{"id":9822,"date":"2017-12-06T12:00:00","date_gmt":"2017-12-06T19:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/supply-chain-security\/"},"modified":"2026-03-20T01:10:51","modified_gmt":"2026-03-20T07:10:51","slug":"%ea%b3%b5%ea%b8%89%eb%a7%9d-%eb%b3%b4%ec%95%88","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/","title":{"rendered":"\uacf5\uae09\ub9dd \ubcf4\uc548"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Overhead view of a complex computer motherboard showing the CPU socket, RAM slots, and various electronic components.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-12-06T12:00:00-07:00\">12\uc6d4 6, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Supply chain security<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Supply%20chain%20security').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsupply-chain-security%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Supply%20chain%20security&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsupply-chain-security%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsupply-chain-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsupply-chain-security%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>Organizations are constantly monitoring, detecting and trying to respond to alerts and potential threats to their environment from a broad number of sources. One source in particular that can be a bit elusive, and is much less discussed, is supply chain security. Organizations spend a lot of time trying to understand when unauthorized devices are added to their networks, and then how they are secured and monitored. As a general rule, we are not rigorously inspecting and analyzing the devices we receive from our trusted suppliers, which is understandable since the skills and tools to inspect these devices are not those of your typical security practitioner.<\/p>\n<h3>How the federal government secures supply chains<\/h3>\n<p>Suppliers themselves do spend a lot of time and effort understanding and securing their supply chains, and the government has rigorous programs, including <a href=\"https:\/\/www.dhs.gov\/national-strategy-global-supply-chain-security\" target=\"_blank\" rel=\"noreferrer noopener\">DHS\u2019s strategy<\/a> and DARPA SHIELD. However, when you look beyond suppliers and the federal government, there appears to be a fairly significant drop off regarding capability and focus. As hardware consumers, we assume that the sources we\u2019re buying from are trustworthy, and that the security of those devices is included in the cost of the hardware. But by making that assumption, we open ourselves up to, or at least disregard, a potential risk.<\/p>\n<h3>Potential threats in the supply chain are common<\/h3>\n<p>I\u2019m not going to jump into a \u201cthe sky is falling and all your hardware is compromised\u201d diatribe, but as you consider all the potential risks to your organization, it is good to keep potential threats in your supply chain on your radar. And it\u2019s not like these risks are unprecedented. There are examples of vendors shipping new and refurbished hardware with spyware, as in the cases of <a href=\"https:\/\/thehackernews.com\/2015\/09\/lenovo-laptop-virus.html\" target=\"_blank\" rel=\"noreferrer noopener\">Lenovo pre-installing spyware on its laptops<\/a> and <a href=\"https:\/\/www.infoworld.com\/article\/2625629\/malware\/dell-warns-of-malware-on-server-motherboards.html\" target=\"_blank\" rel=\"noreferrer noopener\">Dell warning of malware of server motherboards<\/a>. There is also <a href=\"http:\/\/www.toucan-system.com\/research\/blackhat2012_brossard_hardware_backdooring.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">proof of concept software that has been built<\/a> that, at the time of release, could be leveraged on over 100 different motherboards. And every year at <a href=\"https:\/\/www.defcon.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Defcon<\/a>, along with beard, beer cooling and car hacking contests, there is also a contest to specifically access anti-tamper (tamper evident) equipment and its packaging. This is not purely FUD (fear, uncertainty and doubt).<\/p>\n<h3>How to secure the supply chain<\/h3>\n<p>So, what can you do about it? Obviously researching how your suppliers protect their supply chain and holding them accountable is a good start, but that doesn\u2019t help after the fact. As a rule, you should be cautious about refurbished equipment, especially when it is not coming directly from the OEM supplier. But if a device is compromised, regardless if it\u2019s done using hardware, malware or something else, there will be some form of communication with an external source in order for these capabilities to exfiltration data or remotely execute actions. Protecting your network comes down to standard security operations and monitoring of network communications that occurs in the enterprise from the endpoint to the perimeter.<\/p>\n<h3>Challenges to supply chain security<\/h3>\n<p>However, there are two challenges with this approach. First, if your affected asset is a laptop or mobile device, there is the opportunity to leverage open Wi-Fi (as described by <a href=\"http:\/\/www.toucan-system.com\/research\/blackhat2012_brossard_hardware_backdooring.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Jonathan Brossard in the previously cited whitepaper<\/a>), which you can\u2019t monitor. And your fixed infrastructure can also compromise your broader network as well. For example, a compromised server with restricted internet access may still be able to access your guest Wi-Fi to connect to an external site and download a malicious set of command and control instructions.<\/p>\n<p>The second problem is the common issue of having way too much to monitor. How do you sift through all the traffic that is originating from internal sources? Although whitelisting and user agent strings are great ways to ensure that network traffic is only going to authorized locations, they don\u2019t always enable you to identify the issue. Being able to detect an unusually large quantity of user agent failures or failed web requests might be one of your best methods to identify this type of communications, but because of the sheer volume of events, this is frequently infeasible.