IT Operations

Network architecture

Implement RBAC, Zero Trust architecture, and enforce MFA

Short term (0-3 months)

IT Operations

policies

Vendor Risk Assessments

Short term (0-3 months)

Procurement & Security

Vendor evaluation tools, compliance checklist

Deploy SIEM & Logging

Short term (0-3 months)

IT Operations

SIEM software

Cybersecurity Training

Continuous

HR & IT

Training platform, Training personnel

SSDLC Implementation

Medium-term (3-6 months)

Development Team

code analysis tools, secure coding policies

Patch management

Continuous

IT Operations

Software updates

Cloud Hardening

Medium-term (3-6 months)

Cloud Admin

Cloud security configurations, encryption tools

EDR Deployment

Medium-term (3-6 months)

IT Operations & Procurement

EDR licenses, endpoint policies

Backup & Recovery Testing

Medium to Long-term

IT Operations

Backup software, test environments

Develop Incident Response Plan and test

Long-term (6 – 9 months) cont.

IT operations

IR playbooks, simulation tools

Risk Acceptance/Transfer Review

Long-term (6 to 9 months) continuous

Governance & Legal team

Insurance policies, risk registers

Regulatory Compliance

Long-term (6 to 9 months)

Governance & Legal team

Compliance requirements

Table 12: Implementation Plan

The Gantt chart below shows a visual representation of the implementation plan.

image

Figure 4: Implementation Gantt Chart

5.2 Monitoring and Review 

To ensure that the implementation plan has the intended results, a monitoring and review process will be incorporated, which will be aligned to the Detect and Respond functions of the NIST framework.

Each mitigation strategy will be monitored based on its criticality as detailed below:

  • SIEM tools will be used to track any anomalies in the network, offering insights to firewalls and EDR tools.
  • Cybersecurity awareness training will be measured using employee participation rates as well as test results to assess the impact of the training.
  • Patch management: Software update logs will be reviewed monthly.
  • Backup and Recovery testing: Backups will be tested regularly to ensure their effectiveness, and remedies implemented in case of failure
  • Incidence response plan testing: Tabletop exercises will be conducted quarterly to ensure their effectiveness.
  • Vendor evaluation tools will be monitored for progress based on the number of existing vendors.

5.3 Metrics and Reporting 

To effectively evaluate the impact of the mitigation strategies, a defined set of key performance indicators will be used, which will entail both quantitative and qualitative metrics. The metrics will be used to track progress, flag issues for revision, and assist in making data-driven decisions. The table below summarises these metrics

Category

Metrics

Detection and Monitoring

Mean Time to Detect (MTTD)

Number of SIEM alerts resolved/Total number of alerts

% of network coverage by NIDS

Response and Recovery

Mean Time to Respond (MTTR)

RPO success rates from recovery tests

RTO success rates from recovery tests

Number of IR drills conducted, lessons captured

Compliance and Governance

Number of compliance gaps identified

Third-party compliance audit results

%Regulatory certification achieved

Training and Awareness

 % of staff completing security training

Reported suspicious activity count

Awareness test failure rate

Deployment of Preventive controls

% of systems with MFA enabled

% of vendor contracts with security clauses

% of endpoints covered by EDR solutions

 Table 13: Monitoring Metrics

The metrics above will be included in the reports, which will be done on two levels: operational, for review by the security operations team, and the executive level, which will be reviewed by the senior leadership and risk management committee.

The operations reports will be sent monthly, while the executive reports will be sent out on a quarterly basis by the respective task owners. In the event of significant incidents, an immediate escalation will be triggered through the predefined escalation matrix to all concerned stakeholders.

5.4 Continuous Improvement 

As the threat landscape is continuously evolving, continuous improvement will be a key part of the organisation’s risk management strategy. The organisation will align to the NIST framework Respond and Recover functions by reviewing the entire risk management strategy biannually, as well as when triggered, with the objective of reviewing the performance of the implemented controls from the reports shared within the period of evaluation. In addition, utilising threat intelligence and event data collected to fine-tune the mitigation strategies to adapt to the ever-evolving threat landscape.

