Mavi, Aakarsh (2025) Securing the Supply Chain: Automated Defenses Against Emerging Cyber Risks. International Journal of Innovative Science and Research Technology, 10 (7): 25jul1858. pp. 3571-3575. ISSN 2456-2165
As supply chain networks become more complex, they’re also becoming more vulnerable to cybersecurity threats. To stay secure, organizations need more than just automated tools that fix issues—they need systems that can constantly monitor their environment, report on compliance, and evolve with new threats. While most traditional security automation frameworks focus on enforcing policies and patching vulnerabilities, they often fall short when it comes to real-time visibility and ongoing improvement. This paper builds on the existing SecAuto Toolkit [5] by introducing three critical additions: Monitoring, Reporting, and Continuous Improvement layers. These new components ensure that security events are tracked in real time, compliance with standards is automatically verified, and the system can adapt as new threats emerge. Additionally, integrating Software Bills of Materials (SBOMs) into the supply chain security process has proven essential for identifying vulnerabilities in third- party components and maintaining transparency in software dependencies. [9] The enhanced framework combines Ansible automation with SIEM tools, compliance dashboards, and machine learning to deliver proactive and intelligent threat management. Designed specifically for supply chain environments, this approach helps organizations stay secure by providing real-time insights, automating audits, and continuously refining their security posture over time.
Altmetric Metrics
Dimensions Matrics
Downloads
Downloads per month over past year
![]() |