Follow us

Protecting against supply chain attacks: how Continuous Controls Monitoring can provide assurance

Increasingly, businesses have two supply chains. There’s the familiar physical supply chain, along which physical goods flow—and then, in parallel, there’s an information supply chain, along which data flows.

But not always just data. Because connecting a business’s IT systems to those of its customers and suppliers can expose the business to threats, as well.

And as direct connections between buyers and sellers become more commonplace—supplanting connections traditionally made through intermediaries such as e-marketplaces and Electronic Data Interchange providers—the risk of being exposed to threats through supply chain connectivity is increasing.

No way back

The danger is very real. As recently as December 2021, for instance, retailer Sainsbury’s lost a week’s worth of payroll data, when its payroll processor Kronos was hit by a ransomware attack. American supermarket chain Wholefoods, and carmaker Honda North America were similarly affected by the same attack.

In short, seriously disturbing and potentially terminal for businesses linked to the IT systems of suppliers.

What to do? How can supply chain connectivity be made more secure? Because make no mistake, cutting back on supply chain connectivity isn’t an option: supply chain connectivity eliminates paper, increases efficiencies, provides instant insight into the whereabouts of orders and physical goods, accelerates supply chains, and helps to eliminate surplus inventory.

No one wants to go back to purchase orders sent through the mail, or hark back to the days of often-illegible fax transmissions which required typing into IT systems on receipt.

Technology-led assurance

The good news is that there is a way to increase the security of supply chain connectivity. A way delivered by the arrival of a new, technology-led approach to IT security, known as Continuous Controls Monitoring.

Deployed within an organisation, Continuous Controls Monitoring gathers—continuously, and in real time—all the data and evidence required in order to audit IT security, by continually monitoring all of the organisation’s risk management systems and internal controls, via automated telemetry.

It’s fast, it’s efficient, and it’s a far more robust approach to IT security than—say—questionnaire-based approaches focusing on qualitative data. If a part of the IT security apparatus isn’t activated, or isn’t operating within specified parameters, then Continuous Controls Monitoring finds it and reports it. In real time.

But here’s the interesting thing: it doesn’t have to be restricted to use-cases inside the organisation. Because it’s a technology-led approach, it can piggyback on supply chain connections in order to assess the status of the IT security apparatus at the other end of the connection. Suppliers’ IT security status, in other words.

An easy sell to the supply base

Would a business’s trading partners agree to such a thing?

Well, let’s turn that question on its head. Why would they not agree to such a thing?

Remember, the right to audit and assess suppliers’ IT security is written into many supply contracts.

If Continuous Controls Monitoring provides suppliers with a clean bill of health, then those suppliers receive a useful confirmation of the status of their IT security. And receive it without the disruption and inconvenience of a real, in-person audit.

And if Continuous Controls Monitoring doesn’t deliver a clean bill of health, then for the supplier in question, that’s vitally important information—for which they should be grateful.

Of course, if suppliers don’t agree to an audit but remain a critical supplier, at the very least the greater appreciation of the risk that they pose means the company can manage that risk with accurate facts and figures in order to make an informed risk‑based decision on the next steps. They could for example add in a layer of additional control, such as two-factor identification so as to ensure that they are the actual supplier and not a hacker. It’s a small step, but one that significantly reduces the risk.

But, as we say, why would suppliers not agree to Continuous Controls Monitoring?

A better way

Rightly, Continuous Controls Monitoring is being considered a gamechanger in IT security circles. And that’s when it is simply being deployed inside the organisation.

Deployed within the supply chain, though, and ‘gamechanger’ becomes something of an understatement.

A better way of assuring the IT security of supply chain connectivity? We think so.

To learn more, please get in touch or book a meeting at a time that suits you.

RECENT POSTS

Trust Is No Longer Assumed: What Boards Need From Modern Assurance

For a long time, trust in assurance was implicit. If controls were documented, audits were clean, and regulators weren’t asking questions, boards assumed the organisation was under control. That assumption no longer holds. Today, trust is no longer something assurance automatically earns. It has to be demonstrated — continuously. A

Find out more

The Five Questions Every Board Should Ask Their CISO in 2026

How Boards Strengthen Cyber Resilience, Improve Decision-Making and Protect Business Outcomes Cyber security has shifted from a technical function to a core component of operational resilience. Boards now own cyber risk in the same way they own financial risk and regulators, insurers and shareholders expect visible accountability. Yet there’s still

Find out more

Contact Us

To find out more about cyber security and Continuous Controls Monitoring, please complete the form below with a short message and we’ll get right back to you. Alternatively, you can book a meeting directly.

Address:
5th Floor,
72 King William Street,
London,
EC4N 7HR

 
Take a tour of our platform

Register for updates

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

Address:
2nd & 3rd Floor,
2 Burgon Street,
City Of London,
London,
EC4V 5DR

 

Thank you.

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

Request a Quod Orbis CCM demo

Contact us to schedule a demo of the Quod Orbis CCM managed platform.

See it for yourself – automated Continuous Controls Monitoring (CCM), with complete cyber controls visibility in a single pane of glass, continuance compliance, automated audits, our unique service wrap, and more.

Please complete your details and a member of the Quod Orbis team will be in touch soon.