Systems are built by integrating components upwards from the lowest level of the supply chain to the finished, often highly complex, product. That upward integration process represents a potential security weakness.
Secure Sourcing of COTS SoftwareRyan2023-09-09T15:39:30-10:00