Food and Agriculture Defense in the Supply Chain: A Critical Review
Abstract
1. Introduction
- Food Safety: Ensures that food, feed, and related packaging do not harm consumers when prepared and consumed as intended. It primarily targets unintentional contamination (microbial, chemical, and physical hazards), using tools such as Hazard Analysis and Critical Control Points (HACCP), Good Manufacturing Practices (GMP), and systematic testing [1,26].
- Food Fraud: Defined as intentional misrepresentation or adulteration of food for economic gain, food fraud undermines both public health and consumer trust. Vulnerability Assessment and Critical Control Points (VACCP) is a preventive tool that systematically identifies points in the supply chain most vulnerable to fraud and establishes controls to mitigate such risks and authenticity testing represent key preventive tools [1,25,27].
2. Materials and Methods
- Literature search strategy
- food defense, intentional adulteration, agroterrorism, food supply chain,
- cyber risk, cybersecurity, blockchain, artificial intelligence, digital food safety.
- Eligibility criteria
- peer-reviewed articles addressing intentional food contamination, food defense frameworks, or agroterrorism;
- 2.
- regulatory or policy documents describing national or international requirements;
- 3.
- studies proposing digital or cyber-integrated food defense approaches.
- publications not written in English;
- studies focused exclusively on unintentional food safety hazards.
- Screening and selection
- Quality appraisal
- AMSTAR 2 for systematic reviews [41].
- Transparency and applicability criteria for regulatory or policy documents.
- Data extraction and synthesis.
- Jurisdiction and legal framework.
- Type of threat (intentional adulteration, cyber risk, agroterrorism).
- Outcomes, implementation challenges, and innovations relevant to cyber-food defense.
- international food defense frameworks,
- cyber incidents in the agri-food sector,
- enabling standards and technologies for Cyber-FSMS integration.
3. Results
3.1. Agricultural Supply Chains and Food Defense: An Expanded Overview
3.2. Descriptive Synthesis of Included Studies
- Prescriptive frameworks (e.g., FSMA in the US);
- Voluntary guidance (e.g., PAS 96 in the UK);
- Cyber-FSMS: An Integrated Food Safety and Cyber-Risk Framework
3.3. Cyber-FSMS Components
- (i)
- Cyber-Context Scoping (Governance).
- (ii)
- Cyber-Vulnerability Assessment (C-VACCP).
- (iii)
- Integrated Mitigation Controls.
- (iv)
- Monitoring and Detection.
- (v)
- Verification and Reanalysis.
- (vi)
- Incident Response and Recovery.
3.4. Emerging Challenges and Integration
3.5. Capacity Building and Visual Tools
- Targeted training programs covering both traditional TACCP/VACCP approaches and basic cyber hygiene practices, supported by certification bodies and industry associations.
- Low-cost digital toolkits for SMEs, offering vulnerability assessment templates, risk dashboards, and simplified monitoring solutions [64].
- Public–private partnerships and international coordination (e.g., EFSA crisis preparedness programs, WHO One Health initiatives) to organize joint preparedness exercises and scenario simulations [83].
- Visual tools, such as risk mapping dashboards, flow diagrams of supply chain f, and scenario-based visualization—can enhance comprehension of complex FSMS and Cyber-FSMS concepts, making them more accessible for operators with limited resources. Embedding cybersecurity literacy into food safety training is especially important, as many food operators lack awareness of digital vulnerabilities. Attention must also be paid to social dimensions, including gendered aspects of resilience in food systems, which shape household- and community-level food security outcomes [84,85,86].
4. Discussion
4.1. Cyber Threats as Emerging Food Defense Challenges
4.2. Policy and Global Approaches (Consolidated)
- (i)
- Tax incentives or matching grants to offset the costs of essential OT/IT controls (e.g., MFA, network segmentation, secure backup);
- (ii)
- Regulatory sandboxes for piloting cyber-FSMS elements without immediate full compliance burdens;
- (iii)
- Tiered compliance models that align control maturity with facility risk profiles;
- (iv)
- Shared services (e.g., sectoral SOCs, incident-response playbooks) delivered via industry associations; and
- (v)
- Template-based documentation (threat mapping, C-VACCP scoring sheets, OCCP registers) to reduce administrative load.
- Incremental integration of cyber hygiene into HACCP/TACCP programs (e.g., MFA, staff awareness, secure backups).
- Adoption of low-cost digital traceability tools (e.g., GS1 EPCIS 2.0, cloud-based inventory systems) [60].
- Leveraging voluntary guidelines such as PAS 96 as a stepping-stone toward more comprehensive compliance [18].
4.3. Future Research and Implementation Pathways
4.4. Applications and Implications
- (i)
- Governance: mapping of IT/OT assets and clear alignment of cyber defense responsibilities within food safety governance structures
- (ii)
- C-VACCP workshops that integrate qualitative TACCP analysis with quantitative CVSS scoring;
- (iii)
- Identification of Operational Critical Control Points (OCCPs) for digital assets such as SCADA systems, ERP platforms, and blockchain traceability nodes;
- (iv)
- Deployment of technical controls including multi-factor authentication, network segmentation, and patch management;
- (v)
- continuous monitoring using SIEM/IDS tools combined with EPCIS 2.0 traceability events; and
- (vi)
- Regular incident response exercises that include cyberattack and contamination simulations.
