Software Supply Chain Security
@Sonatype

Software Supply Chain Security

Enhancing software supply chain security is a priority issue for the open-source community. Recent exploitations such as CodeCov, SolarWind, Accellion and few others have damaged the business financially and loss of trust.

Here I would like to start by sharing findings from 8th Annual Report on State of the Software Supply Chain by Sonatype.

No alt text provided for this image
Sonatype's 8th Annual State of Software Supply Chain

After careful analysis of findings from this report, this article reflects on the good practices that create ideal outcomes, and likewise, the poor practices that produce problems. As always, the goal of this article and subsequent is to provoke practices at developer level that improve software supply chain security and create fulfilling work experiences based on followings:

  • Ongoing growth of the software supply chain, as well as persistent security concerns.
  • Insights on choosing the best dependencies for projects.
  • Developer behavior and recommendations.
  • A look at enlightened supply chain management and perception versus reality for maturity.
  • Current and upcoming regulation status on an international level.

Let us understand it one by one:



Open-source Supply, Demand and Security

No alt text provided for this image

The supply of open source continues to grow at an impressive rate. The expansion of the overall volume available combined with the increase in consumption means threats also continue to expand in scope, impact, and volume.

As per the report software supply chain attacks increased another 633% YoY, averaging a 742% average annual increase in software supply chain attacks over the past three years.

Now let us have a look on some of key tactics used in software supply chain attacks.

  1. Dependency confusion: A form of attack relying on spoofing internal package names and publishing them to an open source registry with an abnormally high version number.
  2. Malicious code injections :A type of attack that leverages a popular component as a vector for the malicious payload. It relies on an adversary gaining access to the source code of a library either through compromise or pretending to be a benevolent open source committer.
  3. Typosquatting: An attack that relies on the simple technique of misspelling the name of a popular component and waiting for developers to download the wrong one mistakenly.
  4. Protestware: An attack where a maintainer deliberately sabotages their own project to cause harm or malfunction in a way that disrupts its adopters’ work.?

Lessons learned from Log4Shell

  • It’s not only the direct inclusion of the code that matters. It’s also the indirect inclusion of all kinds.
  • Dependencies may be pulled in as part of a transitive dependency chain for a given program.
  • Dependencies might also be embedded into other software in use.
  • It’s not enough to know where developers are using Log4j-core


Thanks for reading this article, in subsequent post I will focus on other attributes for software supply chain security.

Please share your feedback and suggestion in comment box. Do like and share with others if you find this work interesting.

Arunkumar VR Anish T S Priyamvadha Vembar Prakash Ramasamy Sureshkumar VS Tamilselvan Sellappan Harishankar VS Major Satish Bhatt Dr. K Rajesh Rao Lakshmi Prathyusha Vedantam

Nihal P. #bgsw #softwaresupplychain #softwaresupplychainsecurity #devsecops #opensourcesoftware #cybersecurity #cybersecurityawareness #cybersecuritytips


Reference: Open Source Dependency Management: Trends and Recommendations (sonatype.com)

Rakesh Ranjan

Gen AI Expert |AI in Cyber Security |Cloud Security | Cyber Security

1 年

In last 3 years there is huge increase is software Supply Chain attack. As per report published by Sonatype " software supply chain attacks increased another 633% YoY, averaging a 742% average annual increase in software supply chain attacks over the past three years." Its time for Security Architects and security practitioners to pay attention of transitive dependencies and secure software supply chain. l

回复

要查看或添加评论,请登录

Rakesh Ranjan的更多文章

  • The top five challenges a semantic layer can solve

    The top five challenges a semantic layer can solve

    In recent past the term semantic layer is frequently pop-up in data-driven AI talks and articles. It has been invented…

    1 条评论
  • Holiday Reading

    Holiday Reading

  • Amazon GuardDuty : An Intelligent Threat Detection Service

    Amazon GuardDuty : An Intelligent Threat Detection Service

    October Cyber Security Awareness Month continuation to my previous post on understanding security services available on…

    2 条评论
  • Empowering with Actionable Tips and Emerging Trends

    Empowering with Actionable Tips and Emerging Trends

    I have started awareness campaign yesterday by this post Few of my friends appreciated it and suggested to consider it…

    4 条评论
  • October: Cyber Security Awareness Month

    October: Cyber Security Awareness Month

    October is being celebrated as #CyberSecurityAwareness Month. As being practitioner in the domain of #CyberSecurity and…

  • Rise in Automotive Hacking

    Rise in Automotive Hacking

    With advancement in technologies and adaption of AI introduces new challenges in cybersecurity trends as news of data…

    1 条评论
  • CIO priority: Software Supply chain Security

    CIO priority: Software Supply chain Security

    Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply…

    2 条评论
  • Guide for building Effective Team

    Guide for building Effective Team

    As being software architect, my main responsibilities lie in creating technical architecture and making effective…

  • Enterprise Integration | solution approach |Mule

    Enterprise Integration | solution approach |Mule

    In modern IT landscape when the focus of #enterprisearchitect is there on #digitalbusinesstransformation, it always…

  • Architecture or Designer ?

    Architecture or Designer ?

    many a time I got this question by practitioners that how the role of software Architect #enterprisearchitecture…

社区洞察

其他会员也浏览了