White Paper: Applying Zero Trust in the Supply Chain

to Prevent DMA Attacks

Applying Zero Trust in the Supply Chain to Prevent DMA Attacks

In this paper, we will look at how organizations can apply the core concepts of Zero Trust to mitigate their risk and prevent firmware- based attacks such as DMA attacks.

Specifically, we will:

  • Introduce DMA and firmware-level attacks and their security impact on a device
  • Provide an overview of Zero Trust principles and how they relate to DMA attacks and supply chain security
  • Propose a set of specific best practices and tests that can be applied to ensure the integrity of SSDs through all phases of the supply chain

While this is not intended to be a comprehensive analysis of Zero Trust or DMA attacks, the goal is to provide vendors, validation teams, and IT and Security teams with a practical approach to improve their security going forward.

Download our FREE white paper, "Applying Zero Trust in the Supply Chain to Prevent DMA Attacks" by completing the form.


Check out our upcoming events, trainings and live/on-demand webinars, presented by Teledyne LeCroy technical experts.

Complete the form to download our "Applying Zero Trust in the Supply Chain to Prevent DMA Attacks" white paper.

By ticking this box you agree to receive information from Teledyne and our authorized sales representatives and distributors about our latest news, events and products and/or services by email. Please see our privacy policy at http://www.teledyne.com/privacy-policy