5. Future Research Directions and Limitations
- (i)
- Standardizing C-VACCP methodologies, combining TACCP-style qualitative workshops with quantitative CVSS scoring for cyber assets [113].
- (ii)
- Validating OCCPs across different food sectors (dairy, meat, fresh produce) to determine critical digital control points [73].
- (iii)
- (iv)
- Evaluating the effectiveness of GS1 EPCIS 2.0 for forensic traceability in recall scenarios. In addition, chemical hazard case studies such as hop mycotoxin monitoring in Central Europe provide valuable models for testing how digital traceability tools could accelerate recall and root-cause analysis [102,105,108,109,114].
- (v)
- (vi)
- Designing and testing cross-sector preparedness exercises, coordinated by regulatory bodies such as EFSA and WHO, to simulate combined physical and cyber food defense incidents.
6. Conclusions
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Manning, L.; Soon, J.M. Food Safety, Food Fraud, and Food Defense: A Fast Evolving Literature. J. Food Sci. 2016, 81, 823–834. [Google Scholar] [CrossRef] [PubMed]
- Mettenleiter, T.C.; Markotter, W.; Charron, D.F.; Adisasmito, W.B.; Almuhairi, S.; Behravesh, C.B.; Bilivogui, P.; Bukachi, S.A.; Casas, N.; Becerra, N.C.; et al. The One Health High-Level Expert Panel (OHHLEP). One Health Outlook 2023, 5, 18. [Google Scholar] [CrossRef] [PubMed]
- FAO; UNEP; WHO; WOAH. One Health Joint Plan of Action, 2022–2026: Working Together for the Health of Humans, Animals, Plants and the Environment; WHO: Geneva, Switzerland, 2022. [Google Scholar]
- Ivanov, D. Supply Chain Viability and the COVID-19 Pandemic: A Conceptual and Formal Generalisation of Four Major Adaptation Strategies. Int. J. Prod. Res. 2021, 59, 3535–3552. [Google Scholar] [CrossRef]
- Mirabelli, G.; Solina, V. Blockchain and Agricultural Supply Chains Traceability: Research Trends and Future Challenges. Procedia Manuf. 2020, 42, 414–421. [Google Scholar] [CrossRef]
- FAO. The Future of Food and Agriculture: Trends and Challenges; Food and Agriculture Organization of the United Nations: Rome, Italy, 2017. [Google Scholar]
- Calicioglu, O.; Flammini, A.; Bracco, S.; Bellù, L.; Sims, R. The Future Challenges of Food and Agriculture: An Integrated Analysis of Trends and Solutions. Sustainability 2019, 11, 222. [Google Scholar] [CrossRef]
- Roosevelt, M.; Raile, E.D.; Anderson, J.R. Resilience in Food Systems: Concepts and Measurement Options in an Expanding Research Agenda. Agronomy 2023, 13, 444. [Google Scholar] [CrossRef]
- Gossner, C.M.E.; Schlundt, J.; Ben Embarek, P.; Hird, S.; Lo-Fo-Wong, D.; Beltran, J.J.O.; Teoh, K.N.; Tritscher, A. The Melamine Incident: Implications for International Food and Feed Safety. Environ. Health Perspect. 2009, 117, 1803–1808. [Google Scholar] [CrossRef]
- EFSA. Shiga Toxin-Producing E. coli (STEC) O104:H4 2011 Outbreaks in Europe: Taking Stock. EFSA J. 2011, 9, 2390. [Google Scholar] [CrossRef]
- The Guardian. US Meatpacking Plants Get Back on Stream after Crippling Cyber-Attack. 2 June 2021. Available online: https://www.theguardian.com/food/2021/jun/02/cyber-attack-targets-worlds-largest-meat-processing-company (accessed on 29 August 2025).
- WHO. Terrorist Threats to Food: Guidance for Establishing and Strengthening Prevention and Response Systems; WHO: Geneva, Switzerland, 2002; Available online: https://apps.who.int/iris/handle/10665/42619 (accessed on 22 November 2022).
- U.S. Code of Federal Regulations. Mitigation Strategies to Protect Food Against Intentional Adulteration (21 CFR Part 121). 2025. Available online: https://www.ecfr.gov/current/title-21/chapter-I/subchapter-B/part-121 (accessed on 18 August 2025).
- U.S. FDA. Background on the FDA Food Safety Modernization Act (FSMA). 2022. Available online: https://www.fda.gov/food/food-safety-modernization-act-fsma/background-fda-food-safety-modernization-act-fsma (accessed on 28 November 2022).
- European Commission. Health and Food Safety 2023—Annual Report on Monitoring the Application of EU Law. 2023. Available online: https://commission.europa.eu/law/application-eu-law/implementing-eu-law/infringement-procedure/2023-annual-report-monitoring-application-eu-law/health-and-food-safety-2023_en (accessed on 29 August 2025).
- European Parliament and Council. Regulation (EC) No 178/2002 (General Food Law). 2002. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32002R0178 (accessed on 15 October 2022).
