Skip to content

Enhancing Cybersecurity in Supply Chains through the Use of Software Bill of Materials (SBOMS)

Contemporary software creation encompasses not just the creation of original code for specified functions, but also the utilization of third-party and open-source elements where convenient for expedited development and deployment. Consequently, software products generally constitute a collage of...

Enhancing Cybersecurity in Supply Chains through the Use of Software Bill of Materials (SBOMS)
Enhancing Cybersecurity in Supply Chains through the Use of Software Bill of Materials (SBOMS)

Enhancing Cybersecurity in Supply Chains through the Use of Software Bill of Materials (SBOMS)

In the dynamic world of software development, third-party and open-source components play a significant role. This reality has led to a recognition by the US Federal Government that there are inherent security challenges in the management of the software supply chain.

This acknowledgment was solidified with the introduction of the Cyber Supply Chain Management and Transparency Act of 2014, though the specific governmental agency responsible is not identified in the provided search results. The Act required suppliers and vendors to supply a bill of materials, verify products for known security vulnerabilities, obtain waivers for vulnerable components, and provide timely repairs for discovered vulnerabilities.

The Act was a crucial step towards enhancing the security of the software supply chain. Today, Software Bill of Materials (SBOMs) are considered key building blocks in software security and software supply chain risk management.

An SBOM is defined by the National Telecommunication and Information Administration as an inventory of software components, sub-assemblies, open-source software, and commercially sourced components that make up an application's code. They are crucial for organizations wanting to adopt the best cybersecurity practices and manage associated risks.

Recognizing and understanding the software supply chain, acquiring or creating an SBOM, and using it to analyze known vulnerabilities are essential for managing risk in a supercharged cyber threat environment. SBOMs can benefit multiple stakeholders, including developers, security teams, risk assessment teams, compliance personnel, and auditors.

SBOMs should be living documents that reflect the current status at any given point in time. Important metadata that can be captured includes supplier/product name, version, license information, and current version supported by the supplier.

In a world where high-profile cyber-attacks involving software supply chain partners like SolarWinds have been a concern, customers should demand an SBOM at the time of purchase and have the right to verify and audit it during the life cycle of the application. Organizations can generate their own SBOMs using commercially available tools or open-source tools like OWASP Cyclone Dx.

It is the responsibility of software suppliers to provide an SBOM for each product, either directly or by publishing it on a public website. To further enhance the security of the software supply chain, the US Federal Government has issued an Executive Order on Improving the Nation's Cybersecurity, directing the National Institute of Standards and Technology (NIST) to define standards for enhancing the security of the software supply chain.

A security dashboard that reflects associated risks along with the listing of the software component would be beneficial for monitoring and managing software supply chain risks. Suppliers/vendors in vulnerability assessment, vendor risk management, and software composition analysis are incorporating SBOM services to support organizations in implementing these plans.

In essence, cybersecurity is about risk mitigation, identifying threats and gaps, and fortifying defenses to enhance security. SBOMs are essential in assessing exposure and tracking remediation efforts in the software supply chain. Without them, organizations cannot fully understand the security and safety of their applications from cyber threats and attacks.

Read also:

Latest