From 74925d2d65ae06b5695eb3ea2fd04e918679690a Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 22 Mar 2019 16:44:03 -0700 Subject: [PATCH] better spacing --- .../threat-protection/intelligence/supply-chain-malware.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/intelligence/supply-chain-malware.md b/windows/security/threat-protection/intelligence/supply-chain-malware.md index 38333fd918..dc3bb6897e 100644 --- a/windows/security/threat-protection/intelligence/supply-chain-malware.md +++ b/windows/security/threat-protection/intelligence/supply-chain-malware.md @@ -52,10 +52,12 @@ To learn more about supply chain attacks, read this blog post called [attack inc * Immediately apply security patches for OS and software. * Implement mandatory integrity controls to ensure only trusted tools run. * Require multi-factor authentication for admins. + * Build secure software updaters as part of the software development lifecycle. * Require SSL for update channels and implement certificate pinning. * Sign everything, including configuration files, scripts, XML files, and packages. * Check for digital signatures, and don’t let the software updater accept generic input and commands. + * Develop an incident response process for supply chain attacks. * Disclose supply chain incidents and notify customers with accurate and timely information