- GFSI. Benchmarking Requirements Part I: The GFSI Benchmarking Process; GFSI: Levallois-Perret, France, 2020. [Google Scholar]
- BSI. PAS 96: Guide to Protecting and Defending Food and Drink from Deliberate Attack; BSI: Yokohama, Japan, 2017; Available online: https://www.bsigroup.com/en-ID/pas-96-food-defence/ (accessed on 27 December 2022).
- Smart Food Safe. Exploring the Concepts of HACCP, TACCP & VACCP. 2025. Available online: https://smartfoodsafe.com/haccp-taccp-vaccp/ (accessed on 15 September 2025).
- Béné, C. Resilience of Local Food Systems and Links to Food Security—A Review of Some Important Concepts in the Context of COVID-19 and Other Shocks. Food Secur. 2020, 12, 805–822. [Google Scholar] [CrossRef]
- Botschner, J.; Corley, C.; Fraser, E.D.G.; Kotak, R.; McMahon, D.; Newman, L. Cybersecurity in Digital Agriculture: A National Security Risk? In Advances in Science, Technology & Security Applications; Springer: Berlin/Heidelberg, Germany, 2024; pp. 281–315. [Google Scholar] [CrossRef]
- ENISA. Report on the State of the Cybersecurity in the Union. 2024. Available online: https://www.enisa.europa.eu/publications/2024-report-on-the-state-of-the-cybersecurity-in-the-union (accessed on 29 August 2025).
- TQCSI. Food Defence & Food Fraud: VACCP Food Fraud Plan & TACCP Food Defence. 2025. Available online: https://www.tqcsi.com/resources/food-defence-food-fraud (accessed on 15 September 2025).
- Bogadi, N.P.; Banović, M.; Babić, I. Food Defence System in Food Industry: Perspective of the EU Countries. J. Consum. Prot. Food Saf. 2016, 11, 217–226. [Google Scholar] [CrossRef]
- U.S. Food and Drug Administration. Food Safety Modernization Act (FSMA). 2025. Available online: https://www.fda.gov/food/guidance-regulation-food-and-dietary-supplements/food-safety-modernization-act-fsma (accessed on 29 September 2025).
- GFSI. Position Paper on Mitigating the Public Health Risk of Food Fraud; GFSI: Levallois-Perret, France, 2014. [Google Scholar]
- Adewusi, A.O.; Chiekezie, N.R.; Eyo-Udo, N.L. Cybersecurity Threats in Agriculture Supply Chains: A Comprehensive Review. World J. Adv. Res. Rev. 2022, 15, 490–500. [Google Scholar] [CrossRef]
- FAO. Note on the Impact of the War on Food Security in Ukraine; FAO: Rome, Italy, 2022. [Google Scholar]
- Kimball, A.M. Risky Trade; Routledge: London, UK, 2016. [Google Scholar]
- Ivanov, D.; Dolgui, A. Viability of Intertwined Supply Networks: Extending the Supply Chain Resilience Angles towards Survivability—A Position Paper Motivated by COVID-19 Outbreak. Int. J. Prod. Res. 2020, 58, 2904–2915. [Google Scholar] [CrossRef]
- Seebeck, L. Responding to Systemic Crisis: The Case of Agroterrorism. Stud. Confl. Terror. 2007, 30, 691–721. [Google Scholar] [CrossRef]
- FAO. The State of Food Security and Nutrition in the World; FAO: Rome, Italy, 2020; ISBN 9789251329016. [Google Scholar]
- Engler-Stringer, R. Food Security. In Encyclopedia of Quality of Life and Well-Being Research; Springer: Berlin/Heidelberg, Germany, 2014. [Google Scholar]
- Hassen, T.B.; Bilali, H.E. Food Security in the Gulf Cooperation Council Countries: Challenges and Prospects. J. Food Secur. 2019, 7, 159–169. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Khan, M.; Ahmed, S.; Bhattacharjee, R. AI and Blockchain in Critical Food Supply Infrastructure: Cybersecurity Threats and Solutions. Comput. Fraud Secur. 2024, 2024, 95–105. [Google Scholar] [CrossRef]
- OECD Publishing. OECD-FAO Agricultural Outlook 2021–2030; OECD: Paris, France, 2025; Available online: https://www.oecd.org/en/publications/oecd-fao-agricultural-outlook-2021-2030_19428846-en.html (accessed on 29 August 2025).
- U.S. FDA. Mitigation Strategies to Protect Food Against Intentional Adulteration (Final Rule); U.S. FDA: Silver Spring, MD, USA, 2024.
