This document discusses supply chain security considerations. It provides an overview of issues that can affect technology integration and approaches to mitigate risks. Examples are given of past supply chain attacks on autonomous vehicles, IoT devices, and software. The supply chain is defined as the network of vendors and components used to deliver a product or service. Threats include compromised hardware, software, tools and facilities. Detecting issues can be difficult due to the distributed nature of supply chains. Defenses include things like signing, monitoring, and designing with the assumption that some components may be compromised. The document emphasizes that supply chain attacks are increasingly common and that organizations should have response plans in place.