A feedback control mechanism will also be implemented in the various processes outlined below:

  • Conduct post-incident reviews to establish root causes and update the risk mitigation strategies from the lessons learnt from the incidents.
  • Surveys and tests will be sent out to participants after cybersecurity awareness training to identify areas of improvement.
  • Actionable items will be expected after the tabletop exercises to ensure the incident response plan aligns with the overall business objectives and can be used for business continuity in case of incidents.
  • Conduct vendor review meetings to establish progress on the controls and ensure the vendor assessment is also done for new vendors.
  • The reports will be used to identify trends and gaps for improvement.

To ensure a good cybersecurity hygiene strategy, the organisation will be expected to maintain a strong policy framework that ensures every employee understands their roles and responsibilities in securing the digital assets. Some of these policies include a Cybersecurity Policy and a Remote Working Policy, amongst others.

6. Conclusion And Recommendations 

6.1 Summary

In summary, this study presents a framework for mitigating ransomware attacks within supply chain environments. Drawing from Maersk’s experience during the NotPetya attack, the study highlights how threat actors exploit vulnerabilities in third-party systems and use lateral movement techniques to compromise an organisation’s internal infrastructure. High-value digital assets such as third-party platforms, cloud services, and open-source libraries can become critical vulnerabilities when inadequately secured. A lack of visibility and security oversight across vendor relationships creates blind spots that are frequently exploited during supply chain attacks. Maersk’s flat network architecture enabled the rapid spread of the malware, showing the importance of network segmentation to contain threats. Furthermore, the absence of a formal incident response plan significantly prolonged operational downtime, contributing to substantial financial losses. Key mitigation strategies identified include vendor risk management to ensure alignment with the organisation’s security posture, and the implementation of technical controls such as endpoint detection and response, firewalls, and multi-factor authentication to limit exposure. Network segmentation is essential to isolate infected systems, reduce recovery time, and minimise damage. By adopting this mitigation framework, combined with continuous improvement, organisations can enhance their resilience and better respond to the evolving threat landscape.

6.2 Recommendations

This study has shown the importance of cybersecurity in any organisation and highlights how negligence of mitigation strategies can be quite catastrophic, as evidenced from Maersk’s attack. Maersk had not anticipated becoming a victim of a cyberattack, yet the Notpetya attack crippled its global operations, temporarily disrupting nearly 20% of the global shipping capacity (Steinberg, Stepan and Neary, 2021). Unfortunately, the threat landscape is evolving rapidly, and threat actors are constantly striving to outpace technological advancements. Therefore, the framework suggested in this study is essential for every organisation regardless of its size. This study primarily recommends the adoption of a defence-in-depth (DiD) strategy, which comprises of a multilayered approach. It integrates physical, technical, personnel, and procedural controls to mitigate vulnerabilities and strengthen the organisational resilience against cyberattacks. Personnel controls limit vulnerabilities due to human actors, such as vendors and employees, and include awareness training and the use of governance policies such as the Zero Trust policy. Physical controls limit vulnerabilities by limiting physical access to digital assets and may include perimeter defence and biometrics. Procedural controls limit vulnerabilities associated with poorly managed procedures, while technical controls limit vulnerabilities caused by technological flaws and include endpoint protection and network segmentation (Datta and Acton, 2023).

Some emerging issues in cybersecurity are also rapidly changing the threat landscape in supply chains. The rise of ransomware-as-a-service (RaaS) has lowered the barrier of launching ransomware attacks even for non-skilled threat actors (Datta and Acton, 2024). Geopolitical tensions and the rise of hacktivism also introduce vulnerabilities within global supply chains, which, if exploited, can trigger cascading effects that disrupt not only individual organisations but entire industries (Bednarski et al., 2025). As supply chains often span multiple countries and jurisdictions, they are particularly susceptible to politically motivated cyberattacks and ideologically driven campaigns. Organisations must keep up with the threat intelligence to ensure their migration strategies evolve with time.