- McHugh, M.L. Interrater Reliability: The Kappa Statistic. Biochem. Medica 2012, 22, 276–282. [Google Scholar] [CrossRef]
- Ouzzani, M.; Hammady, H.; Fedorowicz, Z.; Elmagarmid, A. Rayyan—A Web and Mobile App for Systematic Reviews. Syst. Rev. 2016, 5, 210. [Google Scholar] [CrossRef]
- Shea, B.J.; Reeves, B.C.; Wells, G.; Thuku, M.; Hamel, C.; Moran, J.; Moher, D.; Tugwell, P.; Welch, V.; Kristjansson, E.; et al. AMSTAR 2: A Critical Appraisal Tool for Systematic Reviews That Include Randomised or Non-Randomised Studies of Healthcare Interventions, or Both. BMJ 2017, 358, j4008. [Google Scholar] [CrossRef] [PubMed]
- Lindgren, K.-A.; Lang, T. Food Security and the Fractured Consensus on Food Resilience: An Analysis of Development Agency Narratives; Palgrave Macmillan: Cham, Switzerland, 2023. [Google Scholar] [CrossRef]
- Hong, Q.N.; Fàbregues, S.; Bartlett, G.; Boardman, F.; Cargo, M.; Dagenais, P.; Gagnon, M.P.; Griffiths, F.; Nicolau, B.; O’Cathain, A.; et al. The Mixed Methods Appraisal Tool (MMAT) Version 2018 for Information Professionals and Researchers. Educ. Inf. 2018, 34, 285–291. [Google Scholar] [CrossRef]
- U.S. Food and Drug Administration. An Overview of the CARVER + Shock Method for Food Sector Vulnerability Assessments. 2022. Available online: https://www.fda.gov/food/food-defense-initiatives/carver-shock-primer (accessed on 10 November 2022).
- Gajdić, D. Definition and Characteristics of Short Agri-Food Supply Chains for Products. Econ. Thought Pract. 2019, 28, 381–408. [Google Scholar]
- Mottaleb, K.A.; Kruseman, G.; Snapp, S. Potential Impacts of Ukraine-Russia Armed Conflict on Global Wheat Food Security: A Quantitative Exploration. Glob. Food Sec. 2022, 35, 100659. [Google Scholar] [CrossRef]
- James. 8 Recent Cyber Attacks on Food Production and Agriculture. WISDIAM. 2025. Available online: https://wisdiam.com/publications/recent-cyber-attacks-food-agriculture-sector/ (accessed on 29 August 2025).
- Orton, E. Get Ready for Cyber-Attacks on Global Food Supplies. WIRED, 15 February 2022. [Google Scholar]
- Mentzer, J.T.; DeWitt, W.; Keebler, J.S.; Min, S.; Nix, N.W.; Smith, C.D.; Zacharia, Z.G. Defining Supply Chain Management. J. Bus. Logist. 2001, 22, 1–25. [Google Scholar] [CrossRef]
- EFSA. Food Incident Preparedness and Response. 2025. Available online: https://www.efsa.europa.eu/en/topics/topic/food-incident-preparedness-and-response (accessed on 29 August 2025).
- OECD; FAO. OECD-FAO Guidance for Responsible Agricultural Supply Chains; OECD Publishing: Paris, French, 2016. [Google Scholar] [CrossRef]
- Caprile, A. EPRS—European Parliamentary Research Service: PE 729.367; Members’ Research Service: Brussels, Belgium, 2022; Available online: https://www.europarl.europa.eu/ReData/etudes/ATAG/2022/729367/EPRS_ATA(2022)729367_EN.pdf (accessed on 16 September 2025).
- Okupa, H. Cybersecurity and the Future of Agri-Food Industries. Master’s Thesis, Kansas State University, Manhattan, KS, USA, 2020. Available online: https://krex.k-state.edu/items/b0df534a-11cf-48b2-94a3-41e94ab64515 (accessed on 16 September 2025).
- Ingemundsen, A.A. Cyber Security Risks in Norwegian Agriculture and the Influence on National Food Security. Master’s Thesis, UiT The Arctic University of Norway, Tromsø, Norway, 2025. Available online: https://hdl.handle.net/10037/37890 (accessed on 15 September 2025).
- BRCGS. Global Standard for Food Safety; BRCGS: London, UK, 2022. [Google Scholar]
- IFS. IFS Food Standard Version 8—Doctrine v4 (EN). 2025. Available online: https://www.ifs-certification.com/images/ifs_documents/IFS_Food_v8_doctrine_v4_EN.pdf (accessed on 29 August 2025).
- Food Safety Magazine Editorial Team. GFSI Releases Benchmarking Requirements Version 2024. Food Safety Magazine, 20 December 2024. Available online: https://www.food-safety.com/articles/10028-gfsi-releases-benchmarking-requirements-version-2024 (accessed on 15 September 2025).
- Sayegh, E. Cyberattack on Whole Foods Supplier Disrupts Supply Chain—Again. Forbes, 19 June 2025. Available online: https://www.forbes.com/sites/emilsayegh/2025/06/19/cyberattack-on-whole-foods-supplier-disrupts-food-supply-chain-again/ (accessed on 29 August 2025).
- Reuters. Whole Foods Supplier United Natural Foods Says Cyber Incident Disrupted Operations. 2025. Available online: https://www.reuters.com/business/whole-foods-supplier-united-natural-foods-says-cyber-incident-disrupted-2025-06-09/ (accessed on 9 June 2025).
- Cybersecurity Dive. UNFI Cyberattack Disrupted Grocery Distribution and Reduced Earnings. 2025. Available online: https://www.cybersecuritydive.com/news/unfi-cyberattack-reduce-quarterly-earnings/751849/ (accessed on 10 June 2025).
