Some important concepts
A supply chain attack is when a bad actor attacks one of your suppliers as a means to then attack you. They know that there is a trust relationship between you and your supplier and that if they can compromise your supplier in some way, then they can abuse that trust. This could be by inserting malware into a software update for a product you have purchased.
When we talk about access control, we’re referring to the three As – authentication, authorization, and accounting. There are a number of different access control models but I won’t go into detail here; mandatory access control (MAC), discretionary access control (DAC), role-based access control (RBAC), and attribute-based access control (ABAC) are just a few of them.
Access control lists (ACLs) define what users, groups, or roles have sufficient access permissions to be able to read or write to a file, for example.
We’ll also talk about multifactor authentication (MFA...