{"id":33985,"date":"2020-03-23T16:00:19","date_gmt":"2020-03-23T16:00:19","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90771"},"modified":"2020-03-23T16:00:19","modified_gmt":"2020-03-23T16:00:19","slug":"defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/","title":{"rendered":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software"},"content":{"rendered":"<p>Artificial intelligence (AI) and connected devices have fueled digital transformation in the utilities industry. These technological advances promise to reduce costs and increase the efficiency of energy generation, transmission, and distribution. They\u2019ve also created new vulnerabilities. Cybercriminals, nation state actors, and hackers have demonstrated that they are capable of attacking a nation\u2019s power grid through internet-connected devices. As utilities and their suppliers race to modernize our infrastructure, it\u2019s critical that cybersecurity measures are prioritized.<\/p>\n<p>In <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/18\/defending-the-power-grid-against-supply-chain-attacks-part-1-the-risk-defined\/\" target=\"_blank\" rel=\"noopener noreferrer\">the first blog in the \u201cDefending the power grid against cyberattacks<\/a>\u201d series, I walked through how the accelerated adoption of the Internet of Things (IoT) puts utilities and citizens at risk of attack from nation state actors. In this post, I\u2019ll provide guidance for how utilities manufacturers can better protect the connected devices that are deployed in the energy industry.<\/p>\n<h3>Protect identities<\/h3>\n<p>If your organization supplies the energy industry, you may be targeted by adversaries who want to disrupt the power supply. One way they will try to access your company resources is by stealing or guessing user credentials with tactics like password spray or phishing. According to Verizon\u2019s 2019 Data Breach Investigations Report, 80 percent of breaches are the result of weak or compromised passwords. Attackers target multiple people at a time, but they only need to succeed once to gain access.<\/p>\n<p>Securing your company starts with safeguarding your identities. At the bare minimum, you should apply multi-factor authentication (MFA) to your administrative accounts. A better option is to require all users to authenticate using MFA. MFA requires that users sign in with more than just a password. The second form of authentication can be a one-time code from a mobile device, biometrics, or a secure FIDO2 key, among other options. MFA reduces your risk significantly because it\u2019s much harder for an attacker to compromise two or more authentication factors.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-1.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90772 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-1.png\" alt width=\"884\" height=\"359\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-1.png 884w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-1-300x122.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-1-768x312.png 768w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\"><\/a><\/p>\n<p><em>Figure 1: You can use Conditional Access policies to define when someone is promoted to sign in with MFA.<\/em><\/p>\n<h3>Secure privileged access<\/h3>\n<p>In a supply chain attack, adversaries attack your organization to gain access to data and applications that will allow them to tamper with your product or service before it reaches its intended destination. Bad actors want to infiltrate your build environment or the servers that you use to push software updates. To accomplish this, they often target administrator accounts. <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/securing-privileged-access\/securing-privileged-access\" target=\"_blank\" rel=\"noopener noreferrer\">Securing your administrative accounts<\/a> is critical to protect your company resources. Here are a few steps you can take to safeguard these accounts:<\/p>\n<ul>\n<li>Separate administrative accounts from the accounts that IT professionals use to conduct routine business. While administrators are answering emails or conducting other productivity tasks, they may be targeted by a phishing campaign. You don\u2019t want them signed into a privileged account when this happens.<\/li>\n<li>Apply just-in-time privileges to you administrator accounts. Just-in-time privileges require that administrators only sign into a privileged account when they need to perform a specific administrative task. These sign-ins go through an approval process and have a time limit. This will reduce the possibility that someone is unnecessarily signed into an administrative account.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-2.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90773 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-2.jpg\" alt width=\"793\" height=\"220\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-2.jpg 793w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-2-300x83.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-2-768x213.jpg 768w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\"><\/a><\/p>\n<p><em>Figure 2: A \u201cblue\u201d path depicts how a standard user account is used for non-privileged access to resources like email and web browsing and day-to-day work. A \u201cred\u201d path shows how privileged access occurs on a hardened device to reduce the risk of phishing and other web and email attacks.<\/em><\/p>\n<ul>\n<li>Set up <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/securing-privileged-access\/privileged-access-workstations#paw-phased-implementation\" target=\"_blank\" rel=\"noopener noreferrer\">privileged access workstations<\/a> for administrative work. A privileged access workstation provides a dedicated operating system with the strongest security controls for sensitive tasks. This protects these activities and accounts from the internet. To encourage administrators to follow security practices, make sure they have easy access to a standard workstation for other more routine tasks.<\/li>\n<\/ul>\n<h3>Safeguard your build and update environment<\/h3>\n<p>Bad actors don\u2019t just target user accounts. They also exploit vulnerabilities in software. Many attacks take advantage of known vulnerabilities for which there are available patches. Keep software and operating systems up-to-date and patched to reduce your risk. Retire any technology that is no longer supported by the publisher and <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secauthz\/mandatory-integrity-control\" target=\"_blank\" rel=\"noopener noreferrer\">implement mandatory integrity controls<\/a> to ensure only trusted tools run.