Understanding and Managing Supply Chain Cyber Risk
- Emerging Risks Global
- Oct 29
- 15 min read

Security Risk Management Approach
The Risk Management Standard produced by the Institute of Risk Management (2002) states that risk can be “defined as the combination of the probability of an event and its consequences”. In a similar description, risk has been described in BS ISO 31000: 2018, 3.1 as the “effect of uncertainty on objectives”, with Sutton (2014) emphasising its importance in considering the confidentiality, integrity and availability of business information and information management infrastructure. The importance of risk management is further reflected by the suite of standards which have been developed to guide practitioners how best to produce risk management strategies, policies and procedures, to support organisations to effectively identify and mitigate risks. With cyber risk identified as being high likely and impactful for organisations (World Economic Forum, 2016), standards and guidance documents have been produced to support organisations to identify and mitigate cyber risks.
Cyber risk is viewed to be the result of the interaction between people, technology and process (Perwej et al., 2021). Although it should be recognised that the research is dated, Reason (1995) in particular identifies the importance of human factors, when considering risk. This is supported by more recent research which has stressed the important role of human behaviour in cyber risk and security (Henshel et al., 2015; Young et al., 2018). Recognising the importance of all areas, this report will consider risk holistically, considering people, technical controls and processes, using ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection - Guidance on managing information security risks, as a guide. This standard was designed in response to the requirement outlined in ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection - Information security management systems – Requirements, to identify, analyse and evaluate weaknesses in information security processes.
ISO 27005 helps organisations to address information security risks through providing guidance on information security risk processes and cycles, and has been adopted as an exemplar of cyber risk management by the National Cyber Security Centre (NCSC, n. d. a). Component driven risk assessments such as ISO 27005 have been described by the NCSC as a mature approach for assessing cyber risk (NCSC, n. d. b). This bottom-up approach describes the risks to a systems components, which includes hardware, software, personally identifiable information (PII), business critical information and people. This approach considers the likelihood that individual components will be compromised by threats, as well as the resulting impact. Through adopting this approach, an organisation can prioritise risks and the required mitigations, according to the business impact that a successful attack or compromise could result in. Another approach, which organisations may wish to consider in the future, is a system driven risk assessment process. This focuses upon whole systems, rather than individual components (NCSC, n. d. c). This top-down approach may also be viewed to be holistic, in considering the relationship between systems, people, processes and the technologies that they use. Such an approach considers the high-level purpose which a system exists for, but crucially also considers the potential 'losses' which could occur during the course of operations (NCSC, n. d. c). Considering this area early in a project or activity can support organisations to be Secure by Design (Argyropoulos, Mouratidis & Fish, 2020).
The successful adoption of such a proactive method for managing risk and an organisation’s ability to implement controls will be influenced by its culture. Zainudin, Samad and Altounjy (2019) suggest that a shared set of values, resulting in a risk aware culture can encourage this. In such an environment, members of a workforce develop knowledge about the risks they face. While a risk averse culture may be viewed by some to hinder innovation, Secure by Design practices and effective risk management can reduce the risk of the long-term costs associated with retrofit security. Effective risk education can encourage the development of both an appropriate culture and risk management system (Zainudin, Samad & Altounjy, 2019). For the purpose of this report, which focuses on Supply Chain Risks, a component-based approach will be adopted, which would start by identifying and defining the tangible and intangible assets being assessed. This can include dependencies which an organisation may not have any control over, such as components within Third-Party infrastructure and systems. In accordance with ISO 27005 (2022) and 31000: Risk Management (2018), this approach to risk assessments quantifies risk, through the analysis of the risk elements of threat likelihood and impact.
The likelihood of being attacked by human threat actors can be assessed through an analysis of a threat actors’ capability, intent, motivation, opportunity and belief that they will get away with an action (NCSC, n. d. d). The NCSC (n. d. d) has identified the difficulty in accurately calculating these factors, given their transient nature. To counter this limitation, it is important that organisations regularly updates its threat assessments through gathering reliable information from the national authorities, the National Cyber Security Centre and the National Protective Security Authority. This information can be used to support a vulnerability assessment, which identifies vulnerabilities in components that a threat actor may exploit to impact upon the confidentiality, integrity, and availability of information.
The adoption of ISO 27005 is supported by Pan and Tomlinson (2016). Although dated in 2016 and therefore focused on an early version of the standard (2011), the author’s praise ISO 27005 for providing readers with clear definitions for the different stages of a risk assessment process. While this may improve the ability of practitioners to adopt the process, the authors identify a potential weakness in the standard, suggesting that the 2011 standard paper fails to provide readers with detailed guidance on how best to collect and manage information, which is an integral part of information security risk management. This limitation may be overcome by following the NCSC’s (n. d. e) suggestion to use tools and processes including attack trees, threat modelling exercises, and scenario planning, to help to identify threats, vulnerabilities and impacts. Supporting the chosen component driven risk assessments, adopted for the present report, the NCSC includes the ISO 27005: Information security, cybersecurity and privacy protection — Guidance on managing information security risks (2022) in the list of approaches it suggests organisations can adopt, to perform cyber risk assessments (NCSC, n. d. b). Aligned with the national authorities’ advice, the approach can be selected, although organisations should consider the NCSC’s observation that the standard may require for the organisation to employ individual’s specialist training, needed to effectively implement the requirements identified in a report (NCSC, n. d. b).
