Microsoft, Intel and Goldman Sachs will lead a new work group focusing on supply chain security at the Trusted Computing Group (TCG).
TCG is a non-profit organization that develops, defines and promotes open and vendor-neutral industry specifications and standards for trusted computing platforms, including the widely used Trusted Platform Module (TPM).
TCG has several work groups, including for cloud, embedded systems, infrastructure, IoT, mobile, PC clients, servers, software stack, storage, trusted network communications, TPM, and virtualized platforms.
The organization this week announced a new work group focusing on supply chain security. Representatives of Microsoft, Intel and Goldman Sachs will lead the new group, which will work on developing guidance for supply chain security standards.
The new group has two main objectives: provisioning (ensuring that devices are genuine) and recovery (helping organizations recover after a cyberattack). TCG noted that while solutions can be costly in the short-term, organizations will pay less for them compared to the costs resulting from a cyberattack that brings down the entire supply chain.
“The hardware supply chain is difficult to secure due to the number of stages, organizations, and individuals involved and current security methods are mostly subjective and require human intervention,” TCG said. “As malicious and counterfeit hardware is extremely difficult to identify, most organizations do not have access to the tools, knowledge, or expertise to successfully detect it. With guidance from the Supply Chain Security work group, those in the supply chain will be better equipped to protect against cyber threats.”
Several high-impact supply chain attacks came to light over the past year, including ones involving SolarWinds, Codecov, and Kaseya.
Related: Intel Announces Compute Lifecycle Assurance to Protect Platform Supply Chains
Related: Library Dependencies and the Open Source Supply Chain Nightmare
Related: Google Intros SLSA Framework to Enforce Supply Chain Integrity
Related: Huawei and Supply Chain Security – The Great Geopolitical Debate

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