<\/p>\n<p>You also need to protect the software that your team writes. A proven and robust Secure Development Lifecycle (SDL) will guide your developers to build software that includes fewer vulnerabilities. <a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s SDL includes 12 practices<\/a>. For example, Microsoft SDL recommends that security and privacy requirements be defined at the beginning of every project. The guidelines also provide tips for managing the security risk of third-party software, performing threat modeling, and penetration testing, among other recommendations. By building security into the entire software process, the software you release will be more secure and less vulnerable to attack.<\/p>\n<h3>Assume breach<\/h3>\n<p>My recommendations will reduce your risk, but they won\u2019t eliminate it entirely. To protect your company and customers, you\u2019ll need to adopt an assume breach mindset. It\u2019s not a matter of <em>if<\/em> you\u2019ll be breached but <em>when<\/em>. Once you\u2019ve accepted that you can\u2019t prevent all attacks, put processes and tools in place that enable you to detect and respond to an incident as quickly as possible.<\/p>\n<p>Endpoint detection and response solutions, like <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Threat Protection<\/a>, leverage AI to automate detection and response and correlate threats across domains. When incidents are detected, you will need an appropriate response. The <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology (NIST) provides an incident response guide<\/a>. You can also learn from <a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/07\/01\/inside-the-msrc-building-your-own-security-incident-response-process\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s Security Response Center (MSRC)<\/a>, which shared how it developed an incident response plan.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90774 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3.png\" alt width=\"735\" height=\"413\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3.png 735w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/03\/Supply-chain-attacks-part-2-image-3-539x303.png 539w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\"><\/a><\/p>\n<p><em>Figure 3: An overview of an incident in Microsoft Threat Protection.<\/em><\/p>\n<p>A good communication plan is an important component of a response plan. You will need to let customers know there was an incident and how you plan to address it. As the MSRC notes, \u201cClear, accurate communication builds confidence in the incident response process, maintains trust with customers, protects your brand, and is essential for fast effective response.\u201d<\/p>\n<h3>Centralized IoT device management<\/h3>\n<p>In addition to operating a number of generation plants, utilities operate a network of thousands of substations and hundreds of thousands of miles of transmission and distribution lines. This requires them to deploy a large number of IoT devices to safely and efficiently deliver electricity to their customers. To effectively manage this network of IoT devices, suppliers should provide their customers with centralized IoT device management to update firmware, install security updates, and manage accounts and passwords.<\/p>\n<h3>Build trust<\/h3>\n<p>Protecting critical infrastructure from a destabilizing attack will require collaboration among utilities and suppliers in the industry. Device manufacturers and software publishers have a vital role to play in protecting critical infrastructure. By instituting and maintaining the security practices that I\u2019ve recommended, you can dramatically reduce the risk to your organization and to the power grid.<\/p>\n<p>Stay tuned for the final post in this series, \u201cPart 3: Risk management strategies for the utilities industry,\u201d where I\u2019ll provide recommendations specifically for utilities.<\/p>\n<p>Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/23\/defending-power-grid-against-supply-chain-attacks-part-2-securing-hardware-software\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.<br \/>\nThe post Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33986,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[2564,6696,77,6578],"class_list":["post-33985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity-policy","tag-identity-and-access-management","tag-iot","tag-threat-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-23T16:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png\" \/>\n\t<meta property=\"og:image:width\" content=\"884\" \/>\n\t<meta property=\"og:image:height\" content=\"359\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software\",\"datePublished\":\"2020-03-23T16:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/\"},\"wordCount\":1197,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png\",\"keywords\":[\"Cybersecurity Policy\",\"Identity and access management\",\"IoT\",\"Threat protection\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/\",\"name\":\"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png\",\"datePublished\":\"2020-03-23T16:00:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png\",\"width\":884,\"height\":359},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Policy\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity-policy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/","og_locale":"en_US","og_type":"article","og_title":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-23T16:00:19+00:00","og_image":[{"width":884,"height":359,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software","datePublished":"2020-03-23T16:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/"},"wordCount":1197,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png","keywords":["Cybersecurity Policy","Identity and access management","IoT","Threat protection"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/","url":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/","name":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png","datePublished":"2020-03-23T16:00:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software.png","width":884,"height":359},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/defending-the-power-grid-against-supply-chain-attacks-part-2-securing-hardware-and-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Policy","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity-policy\/"},{"@type":"ListItem","position":3,"name":"Defending the power grid against supply chain attacks\u2014Part 2: Securing hardware and software"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33985"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33986"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}