Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: veracode.com

Software security is a big focus of the Biden administration???s recent๏พ‚?executive order๏พ‚?on cybersecurity. In fact, an entire section, or 25 percent, of the order is dedicated to software security requirements. In the wake of the SolarWinds cyberattack, the security of the software supply chain is clearly top of mind at the White House, and has prompted these unprecedented and detailed security requirements for any software vendor looking to do business with the federal government. The order states:

The security of software used by the Federal Government is vital to๏พ‚?the Federal Government???s ability to perform its critical functions.๏พ‚? The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors.๏พ‚? There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended.๏พ‚? The security and integrity of ???critical software??? ??? software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) ??? is a particular concern.๏พ‚? Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.

How will the requirements be developed, and what do they cover?

The order mandates that NIST will identify existing or develop new standards for software security that ???shall include criteria that can be used to evaluate software security, include criteria to evaluate the security practices of the developers and suppliers themselves, and identify innovative tools or methods to demonstrate conformance with secure practices.??? NIST has 180 days to publish the preliminary guidelines, so we expect to see them before the end of the year.

Once the preliminary guidelines are published, NIST will then, within 60 days, issue guidance on best practices for securing the software supply chain (most likely early 2022). This guidance must include standards for:

  • Secure software development environments
  • Generating proof of adherence to the standards
  • Employing automated tools to ???ensure the integrity of code???
  • Employing automated tools to check for vulnerabilities and remediate them
  • Generating proof of the results of the automated tools??? findings
  • Maintaining data on the origins of all software code
  • Providing a software bill of materials
  • Participating in a vulnerability disclosure program
  • Attesting to conformity with secure software development practices
  • Ensuring the integrity of open source software in use

The order covers both new software purchases, and a review of existing legacy software.

There will also be guidance coming on what constitutes a software bill of materials and what should be considered ???critical software.???

Finally, the order requires the development of a pilot program that will examine a security labeling and rating system for consumer software products, including IoT devices.

What???s notable?

SBOM requirement:๏พ‚?The requirement to provide a software bill of materials for each software product is a notable acknowledgement of the reality of modern software ??? very little of it is created from scratch, in-house. Just as requirements surrounding nutrition and ingredients labeling evolved over time as food products became more complicated and awareness of health risks increased, the government is now mandating transparency about what is in software as awareness of the security risks has increased.

Open source inclusion:๏พ‚?As with the SBOM requirement, this inclusion acknowledges another reality of modern software ??? much of it is built on open source libraries, most of which contain vulnerabilities. In fact, our๏พ‚?recent research๏พ‚?found that 70 percent of applications contain a vulnerability in an open source library. This requirement highlights the fact that organizations today can???t call their software secure without assessing the security of the open source components of their applications.

Security testing specifics:๏พ‚?This order gets more specific about software security testing than we had anticipated. It requires using automated tools (or comparable processes) that check for both known and potential vulnerabilities and remediate them. It also notes that the tools should operate regularly, or at least before product, version, or update releases. In the SaaS and PaaS world, this will mean these tools will need to become part of the development process and execute in the pipeline on each build since they often operate with continuous delivery. The emphasis on remediation is also important; we talk to a lot of organizations that feel like they???ve checked the software security box if they are testing their code. In reality, testing just reveals the problem, it doesn???t fix it.

The order also indicates that, within 60 days, NIST will publish guidelines recommending minimum standards for software security testing, including recommended types of testing, such as static and dynamic analysis, software composition analysis, and pen testing. This level of specificity is also important, since there is no software security silver bullet. All these๏พ‚?testing types๏พ‚?identify different types of vulnerabilities at different stages of the development process, and neglecting any of them widens your threat landscape. For instance, static analysis won???t find authorization issues or business logic problems, but dynamic analysis can???t point to the line of code where a vulnerability originates.

Development environment security:๏พ‚?There has been a realization that the environment software is developed in has to have equal or greater security controls than the environment the software operates in. Critical software operated in the most restricted and controlled environments is often developed in environments with weak security controls.

IoT security:๏พ‚?This is perhaps the most groundbreaking and far-reaching inclusion in the order. The order requires the development of pilot programs for IoT and consumer software security that will be ???informed by existing consumer product labeling programs to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices, and shall consider ways to incentivize manufacturers and developers to participate in these programs.???๏พ‚?Recent legislation๏พ‚?created requirements around the security of IoT devices purchased by the U.S. federal government, and Singapore and the UK have voluntary programs for labeling IoT. This executive order suggests that this type of regulation may expand to the U.S. consumer market. Consumers of software and IoT devices haven???t to this point overwhelmingly demanded that vendors create secure products, and haven???t been deterred by security, or a lack thereof, when purchasing. But as recent๏พ‚?DDoS attacks๏พ‚?perpetrated through IoT devices highlight, these interconnected devices create a wide and very dangerous attack surface. Establishing some requirements and transparency around the security of these consumer devices is overdue.