- FoodNavigator. Whole Foods Supplier UNFI Hit by Cyberattack Causing Distribution Delays. 2025. Available online: https://www.foodnavigator.com/Article/2025/06/11/wholefoods-supplier-unfi-hit-by-cyber-attack/ (accessed on 11 June 2025).
- International Society of Automation (ISA). ISA/IEC 62443 Series of Standards—The World’s Only Consensus-Based Automation and Control Systems Cybersecurity Standards. 2025. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 15 September 2025).
- NIST. The NIST Cybersecurity Framework (CSF) 2.0; National Institute of Standards and Technology, U.S. Department of Commerce: Gaithersburg, MD, USA, 2024. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf (accessed on 28 August 2025).
- GS1. EPCIS and CBV Implementation Guideline: Using EPCIS & CBV to Increase Supply Chain Visibility. 2022. Available online: https://www.gs1.org/docs/epc/EPCIS_Guideline.pdf (accessed on 15 September 2025).
- Wamba; Fosso, S.; Queiroz, M.M. Blockchain in Operations and Supply Chain Management: Benefits, Challenges and Future Research Opportunities. Int. J. Inf. Manag. 2020, 52, 102064. [Google Scholar] [CrossRef]
- Kamilaris, A.; Fonts, A.; Prenafeta-Boldú, F.-X. The Rise of Blockchain Technology in Agriculture and Food Supply Chains. Trends Food Sci. Technol. 2019, 91, 640–652. [Google Scholar] [CrossRef]
- Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
- GFSI. Benchmarking Requirements Part IV: Glossary of Terms; GFSI: Levallois-Perret, France, 2024. [Google Scholar]
- FIRST. Common Vulnerability Scoring System Version 4.0: Specification Document. 2023. Available online: https://www.first.org/cvss/v4-0/specification-document (accessed on 15 September 2025).
- Zahid, M.; Inayat, I.; Daneva, M.; Mehmood, Z.H. Security Risks in Cyber-Physical Systems—A Systematic Mapping Study. J. Softw. Evol. Process 2021, 33, e2346. [Google Scholar] [CrossRef]
- Zografopoulos, I.; Ospina, J.; Liu, X.; Konstantinou, C. Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies. IEEE Access 2021, 9, 29775–29818. [Google Scholar] [CrossRef]
- Tantawy, A.; Abdelwahed, S.; Erradi, A.; Shaban, K. Model-Based Risk Assessment for Cyber-Physical Systems Security. Comput. Secur. 2020, 96, 101864. [Google Scholar] [CrossRef]
- Feng, H.; Wang, X.; Duan, Y.; Zhang, J.; Zhang, X. Applying Blockchain Technology to Improve Agri-Food Traceability: A Review of Development Methods, Benefits and Challenges. J. Clean. Prod. 2022, 355, 131750. [Google Scholar] [CrossRef]
- Zetter, K. Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. WIRED. 2016. Available online: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ (accessed on 15 September 2025).
- Tian, F. An Agri-Food Supply Chain Traceability System for China Based on RFID & Blockchain Technology. In Proceedings of the 2016 13th International Conference on Service Systems and Service Management (ICSSSM 2016), Kunming, China, 24–26 June 2016. [Google Scholar] [CrossRef]
- U.S. FDA. Mitigation Strategies to Protect Food Against Intentional Adulteration. Final Rule Fed. Regist. 2016, 81, 34165–34223. [Google Scholar]
- Linkov, I.; Trump, B.D. The Science and Practice of Resilience. In Springer Handbooks: Risk, Systems and Decisions; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Welsh, C. The Russia-Ukraine War and Global Food Security: A Seven-Week Assessment, and the Way Forward for Policymakers; Center for Strategic and International Studies: Washington, DC, USA, 2022. [Google Scholar]
- Laborde, D.; Martin, W.; Swinnen, J.; Vos, R. COVID-19 Risks to Global Food Security. Science 2020, 369, 500–502. [Google Scholar] [CrossRef]
- Hobbs, J.E. Food Supply Chains during the COVID-19 Pandemic. Can. J. Agric. Econ. 2020, 68, 171–176. [Google Scholar] [CrossRef]
- Wittman, H. Food Sovereignty: A New Rights Framework for Food and Nature? Environ. Soc. 2011, 2, 87–105. [Google Scholar] [CrossRef]
- Bellotti, W.; Ingram, J. Enhancing Capacity of Scientists and Practitioners for Promoting More Sustainable and Resilient Food Systems in Indonesia and the South Pacific. APN Sci. Bull. 2022, 12, 161–171. [Google Scholar] [CrossRef]
- Upton, J.; Avîrvarei, A.C.; Bottex, B.; Georganas, A.; Georgiev, M.; Johnson, J.; Gkrintzali, G. 2023 Crisis Preparedness Training: Annual Report; EFSA Supporting Publications 20; European Food Safety Authority: Parma, Italy, 2023. [Google Scholar] [CrossRef]
- Caron, P.; Daguet, E.; Dury, S. The Global Food System Is Not Broken but Its Resilience Is Threatened. In Resilience and Food Security in a Food Systems Context; Palgrave Macmillan: Cham, Switzerland, 2023; pp. 53–79. ISBN 978-3-031-23535-1. [Google Scholar]
- Bryan, E.; Ringler, C.; Meinzen-Dick, R. Gender, Resilience, and Food Systems. In Resilience and Food Security in a Food Systems Context; Palgrave Macmillan: Cham, Switzerland, 2023; pp. 239–280. [Google Scholar] [CrossRef]
- TCI Systems. IFS Food Standard Version 7—Food Safety Systems (Blog). 2025. Available online: https://tcisys.com/blog/ifs-food-standard-version-7/ (accessed on 29 August 2025).
