Supply Chain Threats

Supply Chain Risk Management

20200925 Supply Chain article


NCSC works with its partners to assess and mitigate the activities of foreign intelligence entities and other adversaries who attempt to compromise the supply chains of our government and industry. These adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and information used every day by the government, businesses, and individuals. The cost to our nation comes not only in lost innovation, jobs, and economic advantage, but also in reduced U.S. military strength.





Executive Orders


Supply Chain Risk Management – Authorities, Policies, and


  • Executive Order 13806 report (PDF)
  • Executive Order 14017 – America’s Supply Chains (PDF)
  • SECURE Technology Act: Establishment of the Federal Acquisition Security Council

          -  Federal Acquisition Security Council overview (PDF)

          -  Federal Acquisition Supply Chain Security Act graphic (PDF)

          -  H.R.7327 SECURE Technology Act (PDF)

   -  (New) FASC Final Rule (PDF)


National Supply Chain Integrity Month – A Call to Action

Supply Chain Risk Management: Reducing Threats to Key U.S. Supply Chains


Sector-Specific Supply Chain Best Practices




Supply Chain Risk Management (SCRM) – Don’t Be the Weakest



Thought Leaders: Supply Chain Security



5G Wireless Technology


Supply Chain Resources


Additional Resources

National Counterintelligence and Security Center