Future studies aligned with this research could explore emerging risks in the supply chain introduced by advancing technologies. One critical area is the rise of AI-driven cyberattacks, particularly as supply chain management systems increasingly integrate artificial intelligence (Akinsuli, 2024). Investigating how AI can both enhance and threaten supply chain security will be vital. Additionally, future research could examine the application of blockchain technology to secure supply chain transactions and improve traceability, particularly in verifying the origin and integrity of software components.

6.3 Future Work

To enhance the proposed risk management framework, there are several areas identified for future research work. One critical area is automation of regulatory compliance with regulatory technology solutions (RegTech) that would be essential to ensure organisation policies align with industry standards such as DORA, GDPR, and the EU AI Act (Olaiya et al., 2024).Additionally, using AI-driven behavioural analytics to monitor employees and third-party vendors can proactively detect anomalies, which could be indications of phishing and social engineering threats, and organisations can take precautions. Finally, integrating cyber risk quantification models such as the FAIR methodology could be used to convert technical risks assessments into measurable financial metrics that can be presented at the executive level to make informed decisions (Wang, Neil and Fenton, 2019).

6.3.1 Limitations 

While every effort was made to ensure a thorough risk management exercise, there were several limitations encountered. Due to contractual restrictions and data privacy policies, access to the organisation and vendor data was not possible, necessitating the use of data from existing case studies done on this attack. Time constraints due to the academic deadlines also limited the depth of the study. Moreover, the dynamic nature of the cyber threat landscape poses a challenge, as the risk management framework represent only the current state. Hence, continuous improvement and updates are required.

References

Greenberg, A. (2018) ‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History’, Wired, 22 August. Available at: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/

Aljoghaiman, A. & Sundram, V.P., 2023. Mitigating Ransomware Risks in Supply Chains. International Journal of Cyber Criminology.

Cartwright, A. & Cartwright, E., 2023. The Economics of Ransomware Attacks on Digital Supply Chains. Digital Threats Research.

Hammi, B., Zeadally, S. & Nebhen, J., 2023. Security Threats, Countermeasures, and Challenges of Digital Supply Chains. ACM Computing Surveys.

Robinson, A., Corcoran, C., & Waldo, J., 2022. New Risks in Ransomware: Supply Chain Attacks and Cryptocurrency. Harvard Kennedy School, Belfer Center for Science and International Affairs.

Yeboah-Ofori, A. et al., 2021. Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access.

Barbosa, J.A.D.S. & Franco, D.P. (n.d.) Security in Depth: Rakshasa Hardware Backdoor Analysis. São Paulo, Brazil: Cybersecurity Researcher.

Aggarwal, M. (2023) Ransomware Attack: An Evolving Targeted Threat. Ministry of Electronics & IT, Delhi, India. IEEE 14th ICCCNT Conference.

Amin, M. (2024) ‘The Importance of Cybersecurity and Protecting of Digital Assets and Understanding the Role of Cybersecurity Laws in Safeguarding Digital Assets’, Indian journal of public administration, 70(3), pp. 493–501. Available at: https://doi.org/10.1177/00195561241271520.

Ghanbari, H., Koskinen, K. and Wei, Y. (2024) ‘From SolarWinds to Kaseya: The rise of supply chain attacks in a digital world’, Journal of information technology teaching cases [Preprint]. Available at: https://doi.org/10.1177/20438869241299823.

Maersk (2025) https://www.maersk.com/. Available at: https://www.maersk.com/about/ (Accessed: 11 March 2025).

Rose, S. et al. (2020) ‘Zero Trust Architecture’. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD. Available at: https://doi.org/https://doi.org/10.6028/NIST.SP.800-207.

Steinberg, S., Stepan, A., and Neary, K. (2021) NotPetya: A Columbia University Case Study. New York: Columbia University School of International and Public Affairs. Available at: https://www.sipa.columbia.edu/sites/default/files/2022-11/NotPetya%20Final.pdf

Billoir, E., Laborde, R., Wazan, A.S., Rütschlé, Y., and Benzekri, A. (2024) ‘Implementing the principle of least administrative privilege on operating systems: challenges and perspectives’, Annals of Telecommunications, 79(7–8), pp. 857–880. Available at: https://doi.org/10.1007/s12243-024-01033-5 (Accessed: 11 March 2025).

