• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Risk Management

Top three advices to software provider for supply chain cybersecurity

The NSA, CISA, and the ODNI have published a set of recommendations for securing the software supply chain.

Gert Van de VenbyGert Van de Ven
December 5, 2022
in Articles, Cybersecurity, Risk Management, Vulnerability & Weakness
1
Top three advices to software provider for supply chain cybersecurity

Supply-chain attacks have been exposed to the real world in a number of instances, including when Russian cybercriminals compromised SolarWinds to infect its downstream users, such as Kaseya’s MSP software, which was used to encrypt thousands of companies worldwide, and when malware infected npm modules were used to remotely execute commands. In May 2021, President Biden signed an executive order to update U.S. defences against future cyberattacks, following the SolarWinds supply-chain breach, which led to the compromise of several U.S. government agencies.

In October 2021, Microsoft published a report showing that the global I.T. supply chain was a favourite target for the Russian-backed Nobelium hacking group. According to the report, after hacking SolarWinds and breaching at least 14 managed service providers (MSPs) and cloud service providers, the group continued to target 140 victims since May 2021.

To strengthen supply-chain security NSA, CISA, and the Office of the Director of National Intelligence (ODNI) published a new report in which they share the three most important best practices applicable for all software publisher and vendors.

Prepare the organization with Policies & Procedures

The cybersecurity governance must be defined with policies and procedures. Those document establish the checks required to securely deliver the software to customers. The documentation must be accessible to anyone in the organization. It must be known by any person involved in the Software Development Life Cycle (SDLC).

It must include the notification of customer in case of vulnerabilities, the mitigation options and the End-of-life support. The objectives of a secure SDLC and software delivery system is to safeguard the software code, the provenance, the integrity and the resilience to compromise of the software supply chain. Industry Standards such as the NIST 800-218 (“Recommendations for Mitigating the Risk of Software Vulnerabilities”) helps to benchmark its maturity.

Secure coding

Secure Coding Best Practices are key to ensure that code is delivered to customer with all the security features and control mechanisms by design. This imply to hunt for any functionality that may allow unauthorized access, or information tampering. Security backdoor or hard-coded password or API key for example are a no-no.

Also, software suppliers must provide a mechanism to verify the software release integrity with digital signature. Signed software code enables the recipients to positively verify and trust that the software or the update has not been modified by an attacker.

Finally, the organization must have an archive system and strategy. They specify major and minor releases. This is very helpful in case of disaster recovery, urgent rollback or forensic investigation after a cyber attack or a contract litigation.

Producing well secure code an mitigation the risks by design are key objectives in delivering the software product. It allows the customer to prevent unauthorized access and information stealing.

Vulnerability Discovery and Disclosure

Software suppliers must deploy every effort to ensure that publicly known or easily identified vulnerability are not present in the product. The organization must regularly test the software with code audit or penetration testing. It helps to prevent pushing compromised software or updates to the customer.

Customer have strong interest in receiving vulnerability advisory and transparent communication about the security efforts of the suppliers. It helps building a transparent and trustful relationship. Failure to perform those activities may hindered the trust and directly impact the organization business performance.

Conclusion

Supply chain software vulnerabilities are a significant risk to organizations. In this series, we describe how to improve the security of production, distribution, and management processes for software supply chains. In order to mitigate the risk of a supply chain compromise, organizations should establish security best practices throughout the lifecycle. The organization’s role at different points in the supply chain determines the nature and extent of its responsibility.

Tags: Best PracticesPreventive SecuritySecurity By DesignSupply Chain

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}