Quantcast
Channel: Tenable Blog
Viewing all articles
Browse latest Browse all 1935

Cybersecurity Snapshot: The Latest on Supply Chain Security – SBOM Distribution, Open Source Flaws and a New Security Framework

$
0
0

Check out what CISA says about the sharing of software bills of materials. Plus, why you should tread carefully with open source components. Also, the SLSA supply chain security framework is ready. In addition, security worries hold back enterprise IoT adoption. And much more!

Dive into six things that are top of mind for the week ending April 21. 

1 – CISA shines spotlight on SBOM sharing methods

They say sharing is caring, and this week the U.S. Cybersecurity and Infrastructure Security Agency (CISA) turned its attention to how to better distribute software bills of materials (SBOMs).

Because they list the “ingredients” in a software product, SBOMs are key for supply chain security. With SBOMs, security teams can identify unsafe components in their organizations’ software. (Cue your memories of scrambling to find all Log4j instances in your environment.) 

Due to regulatory and industry pressure, software producers are making SBOMs more prevalent and sophisticated. Now CISA is looking at ways to streamline SBOM sharing with its “Software Bill of Materials Sharing Lifecycle Report”.

“The purpose of this report is to enumerate and describe the different parties and phases of the SBOM sharing lifecycle and to assist readers in choosing suitable SBOM sharing solutions,” reads the 23-page document.

CISA breaks down the SBOM-sharing lifecycle into three phases: discovery, access and transport. It describes three levels of sophistication for each – low, medium and high – and offers examples of SBOM-sharing solutions.

CISA shines spotlight on SBOM sharing methods

(Source: CISA’s “Software Bill of Materials Sharing Lifecycle Report”, April 2023)

For more information about SBOMs:

VIDEOS

Understanding the Role of Software Bill of Materials in Cybersecurity Readiness (Linux Foundation)

SBOM is Coming: Why You Should Care and How You Can Help (Cloud Native Computing Foundation)

2 – Insecure open source components create supply chain risks

Here’s another reminder to be careful and perform due diligence when using open source software (OSS) components in your applications.

After analyzing almost 42,000 OSS components from the 44 most popular Apache Software Foundation projects, supply chain security management vendor Lineaje found that:

  • Direct software dependencies – those your code calls directly and overtly, and are thus easy to track and manage – make up only 10% of all OSS components
  • The other 90% are so-called transitive, or indirect, dependencies, which are those called by your direct dependencies, or by other indirect dependencies

Transitive dependencies are less visible, and thus more difficult to detect and check for security issues, such as unpatched vulnerabilities.

Insecure open source components create supply chain risks

Lineaje, an early-stage startup in which Tenable Ventures is investing, also found in its analysis that:

  • 68% of the analyzed OSS components weren’t developed under the Apache Software Foundation umbrella
  • 82% of the OSS components are “inherently risky” because of vulnerabilities, security issues, weak code quality and concerns about their maintenance
  • Slightly over 64% of vulnerabilities detected in these OSS components can’t be fixed because no patches have been released for them
  • Another almost 26% of the vulnerabilities do have fixes but are in “deep transitive dependencies” which developers can’t patch
  • 3% of the OSS components were of unknown origin, and 5.3% came from a “dubious” origin

For more details, download Lineaje’s report “What’s in Your Open Source Software?” and check out an infographic.

For more information about OSS security:

VIDEO

Open Source Security and the OpenSSF’s Best Practices WG (Open Source Security Foundation)

3 – Version 1.0 of supply chain security spec SLSA is out

And clearly this week we’ve got a fever and the only prescription for it is more cowbell– sorry, more supply chain security news!

The Open Source Software Security Foundation (OpenSSF) this week issued the “stable release” version 1.0 of the Supply Chain Levels for Software Artifacts framework, better known as SLSA.

In the works for about two years, SLSA provides specs and guidelines for protecting software supply chains, which have become an attractive target for attackers. In these attacks, a threat actor stealthily compromises a software product that its maker then unwittingly distributes to its users via legit channels, as happened in the SolarWinds breach.