Krumay, B., Bernroider, E.W.N. and Walser, R. (2018) ‘Evaluation of cybersecurity management controls and metrics of critical infrastructures: A literature review considering the NIST cybersecurity framework’, in Gruschka, N. (ed.) Secure IT Systems. NordSec 2018. Lecture Notes in Computer Science, vol. 11252. Cham: Springer, Available at: https://doi.org/10.1007/978-3-030-03638-6_23 (Accessed: 10 March 2025).

Roy, S., Panaousis, E., Noakes, C., Laszka, A., Panda, S., and Loukas, G. (2023) ‘SoK: The MITRE ATT&CK Framework in Research and Practice’. arXiv preprint.

Ahmed, M. G., Panda, S., Xenakis, C., & Panaousis, E. (2022). MITRE ATT&CK-driven cyber risk assessment. In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022) (pp. 1–10). ACM. https://doi.org/10.1145/3538969.3544420

Kwon, R., Ashley, T., Castleberry, J., McKenzie, P., & Gupta, S. N. (2023). Cyber Threat Dictionary using MITRE ATT&CK Matrix and NIST Cybersecurity Framework Mapping. Pacific Northwest National Laboratory. https://doi.org/10.1109/TBD.2023.1000000

Datta, P.M. and Acton, T., 2023. Did a USB drive disrupt a nuclear program? A Defense in Depth (DiD) teaching case. Journal of Information Technology Teaching Cases, 0(0), pp.1–11. Available at: https://doi.org/10.1177/20438869231200284

Datta, P.M. and Acton, T., 2024. Ransomware and Costa Rica’s national emergency: A defense framework and teaching case. Journal of Information Technology Teaching Cases, 14(1), pp.56–67. Available at: https://doi.org/10.1177/20438869221149042

Bednarski, L., Roscoe, S., Blome, C. and Schleper, M.C., 2025. Geopolitical disruptions in global supply chains: a state-of-the-art literature review. Production Planning & Control, 36(4), pp.536–562. Available at: https://doi.org/10.1080/09537287.2023.2286283

Akinsuli, O., 2024. AI-powered supply chain attacks: A growing cybersecurity threat. IRE Journals, 8(3), p.696. Available at: https://irejournals.com/paper-details/1706490

Olaiya, O.P., Adesoga, T.O., Pieterson, K., Obani, O.Q., Adebayo, J.O. and Ajayi, O.O., 2024. RegTech solutions: Enhancing compliance and risk management in the financial industry. GSC Advanced Research and Reviews, 20(2), pp.8–15. Available at: https://doi.org/10.30574/gscarr.2024.20.2.0295

Wang, J., Neil, M. and Fenton, N., 2019. A Bayesian network approach for cybersecurity risk assessment: Implementing and extending the FAIR model. Computers & Security, [online] Available at: https://doi.org/10.1016/j.cose.2019.101659

Khan, W., 2023. Improving incident response times through efficient Security Operations Center (SOC) management: Techniques to reduce the mean time to detect and respond (MTTD/MTTR). International Journal of Core Engineering & Management, 7(6), p.115 https://ijcem.in/wp-content/uploads/IMPROVING-INCIDENT-RESPONSE-TIMES-THROUGH-EFFICIENT-SECURITY-OPERATIONS-CENTER-SOC-MANAGEMENT-TECHNIQUES-TO-REDUCE-THE-MEAN-TIME-TO-DETECT-AND-RESPOND.pdf

European Dental Group, 2022. Cyber Security Policy. [pdf] European Dental Group. Available at: https://www.europeandentalgroup.eu/wp-content/uploads/2022/05/20211208-cyber-security-policy-def.pdf

Licence

Icon for the Creative Commons Attribution 4.0 International License

Perspectives on Cybersecurity Risk Management Vol 1 Copyright © 2025 by MSc Cybersecurity Risk Management Class of 2025 is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.