<\/p>\n<h3>How security automation enables supply chain security<\/h3>\n<p>This is where <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> can be your friend, by helping you model the identification of false positives, benign and ultimately malicious communication attempts at machine speeds. One thing you can do is be proactive about investigating network sessions that are going to new or unknown destinations and automatically notifying (via Slack, email, ticket, etc.) your security team. And if you\u2019re having difficulty doing the investigation on the destinations address (IP\/URL\/domain), you can use automation to leverage investigations resources, like WhoIS, Domain, ASN, GeoIP, or <a href=\"https:\/\/swimlane.com\/blog\/threat-intelligence-tools\/\">threat intelligence information<\/a>. These can be leveraged to automatically identify potentially malicious destination addresses and make the process of triaging massive amounts of network sessions more manageable.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-6a06dc27a32e1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/security-orchestration\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 16, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security Orchestration | What is Security Orchestration?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-6a06dc27a44d0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/swimlane-launch-press-release\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 21, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>No security alert left behind: Swimlane launches automated security operations management platform<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-6a06dc27a5ef1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/security-consolidation-vs-security-orchestration\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\uc6d4 9, 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security consolidation vs. security orchestration<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9823,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9822","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Supply chain security<\/title>\n<meta name=\"description\" content=\"Although companies constantly monitor and respond to security threats from many different sources, supply chain security is one that needs to be addressed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uacf5\uae09\ub9dd-\ubcf4\uc548\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply chain security\" \/>\n<meta property=\"og:description\" content=\"Although companies constantly monitor and respond to security threats from many different sources, supply chain security is one that needs to be addressed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uacf5\uae09\ub9dd-\ubcf4\uc548\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-20T07:10:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/\",\"name\":\"Supply chain security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/12.06.17-Supply-Chain-Computers.png\",\"datePublished\":\"2017-12-06T19:00:00+00:00\",\"dateModified\":\"2026-03-20T07:10:51+00:00\",\"description\":\"Although companies constantly monitor and respond to security threats from many different sources, supply chain security is one that needs to be addressed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/12.06.17-Supply-Chain-Computers.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/12.06.17-Supply-Chain-Computers.png\",\"width\":1120,\"height\":696,\"caption\":\"Overhead view of a complex computer motherboard showing the CPU socket, RAM slots, and various electronic components.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/supply-chain-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply chain security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uacf5\uae09\ub9dd \ubcf4\uc548","description":"\uae30\uc5c5\ub4e4\uc740 \ub2e4\uc591\ud55c \ucd9c\ucc98\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \uc704\ud611\uc744 \ub04a\uc784\uc5c6\uc774 \uac10\uc2dc\ud558\uace0 \ub300\uc751\ud558\uc9c0\ub9cc, \uacf5\uae09\ub9dd \ubcf4\uc548\uc740 \ud2b9\ud788 \uc911\uc810\uc801\uc73c\ub85c \ub2e4\ub904\uc57c \ud560 \ubb38\uc81c\uc785\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uacf5\uae09\ub9dd-\ubcf4\uc548\/","og_locale":"ko_KR","og_type":"article","og_title":"Supply chain security","og_description":"Although companies constantly monitor and respond to security threats from many different sources, supply chain security is one that needs to be addressed.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uacf5\uae09\ub9dd-\ubcf4\uc548\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-20T07:10:51+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/","url":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/","name":"\uacf5\uae09\ub9dd \ubcf4\uc548","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers.png","datePublished":"2017-12-06T19:00:00+00:00","dateModified":"2026-03-20T07:10:51+00:00","description":"\uae30\uc5c5\ub4e4\uc740 \ub2e4\uc591\ud55c \ucd9c\ucc98\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ubcf4\uc548 \uc704\ud611\uc744 \ub04a\uc784\uc5c6\uc774 \uac10\uc2dc\ud558\uace0 \ub300\uc751\ud558\uc9c0\ub9cc, \uacf5\uae09\ub9dd \ubcf4\uc548\uc740 \ud2b9\ud788 \uc911\uc810\uc801\uc73c\ub85c \ub2e4\ub904\uc57c \ud560 \ubb38\uc81c\uc785\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/12.06.17-Supply-Chain-Computers.png","width":1120,"height":696,"caption":"Overhead view of a complex computer motherboard showing the CPU socket, RAM slots, and various electronic components."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/supply-chain-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Supply chain security"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9822\/revisions"}],"predecessor-version":[{"id":55066,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9822\/revisions\/55066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9823"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9822"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9822"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9822"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9822"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9822"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}