SLSA Framework Version 1 Released

Version 1.0 represents a significant development of the framework, including changes intended to make it easier to adopt, according to OpenSSF. Specifically, SLSA’s level requirements, previously in a single track, are now split into multiple tracks – each focused on one area of the software supply chain.

SLSA aims to help both software makers and users by providing:

  • A common vocabulary for software supply chain security
  • A way to evaluate the integrity of the software artifacts you use
  • An actionable security checklist
  • A way to measure compliance efforts

To get more details about SLSA 1.0:

4 – Are you consolidating cyber vendors? If so, why?

Those were two questions we asked participants at a recent Tenable webinar about the benefits of a unified exposure management platform. Check out how they answered. 

Tenable cyber vendor consolidation poll chart1

(Source: 35 webinar attendees polled by Tenable, March 2023)

Tenable cyber vendor consolidation poll chart2

(Source: 37 webinar attendees polled by Tenable, March 2023. Respondents could choose more than one answer.)

For more information about cyber vendor consolidation and exposure management platform benefits, check out these Tenable resources:

5 – McKinsey: Cybersecurity flaws hinder IoT adoption

Cybersecurity concerns remain a drag on the use of internet of things (IoT) products by businesses.

Security flaws and weaknesses ranked as the top impediment to IoT adoption by enterprises, according to a McKinsey survey of enterprise tech buyers.

Specifically, 32% of 117 respondents cited cybersecurity as the main roadblock for IoT adoption and spending. These respondents indicated they would boost their IoT budget and deployment by 25% or more if their cybersecurity concerns were addressed.

Cybersecurity flaws hinder IoT adoption says McKinsey(Source: McKinsey’s “Cybersecurity for the IoT: How trust can unlock value”, April 2023)

“Cybersecurity risk multiplies due to the interconnectedness of IT and operational technology within the IoT, especially in use cases that involve the transmission of critical data or the operation of critical business processes,” reads a McKinsey article about the survey results.

For more information about IoT cybersecurity challenges and best practices:

VIDEO

Do IoT Devices Make Your Network Unsecure? (Cyber Gray Matter)

6 – How to protect quantum computers from cyberattacks

When cybersecurity experts discuss quantum computers, which are expected to ship by 2030, they focus on how attackers could use these super-powerful machines to cause mayhem, such as to break public-key cryptographic algorithms and steal confidential data.

Less attention has been paid to how organizations that in the future use these systems for legitimate purposes should protect them from attackers. That’s the topic of the article “Cybersecurity of Quantum Computing: A New Frontier” from Carnegie Mellon University’s Software Engineering Institute (SEI).

“If quantum computers are to become such valuable assets, it is reasonable to project that they will eventually be the target of malicious activity,” wrote Thomas Scanlon, senior cybersecurity engineer and researcher at SEI’s Computer Emergency Readiness Team (CERT) division.

How to protect quantum computers from cyber attacks

Scanlon outlines six key areas for future quantum security research:

  • Building large-scale secure control systems to prevent intrusions
  • Securing high-performance multitenant and distributed systems
  • Understanding potential attack vectors
  • Developing formal safety and security computing methods
  • Constructing a multi-layered instrumentation framework
  • Developing tools to verify and control quantum algorithms

“Increased quantum deployment will raise many technical questions about how data is prepared and transferred to quantum computers, how algorithms are implemented in quantum computers, and how quantum computing results are returned and verified,” Scanlon writes.

For more information about quantum computing’s cybersecurity issues:

VIDEO

Post-Quantum Cryptography: the Good, the Bad, and the Powerful (U.S. National Institute of Standards and Technology)

Quantum Computers Explained (Cleo Abram)

Cybersecurity in the Quantum Future (Center for Strategic & International Studies)


Viewing all articles
Browse latest Browse all 1935

Trending Articles