Supply Chain draft

Control over software supply chain, dependencies, and third-party components

L0 Unaware

No visibility into software dependencies or third-party components; no SBOM exists and supply chain risks are unquantified

Criteria

  • SUPPLY-L0-C1 The organisation has no Software Bill of Materials (SBOM) and cannot enumerate its third-party dependencies
  • SUPPLY-L0-C2 Dependencies are pulled directly from public registries at build time with no pinning, verification, or caching

Indicators

  • Developers install packages from public registries without reviewing licenses, maintainers, or known vulnerabilities
  • No process exists to evaluate the trustworthiness of new dependencies before adoption

Upgrade path

Implement basic dependency tracking by generating SBOMs for all production applications. Introduce dependency pinning and begin scanning for known vulnerabilities in third-party packages.

Risk if stagnant

Without supply chain visibility, the organisation is exposed to dependency confusion attacks, compromised upstream packages, and undisclosed vulnerabilities. A single poisoned dependency can compromise the entire production environment.