The primary condition for use is the technical readiness of an organization’s hardware and sandbox environment.
Supply chain attacks feel like they're becoming more and more common.