An alternative approach to managing information risk has been developed by the National Institute for Standards and Technology (NIST). NIST 800-39, Managing Information Security Risk, provides “guidance for an integrated, organisation-wide program for managing information security risk to organisational operations” (NIST, 2011, p. 3). Alongside this, 800-30 (2012) provides detailed guidance on conducting risk assessments of federal information systems and organisations. Complementing the adoption of ISO 27005, research has suggested that when used alongside the standard, NIST SP 800-30 can be used to improve the level of detail included in a risk assessment, with the semi-quantitative nature of NIST SP 800-30, supporting the qualitative nature of ISO 27005. In addition to following the guidelines provided by ISO 27005, this report also incorporates the guidance provided by NIST, through performing the risk assessment in accordance with the recommendations of Al Fikri et al. (2019). The assessment followed the order outlined in Figure 1. (Appendix A.).
Cyber Risk Landscape
Following the global outages to Microsoft devices which resulted from CrowdStrike’s failed patch in July 2024, concerns have been raised about the possibility of organisations falling victim to a similar incident. Aligned to the report focus upon Supply Chain Risks, it would be appropriate to consider the CrowdStrike incident, which took place on the 18th of July, 2024, when a software update released by CrowdStrike to its Falcon Sensor security software resulted in widespread disruption to computers running Microsoft Windows operating systems (CrowdStrike, 2024).
Microsoft reported that approximately 8.5 million systems were unable to restart, as a result of the update. A root cause analysis of the incident completed by CrowdStrike states that review findings from two independent Third-Party software security vendors would be considered, but the initial findings suggest that the system crash was caused when a Rapid Response Content update delivered 21 input fields, rather than the expected 20 (CrowdStrike, 2024). The organisation suggests that this out-of-bounds memory read issue and the lack of a test to determine non-wildcard matching criteria in the 21st field, caused systems to crash. Parametrix estimates that the direct losses resulting from the crash are expected to reach $5.4B for Fortune 500 companies (Parametrix, 2024). Recognising the global impacts experienced by organisations who engaged with CrowdStrike as a Third-Party supplier, this report has been produced to assess the cyber risks posed to organisations including its reliance upon a wide chain of Third-Party digital suppliers. Recognising that this risk has not been considered previously, adopting ISO 27005: 2022 and NIST 800-30, this paper will critically assess the level of risk faced by organisations and provide recommendations on how to mitigate these. In the absence of the results of a self-assessment or an external audit of the systems and components present within Third-Party suppliers, a high-level assessment will be presented at this stage
Cyber Risk Assessment Summary
Having recognised the importance of risk management for the successful delivery of services by organisations, it is imperative that organisations effectively identify and manage its cyber risks, so as to protect the organisations information assets and reputation. Two key cyber risks have been identified. As outlined in Appendix B, the risk of ineffective information security management systems being present within an organisations’ Third-Party supplier network was assessed as being HIGH. This is a result of a HIGH likelihood that Third-Parties and organisation’s will experience a cyber-attack (Department for Science, Innovation & Technology, 2024) and the HIGH Impact resulting from the disclosure of information, the unauthorised modification of information, the unauthorised destruction of information, or the loss of information or information system availability (National Institute of Standards and Technology, 2010).
Although cognisant of the view of Lee (2021) that improving an ISMS might not be enough to protect organisations from the rapidly evolving threat landscape, which may span cloud environments, it is recommended that as a minimum, Third-Parties adopt the controls outlined in Cyber Essentials: Requirements for IT infrastructure v3.1 (National Cyber Security Centre, 2023). The second identified risk of inadvertent errors by the employees of Third-Party suppliers (Appendix C.) was also assessed to be HIGH. This assessment is the result of a HIGH likelihood of attacks targeting people (Greitzer et al., 2014), which could result in a HIGH impact. Alongside the Cyber Essentials controls (National Cyber Security Centre, 2023), it is recommended that Third-Party suppliers follow the NCSC guidance (2022), ‘Reducing data exfiltration by malicious insiders, as well adopt data loss prevention, always on vetting protocols, zero-trust policies, phishing tests, user-behaviour analytics and decoy tools.
Report Summary
Cyber risks, both within organisations information system and that of its supply chain, may result in serious impacts upon the organisations reputation, consumer confidence and threaten the continuity of the business (Brockett, Golden & Wolden, 2012). This report has identified two key risks and suggested risk treatment recommendations. The effective mitigation of these risks is potentially required for organisations to meet the expectation of existing and approaching legislation, as illustrated in Figure 2 (Appendix D). Following the global outages to Microsoft devices which resulted from CrowdStrike’s failed patch in July 2024, concerns have been raised about the possibility of organisations falling victim to a similar incident.
Appendix A.
Figure 1.

Integrated Methodology
(Putra & Soewito, 2023)
Appendix B.
Ineffective Information Security Management Systems within Third-Party Supplier Network
Appendix C.
Inadvertent Errors by the Employees of Third-Party Suppliers.
Appendix D.
Figure 2.
UK Cyber Security Legislation.