For more information on the executive order, see our previous๏พ‚?blog post๏พ‚?on the topic, and stay tuned for more posts in the coming days and weeks.

...



๐Ÿ“Œ A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order


๐Ÿ“ˆ 85.3 Punkte

๐Ÿ“Œ Zero Trust by Executive Order | Best Practices For Zero Trust Security You Can Takeaway From Bidenโ€™s Executive Order


๐Ÿ“ˆ 43.76 Punkte

๐Ÿ“Œ Crossword Cybersecurity Supply Chain Cyber practice improves supply chain resilience for organizations


๐Ÿ“ˆ 41.66 Punkte

๐Ÿ“Œ A closer look at TSAโ€™s new cybersecurity requirements for aviation


๐Ÿ“ˆ 40.89 Punkte

๐Ÿ“Œ Executive Order Would Strengthen Cybersecurity Requirements for Federal Agencies


๐Ÿ“ˆ 40.36 Punkte

๐Ÿ“Œ Joe Biden signs executive order to bolster supply chain security with Cyber Threat sharing


๐Ÿ“ˆ 40.08 Punkte

๐Ÿ“Œ An earlier supply chain attack led to the 3CX supply chain attack, Mandiant says


๐Ÿ“ˆ 36.4 Punkte

๐Ÿ“Œ Attack inception: Compromised supply chain within a supply chain poses new risks


๐Ÿ“ˆ 36.4 Punkte

๐Ÿ“Œ AWS Supply Chain helps businesses optimize supply chain processes


๐Ÿ“ˆ 36.4 Punkte

๐Ÿ“Œ A Look Back at the Executive Order on Cybersecurity


๐Ÿ“ˆ 35.47 Punkte

๐Ÿ“Œ Equifax Hack: Keep Your Friends Close, but Your Supply Chain Closer


๐Ÿ“ˆ 32.29 Punkte

๐Ÿ“Œ Integrating Software Supply Chains and DevOps: Tips for Effectively Reconciling Supply Chain Management and DevOps


๐Ÿ“ˆ 31.75 Punkte

๐Ÿ“Œ chain-bench: auditing your software supply chain stack for security compliance


๐Ÿ“ˆ 31.53 Punkte

๐Ÿ“Œ Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order


๐Ÿ“ˆ 31.48 Punkte

๐Ÿ“Œ Public Sector Software Security Two Years After Cybersecurity Executive Order


๐Ÿ“ˆ 31.48 Punkte

๐Ÿ“Œ Biden Signs Executive Order To Address Chip Shortage Through a Review To Strengthen Supply Chains


๐Ÿ“ˆ 31.09 Punkte

๐Ÿ“Œ A Look at Trumpโ€™s Executive Order to Secure the Bulk Power System


๐Ÿ“ˆ 30.2 Punkte

๐Ÿ“Œ Amazon CTO Vogels: Cloud is getting closer and closer


๐Ÿ“ˆ 28.17 Punkte

๐Ÿ“Œ FreeBSD 11.0 Is Getting Closer and Closer, Fouth Beta Out Now for Public Testing


๐Ÿ“ˆ 28.17 Punkte

๐Ÿ“Œ FreeBSD 11.0 Is Getting Closer and Closer, Fouth Beta Out Now for Public Testing


๐Ÿ“ˆ 28.17 Punkte

๐Ÿ“Œ Improving Software Supply Chain Cybersecurity


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ Cybersecurity Experts Welcome NSA/CISA Best Practices For Software Supply Chain


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ Can Cybersecurity Frameworks Help with Software Supply Chain Risk Management?


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ Can Cybersecurity Frameworks Help with Software Supply Chain Risk Management?


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ GrammaTech Expert Invited to Discuss Software Supply Chain Security at Automotive Cybersecurity 2022 Conference


๐Ÿ“ˆ 27.8 Punkte

๐Ÿ“Œ Supply Chain: Automatisierte Lieferung und fristgerechtes Order-Management


๐Ÿ“ˆ 27.79 Punkte

๐Ÿ“Œ A Closer Look at State and Local Government Cybersecurity Priorities


๐Ÿ“ˆ 27.67 Punkte

๐Ÿ“Œ A closer look at the SEC Cybersecurity Disclosure rule


๐Ÿ“ˆ 27.67 Punkte

๐Ÿ“Œ A closer look at Israeli cybersecurity funding and M&A activity in 2023


๐Ÿ“ˆ 27.67 Punkte

๐Ÿ“Œ President Trump signs cybersecurity executive order


๐Ÿ“ˆ 27.15 Punkte

๐Ÿ“Œ Trump Signs Cybersecurity Executive Order


๐Ÿ“ˆ 27.15 Punkte

๐Ÿ“Œ Trump's cybersecurity executive order met with mixed reviews


๐Ÿ“ˆ 27.15 Punkte

๐Ÿ“Œ Trump signs executive order on cybersecurity, White House now runs the show


๐Ÿ“ˆ 27.15 Punkte











matomo