Risk_description
Attacking Upstream Members of IT Supply Chain to introduce malign code to Software Products
Approaches/measures (Type)
Approach_measure_description
Proactive: Introduce stricter network rules
Reactive: Monitoring network activities of software product