Integrating SSC Security into DevSecOps with NIST SP 800-204D
Derek Fisher
Cybersecurity Strategist | Author & Educator | Speaker & Advocate for the Next Gen of Cyber Pros
Stop me if you heard this, but Software Supply Chain (SSC) is a critical concern in #cybersecurity. All those libraries, components, SaaS, and third parties we use to build products come with risk. With the #nist publication SP 800-204D on integrating SSC security
From the attacker’s perspective, supply chain attacks allow them to exploit legitimate, less secure channels to enter highly regulated environments and cause widespread damage quickly due to the interconnected nature of supply chains. The attacks leverage the inherent trust in these interconnection channels for rapid dissemination, making them particularly effective for achieving malicious objectives with potentially devastating impacts. A “force multiplier” if you will.
Well start with how the NIST Special Publication defines the basic compromise paths an attacker can take:
The worse part? Once inside the SSC, the attacker can target assets like source code, credentials, and sensitive data like PII, PHI, IP, and cryptographic materials. Development environments, rich in these assets, are critical points which make juicy targets. Organizations must identify these assets and secure them with controls like access restrictions, multi-factor authentication
Exploiting the SSC
So how does an attacker take advantage of an insecure SSC? As described in the NIST publication, an array of cybersecurity threats exist that can target various stages of the software development lifecycle (SDLC) within the organization. These threats include the injection of malicious code or dependencies into software projects, unauthorized access through stolen credentials, and the manipulation of code repositories to compromise sensitive data. Attackers leverage techniques such as forking and submitting pull requests to introduce vulnerabilities discreetly. This can be seen clearly when we look at opensource projects that allow for public contributions where there might be minimal oversight. The goal of these exploits is to undermine the integrity and security of software systems and deliver that force multiplier by compromising once with a large impact.
Securing the SDLC
I hope you are sitting down when you read this, but…SBOMs are not the answer. They are certainly a part of it, so don’t throw them out just yet, but they fall short in providing detailed vulnerability or defect information. This limitation means SBOMs alone are not enough for comprehensive vulnerability management, as they primarily offer just a component list for further analysis.
You may be sensing a theme here, but there is not a single tool or process to support security in the SSC. However, creating a secure SDLC will reduce the likelihood of security incidents stemming from an insecure SSC. These measures are vital for ensuring the confidentiality, integrity, and availability of the supply chains by assessing security risks and implementing appropriate defensive measures throughout the lifecycle.
Key measures in the SDLC included in the NIST publication are:
领英推荐
Note: If you need help in developing or maturing an application security program…there is a phenomenal book written by Derek Fisher called the “Application Security Program Handbook” that walks through this and more!
So, we have SBOMs, a secure SDLC, and I’d be remiss if I didn’t call out the controls highlighted in the NIST publication related to source control management (SCMs) as well. These tools are used to push/pull code regularly by developers via their development environment within defined SDLC processes. Access policies vary between open-source (minimal restrictions) and proprietary projects (strict access rules).
SSC, DevSecOps, and the CI/CD
How does all this play into the CI/CD pipelines and DevSecOps?
There is a lot to unpack in the NIST publication, so I’ll stick to the high-level points for brevity’s sake. First a bit of a refresher on DevSecOps and CI/CD.
Good news, the NIST publication provides detailed strategies for defending CI/CD pipelines, emphasizing measures like strengthening execution environments, establishing clear roles and permissions, leveraging automation tools
The one key takeaway is that if you are not securing the factory that produces your product, you have less confidence in the product being produced.
Where does that leave us?
Every aspect of SSC, from code inception to application deployment, bears weight on the final software product's security which necessitates robust measures at each step. The NIST publication certainly provides a well-defined set of guidance and implementation steps for organizations looking to secure their products. To that end organizations should focus on these key takeaways:
While there's no one-size-fits-all solution for SSC security, adopting a holistic approach, as outlined in NIST SP 800-204D, offers a robust framework to safeguard against evolving cyber threats across the software supply chain.
Sa?a Zdjelar will actually be sharing his thoughts on this topic tomorrow with the IT GRC Forum: https://www.brighttalk.com/webcast/5586/602662
Application and Software Supply Chain Security
1 年Thanks for the mention Derek. The one thing everyone needs to know is that Software Supply Chain Security is an umbrella term like Application Security. It is not one "thing" or "technology". SSCS has many different approached from securing the open source, CI/CD pipeline, or binary analysis of the compile package itself. To truly address SSCS you need multiple approaches to ensure your SSCS program is comprehensive. For some more info on different SSCS concepts check out my video glass board series Reversing Glass via this link https://www.reversinglabs.com/reversingglass
DevSecOps and AppSec Specialist | Red Team | CEH | CCISO (in progress) | Offensive Security Post Graduated | 2x CREA (Computer and Civil Engineer) | 3x AWS | 2x Veracode | Industrial Automation
1 年Obrigado por compartilhar
Cybersecurity Strategist | Author & Educator | Speaker & Advocate for the Next Gen of Cyber Pros
1 年And if you need more information on supply chain security, check out Software Transparency by Chris H.????