- van Ruth, S.M.; Huisman, W.; Luning, P.A. Food Fraud Vulnerability and Its Key Factors. Trends Food Sci. Technol. 2017, 67, 70–75. [Google Scholar] [CrossRef]
- Radovanovic, M.; Hovjecki, M.; Simunovic, S.; Miocinovic, J. Detection of milk fat adulteration with margarine and palm oil in kajmak. Mljekarstvo 2025, 75, 91–101. [Google Scholar] [CrossRef]
- Aparicio, R.; Morales, M.T. Detection of Olive Oil Adulteration. Trends Food Sci. Technol. 2019, 91, 262–272. [Google Scholar] [CrossRef]
- Meenu, M.; Cai, Q.; Xu, B. A Critical Review on Analytical Techniques to Detect Adulteration of Extra Virgin Olive Oil. Trends Food Sci. Technol. 2019, 91, 391–408. [Google Scholar] [CrossRef]
- Knežević, N.; Palfi, M.; Vrandečić, K.; Šarkanj, I.D.; Ćosić, J. Quality Labels on Agricultural and Food Products. Meso 2021, 23, 420. [Google Scholar] [CrossRef]
- Mičović, E.; Mantovani, A.; Jevšnik, M. Risk Management and Risk Communication of an Illegal Use of Sulphites in Meat Preparations. Sanit. Inženirstvo Int. J. Sanit. Eng. Res. 2023, 16, 23–39. [Google Scholar] [CrossRef]
- Medić, A.; Medana, C. Advances in Food Metabolomics. Appl. Sci. 2025, 15, 8283. [Google Scholar] [CrossRef]
- Zhang, S.; Chen, J.; Gao, F.; Su, W.; Li, T.; Wang, Y. Foodomics as a Tool for Evaluating Food Authenticity and Safety from Field to Table: A Review. Foods 2025, 14, 15. [Google Scholar] [CrossRef]
- Iammarino, M.; Di Taranto, A.; Cristino, M. Monitoring of Nitrites and Nitrates Levels in Leafy Vegetables (Spinach and Lettuce): A Contribution to Risk Assessment. J. Sci. Food Agric. 2014, 94, 773–778. [Google Scholar] [CrossRef]
- Martín León, V.; Luzardo, O.P. Evaluation of Nitrate Contents in Regulated and Non-Regulated Leafy Vegetables of High Consumption in the Canary Islands, Spain: Risk Assessment. Food Chem. Toxicol. 2020, 146, 111812. [Google Scholar] [CrossRef] [PubMed]
- Stagnari, F.; Polilli, W.; Campanelli, G.; Platani, C.; Trasmundi, F.; Scortichini, G.; Galieni, A. Nitrate Content Assessment in Spinach: Exploring the Potential of Spectral Reflectance in Open Field Experiments. Agronomy 2023, 13, 193. [Google Scholar] [CrossRef]
- Milešević, J.; Vranić, D.; Gurinović, M.; Korićanac, V.; Borović, B.; Zeković, M.; Šarac, I.; Milićević, D.R.; Glibetić, M. The Intake of Phosphorus and Nitrites through Meat Products: A Health Risk Assessment of Children Aged 1 to 9 Years Old in Serbia. Nutrients 2022, 14, 242. [Google Scholar] [CrossRef]
- Uršulin-Trstenjak, N.; Šarkanj, I.D.; Sajko, M.; Vitez, D.; Živoder, I. Determination of the Personal Nutritional Status of Elderly Populations Based on Basic Foodomics Elements. Foods 2021, 10, 2391. [Google Scholar] [CrossRef]
- WHO; FAO; OIE/WOAH. Taking a Multisectoral, One Health Approach: A Tripartite Guide to Addressing Zoonotic Diseases in Countries; WHO: Geneva, Switzerland, 2019. [Google Scholar]
- Šarkanj, B.; Šarkanj, I.D.; Shamtsyan, M. Mycotoxins in Food—How to Prevent and What to Do When Things Go Bad. E3S Web Conf. 2020, 215, 01004. [Google Scholar] [CrossRef]
- Pourmadadkar, M.; Lezzi, M.; Corallo, A. Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions. IEEE Trans. Eng. Manag. 2024, 71, 15405–15421. [Google Scholar] [CrossRef]
- Bowcut, S. Shielding the Supply: Cybersecurity in Food and Agriculture. Cybersecurity Guide. 2025. Available online: https://cybersecurityguide.org/industries/food-and-agriculture/ (accessed on 15 September 2025).
