Skip to main content
MainTegrity Cyber Security Framework (CSF)
MainTegrity Cyber Security Framework (CSF)
End-to-End Cyber Security for IBM z/OS
The CSF Suite // Supply Chain //

Supply Chain

What Makes Supply Chain Unique

Supply Chain is the software integrity module of CSF. It validates vendor software and updates before installation—ensuring only trusted code runs on your mainframe.

Supply Chain answers the question: "Can I trust this software update?"


Supply Chain Capabilities

  • Informed Release Control / Approvals — Validates software against known-good baselines before approval
  • Enable Separation of Duties – Issue Resolution — Enforces proper change control workflow
  • Lock Changes Prior to Approval — Prevents unapproved software from reaching production
  • Verify That Change Deployment Was Correct — Post-installation verification confirms integrity

The Supply Chain Threat

Modern supply chain attacks target the software update process itself:

  1. Attackers compromise vendor systems or intercept updates in transit
  2. Malicious code is injected into legitimate software
  3. Organizations apply the compromised update through trusted channels
  4. Attackers gain access—bypassing traditional security controls entirely

Mainframe environments are particularly attractive targets because of:

  • The critical data they process
  • Their position at the heart of enterprise operations
  • The trust placed in vendor-supplied PTFs and updates

How Supply Chain Works

Pre-Installation Validation

Before any vendor software or PTF is applied to production:

  1. Cryptographic signatures validated against vendor baselines
  2. Content compared to expected values
  3. Any deviation triggers alerts before installation
  4. Approved software tracked through deployment

Post-Installation Verification

After installation completes:

  • Verifies installed software matches approved version
  • Confirms no modifications occurred during deployment
  • Provides audit trail of what was installed and when

Change Control Integration

Integrates with your existing processes:

  • ServiceNow, BMC Helix integration
  • Enforces separation of duties
  • Locks changes until properly approved

Protection Against Common Attacks

Attack TypeHow Supply Chain Protects
Trojanized UpdatesDetects malicious code in legitimate vendor software
Man-in-the-MiddleIdentifies software modified during transmission
Unauthorized ModificationsCatches internal tampering with approved software
Rollback AttacksPrevents installation of older, vulnerable versions

Supply Chain + FIM+: Complete Lifecycle Protection

Supply Chain validates software BEFORE installation.

FIM+ monitors files AFTER installation.

Together:

  1. Vendor update arrives → Supply Chain validates
  2. Update is applied → FIM+ detects the expected change
  3. If anything changes unexpectedly later → FIM+ alerts

Compliance Support

FrameworkRequirement Addressed
NISTSupply chain risk management (key focus area)
DORAThird-party risk management, software integrity controls
Zero Trust"Never trust, always verify"—applies to software as well as users

Supply Chain vs. Other CSF Products

If you need to...Use...
Verify vendor software before installSupply Chain
Detect file changes after installationFIM+
Catch attackers in recon/exploit phaseEarly Warning
Stop data leaving your mainframeData Exfiltration Defense

CRM Product Quote Description

Monitors and validates integrity of third-party vendor software and external code components. Tracks changes to vendor-supplied modules, libraries, and system exits. Detects unauthorized modifications to supply chain components before they execute. Provides cryptographic verification of vendor packages against known-good baselines. Alerts on deviations from approved vendor configurations and unauthorized code injections. Integrates with FIM+ for continuous integrity monitoring of external dependencies.


Supply Chain runs on CSF Foundation, which provides Real-time Reaction, Human Interface, Whitelisting, and Restore Assist capabilities.