Appendix B Introduction to Supply Chain Security Requirements
The core of the security process is to understand what is being protected and from what or whom. It is also important to identify what is not being protected. A full explanation is provided in the IoTSF publication “Securing the Internet of Things Supply Chain” https://iotsecurityfoundation.org/best-practice-guidelines/