- Kulkarni, A.; Wang, Y.; Gopinath, M.; Sobien, D.; Rahman, A.; Batarseh, F.A. A Review of Cybersecurity Incidents in the Food and Agriculture Sector. J. Agric. Food Res. 2025, 14, 102245. [Google Scholar] [CrossRef]
- Rai, A.; Das, M.; Tripathi, A. Occurrence and Toxicity of a Fusarium Mycotoxin, Zearalenone. Crit. Rev. Food Sci. Nutr. 2020, 60, 2710–2729. [Google Scholar] [CrossRef]
- Boyes, H.; Isbell, R.; Watson, T. Critical Infrastructure in the Future City: Developing Secure and Resilient Cyber-Physical Systems. Lect. Notes Comput. Sci. 2016, 8985, 13–23. [Google Scholar] [CrossRef]
- Grady, C.; Rajtmajer, S.; Dennis, L. When Smart Systems Fail: The Ethics of Cyber-Physical Critical Infrastructure Risk. IEEE Trans. Technol. Soc. 2021, 2, 6–14. [Google Scholar] [CrossRef]
- Rose, D.C.; Wheeler, R.; Lobley, M.; Chivers, C.A. Agriculture 4.0: Making It Work for People, Production, and the Planet. Land Use Policy 2021, 100, 104933. [Google Scholar] [CrossRef]
- Dutta, P.; Choi, T.-M.; Somani, S.; Butala, R. Blockchain Technology in Supply Chain Operations: Applications, Challenges and Research Opportunities. Transp. Res. Part E Logist. Transp. Rev. 2020, 142, 102067. [Google Scholar] [CrossRef]
- Sharma, R.; Shishodia, A.; Gunasekaran, A.; Min, H.C.; Munim, Z.H. The Role of Artificial Intelligence in Supply Chain Management: Mapping the Territory. Int. J. Prod. Res. 2022, 60, 7527–7550. [Google Scholar] [CrossRef]
- Tendall, D.M.; Joerin, J.; Kopainsky, B.; Edwards, P.; Shreck, A.; Le, Q.B.; Kruetli, P.; Grant, M.; Six, J. Food System Resilience: Defining the Concept. Glob. Food Secur. 2015, 6, 17–23. [Google Scholar] [CrossRef]
- Ecker, O.; Breisinger, C. The Food Security System: A New Conceptual Framework; IFPRI Discussion Paper 01166; International Food Policy Research Institute: Washington, DC, USA, 2012; Available online: https://cgspace.cgiar.org/server/api/core/bitstreams/93d64eb8-b18e-4fe0-ba80-e4c96587a97b/content (accessed on 28 September 2025).
- Ntafloukas, K.; McCrum, D.P.; Pasquale, L. A Cyber-Physical Risk Assessment Approach for Internet of Things Enabled Transportation Infrastructure. Appl. Sci. 2022, 12, 9241. [Google Scholar] [CrossRef]
- Dodlek, Š.; Ivana; Vahčić, N.; Markov, K.; Haramija, J.; Uršulin-Trstenjak, N.; Hajdek, K.; Sulyok, M.; Krska, R.; Šarkanj, B. First Report on Mycotoxin Contamination of Hops (Humulus lupulus L.). Toxins, 2024; 16, 293. [Google Scholar] [CrossRef] [PubMed]
- European Council. Council Regulation (Euratom) 2016/52 of 15 January 2016 Laying Down Maximum Permitted Levels of Radioactive Contamination of Food and Feed Following a Nuclear Accident or Any Other Radiological Emergency. Official Journal of the European Union L 13/2, 20 January 2016. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0052 (accessed on 28 September 2025).
- European Commission. Council Directive 2013/59/Euratom: Basic Safety Standards for Protection against Ionising Radiation. Official Journal of the European Union L 13, 17 January 2014. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32013L0059 (accessed on 28 September 2025).
- European Commission. RASFF Annual Report 2023—Rapid Alert System for Food and Feed. Brussels: Publications Office of the European Union. Available online: https://food.ec.europa.eu/safety/rasff_en (accessed on 28 September 2025).
Supply Chain Stage | Vulnerabilities | Potential Threats | Mitigation/Defense Measures |
---|---|---|---|
Inputs (seeds, feed, vet. products) | Adulterated materials, falsified quality | Agroterrorism, counterfeit products | Supplier audits, authenticity testing |
Primary production | Susceptibility of crops/livestock | Biological/chemical sabotage | Biosecurity, surveillance |
Post-harvest handling | Storage contamination, human access | Sabotage during sorting/storage | Access control, HACCP |
Processing & manufacturing | Automated systems, SCADA/PLC, IoT | Cyberattacks, ransomware, insider threats | Cyber-FSMS, OCCPs, MFA |
Distribution/logistics | Multi-stakeholder complexity, traceability gaps | Fraud, intentional diversion, tampering | Blockchain, IoT monitoring |
Retail/consumer | Direct consumer access, tampering risk | Food fraud, malicious contamination | Tamper-proof packaging, video surveillance |
Framework/Standard | Jurisdiction | Binding? | Scope & Tools | Re-Analysis | Training | Cyber Coverage |
---|---|---|---|---|---|---|
FSMA 21 CFR Part 121 | USA/Regulation | Mandatory | VA, mitigation, monitoring | 3 years/significant change | Required | Limited |
PAS 96:2017 | UK/Guidance | Voluntary | TACCP, insider threat | Risk-based | Encouraged | Covers insider info |
BRCGS Issue 9 | Global/Certification | Voluntary certification | Food defense & fraud plans | Audit cycle | Role-based | Not explicit |
IFS Food v8 | Global/Certification | Voluntary certification | Defense, suppliers, site security | Annual audit | Competence evaluation | Not explicit |
FSSC 22000 v6 | Global/Certification | Voluntary certification | TACCP/CARVER+Shock | Risk-based | Awareness & role-based | Suggests IT scope |
Company/Year | Incident | Operational Impact | Lessons |
---|---|---|---|
JBS (2021) | Ransomware | Plant closures; supply disrupted | Segmentation, backups, MFA |
Dole (2023) | Ransomware | Production/shipment halted | Playbooks, zero-trust |
Schreiber Foods (2021) | Ransomware | Dairy ops halted | OT/IT segmentation |
Maple Leaf Foods (2022) | Cyber incident | System outage, >$23 M costs | Continuity, redundancy |
NEW Cooperative (2021) | Ransomware | Grain coop offline | ISAC sharing, secure access |
KP Snacks (2022) | Ransomware | Retail shortages | Contingency packaging |
Standard/Technology | Contribution | Integration into FSMS |
---|---|---|
GS1 EPCIS 2.0 | Event-based traceability | Map OCCPs to events; anomaly detection |
NIST CSF 2.0 | Governance + updated functions | Map FSMA/PAS 96 to CSF subcategories |
IEC 62443 | OT/IACS cybersecurity | Zones/conduits for plants |
ISO 22000:2018 | FSMS baseline | Integrate TACCP/VACCP & cyber risks |
Codex CXC 1-1969 | General hygiene principles | Add deliberate & cyber disruptions |
EU NIS2 Directive | Cyber governance | Align with CSF/IEC |
Component | Description | Key Tools/Standards | Example Measures |
---|---|---|---|
Governance & Scoping | Mapping IT/OT assets; defining roles and responsibilities [46,57,66,67] | ISO 22000; FSMA; NIST CSF [67] | Asset inventories; executive oversight structures [67] |
C-VACCP | Vulnerability analysis of digital assets [67,68,69,70,71] | CVSS v4.0; TACCP/VACCP [67,70,71] | Scoring risks by criticality and exposure [67,68,69,70,71] |
Integrated Mitigation | Harmonized physical and digital safeguards [65,71] | IEC 62443; ISO 27001 [65,71] | MFA, segmentation, OCCP designation [65,71] |
Monitoring & Detection | Continuous surveillance and anomaly detection [72,73] | SIEM; IDS; GS1 EPCIS 2.0 [72,73] | Event-based monitoring; blockchain-linked traceability [72,73] |
Verification & Reanalysis | Regular validation and updating of cyber controls [74] | FSMA IA Rule; Red-team/Pen testing [74] | Simulations; supplier onboarding reviews [74] |
Incident Response & Recovery | Integrated recall and crisis management with cyber scenarios [12,56,75] | ISO 22301; Cloud recovery frameworks [75] | Ransomware playbooks; redundant data centers [12,56,75] |
Component | Description | Example Tools/Practices |
---|---|---|
Governance (Cyber-Context) | Mapping IT/OT assets, assigning roles | Executive oversight, IT/OT inventory |
C-VACCP | Extending vulnerability assessment to digital assets | CVSS scoring, TACCP workshops |
Mitigation Controls | Physical + digital safeguards | MFA, segmentation, anomaly detection |
Monitoring & Detection | Continuous surveillance | IDS, SIEM, blockchain integrity checks |
Verification & Reanalysis | Testing and drills | Penetration tests, red-team exercises |
Incident Response & Recovery | Integrated cyber + food defense response | Crisis protocols, backup/recovery systems |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Puhač Bogadi, N.; Uršulin-Trstenjak, N.; Šarkanj, B.; Dodlek Šarkanj, I. Food and Agriculture Defense in the Supply Chain: A Critical Review. Appl. Sci. 2025, 15, 11020. https://doi.org/10.3390/app152011020
Puhač Bogadi N, Uršulin-Trstenjak N, Šarkanj B, Dodlek Šarkanj I. Food and Agriculture Defense in the Supply Chain: A Critical Review. Applied Sciences. 2025; 15(20):11020. https://doi.org/10.3390/app152011020
Chicago/Turabian StylePuhač Bogadi, Nina, Natalija Uršulin-Trstenjak, Bojan Šarkanj, and Ivana Dodlek Šarkanj. 2025. "Food and Agriculture Defense in the Supply Chain: A Critical Review" Applied Sciences 15, no. 20: 11020. https://doi.org/10.3390/app152011020
APA StylePuhač Bogadi, N., Uršulin-Trstenjak, N., Šarkanj, B., & Dodlek Šarkanj, I. (2025). Food and Agriculture Defense in the Supply Chain: A Critical Review. Applied Sciences, 15(20), 11020. https://doi.org/10.3390/app152011020