无忧传媒

Reducing Software Supply Chain Risks with SBOMs

Written by Jarrett Bunnin

What Are SBOMs?

To be clear, SBOMs are much more complex than just a receipt, or even an accounting ledger. (And if you have ever done accounting, you know these tribulations.) What鈥檚 more, there isn鈥檛 yet a formal legal framework for SBOMs. There is, however, a consensus framework that is largely accepted by the cybersecurity community. And that鈥檚 a start.

In 2018, this framework emerged from a multistakeholder process led by the National Telecommunications and Information Administration (NTIA). The framework was born from a collaborative, open-source community effort to determine industry agreed-upon standards for conducting SBOM analyses. SBOMs being used by industry and government have come a long way since then. And is driving further standardization.

Published May 12, 2021, the EO mandated that NTIA generate a list of minimum elements required for an SBOM to be considered viable for an organization to use. three minimum elements that are considered, 鈥渆ssential pieces that support basic SBOM functionality and will serve as the foundation for an evolving approach to software transparency.鈥

Minimum Elements
Data Fields

Document baseline information about each component that should be tracked:

  • Supplier
  • Component Name
  • Version of the Component
  • Other Unique Identifiers
  • Dependency Relationship
  • Author of SBOM Data
  • Timestamp
Automation Support

Support automation, including via automatic generation and machine-readability to allow for scaling across the software ecosystem. Data formats used to generate and consume SBOMs include:

  • Software Package Data eXchange (SPDX)
  • CycloneDX (CDX)
  • Software Identification (SWID) tags
Practices and Processes

Define the operations of SBOM requests, generation, and use including:

  • Frequency
  • Depth
  • Known Unknowns
  • Distribution and Delivery
  • Access Control
  • Accommodation of Mistakes

How Can SBOMs Add Value?

Software Lifecycle & Bill of Materials Assembly Line

These minimum elements were designed to comply easily with changes in code, which many organizations experience on a regular basis, and as such would require updates to the SBOM throughout the software lifecycle (see illustration below).听 听

The three SBOM formats (SPDX, CDX, and SWID) are commonly accepted by industry as best-practice standards. However, it is important to realize that while these formats may give overarching guidance, it is up to each specific organization using these formats to determine how to adjust them for the 鈥渂est fit.鈥澨

SBOMs are intended to give software producers, buyers, and operators a greater understanding of the supply chain. Armed with this understanding, organizations will be better able to track down known or emerging vulnerabilities and risks, enable security by design, and make informed choices about software supply chain logistics and acquisition issues. And that is increasingly important because sophisticated threat actors now see supply chain attacks as a go-to tool for malicious cyber activity.听听

National Security Implications

The 2017 NotPetya attack and more recent attacks involving SolarWinds, Microsoft Exchange servers, and the Log4Shell vulnerability have greatly increased attention to software supply chain security. And the U.S. intelligence community鈥檚 latest annual听worldwide threat assessment听warns that increasing connections among countries鈥攊ncluding听鈥攈ave created 鈥渘ew opportunities for transnational interference and conflict.鈥

While criminal groups have executed relatively less complex software supply chain attacks, it鈥檚 advanced persistent threat (APT) actors who generally have the will and skill needed to execute technically complex, long-term campaigns for software supply chain attacks that threaten national security, according to the . Common attack techniques, which can be used in combination, include hijacking software updates, undermining code signing, and compromising open-source code.

The stakes could not be higher: It鈥檚 vital for the federal听government to have secure software to perform critical functions, which is why an entire section of听EO 14028 is devoted to software supply chain security. In addition, the听White House鈥檚 March 21 statement听on protecting against cyber attacks from Russia includes a call to use SBOMs to bolster national cybersecurity over the long term. The administration also recently听issued a report on boosting the resilience and security for U.S. information and communications technology (ICT) supply chains. The report underscores the need for concerted efforts across the public and private sectors.

How Can SBOMs Counter Software Supply Chain Threats?

To envision how SBOMs fit in an integrated effort to counter software supply chain risks, start with a well-known military symbol: the trident. Imagine a spear with three sharp prongs to fend off digital foes. The longest prong in the center is a set of techniques used for听hunting advanced persistent threats. And on each side is another prong: SBOM implementation on the left and augmented data risk management on the right.听

This Trident Framework depicts the sort of cross-functional effort needed to counter software supply chain threats. It shows how enterprises can build a unified defensive effort involving cybersecurity experts, acquisition professionals, and the chief information security officer. The first step for an organization aiming to create this digital trident is to implement an SBOM framework that meets NTIA鈥檚 minimum elements.

Wielding the Trident Framework: 5 Tips

5 Tips for Wielding the Trident Framework

1.听听听听 Ensure your organizational cyber policies and procedures allow for successful fast-moving implementation of the framework across software that touches all offices and teams of your organization, and consistent recurrence of it. Organizations, particularly in government, often do not have the appropriate operational processes in place before implementing something like NTIA鈥檚 minimum elements.听

2.听听听听 Engage your employees consistently and regularly around ways to detect malicious activity through active cyber-awareness programs.听

3.听听听听 Use APT techniques to discern vulnerabilities in tandem with the SBOM analyses as best benefits your organization. Identify vulnerable versions of software and patch immediately. In addition, conduct persistent, frequent, and thorough threat hunt activities on all assets identified as at risk based on the SBOM analysis. The hunt should include all networks, assets, and resources that are adjacent to the high-risk assets to identify lateral movement, reconnaissance, persistence, or exfiltration as there may be actors hiding inside the network.听

4.听听听听 Use data collected from the SBOM collection and analysis process and incorporate it directly into your risk management processes to determine software supply risks and risk tolerance for your organization. This means also tying in mechanisms for applying countermeasures, mitigations, or other risk control activities. In addition, conduct cyber kill-chain post-mortem analysis and incorporate regularly when acquiring new software or planning a new project launch as part of the broader enterprise risk management program.听

5.听听听听 Adopt the SBOM concept in concert with a 鈥渮ero trust鈥 cybersecurity mindset. Zero trust is driven by three core principles: Assume a breach; never trust, always verify; and allow only least-privileged access based on contextual factors.

Achieving Prevention with Holistic Preparation

Now that you know about SBOMs and how to put them in action, it鈥檚 time to get started. aren鈥檛 hesitating to attack global supply chains. And U.S. organizations can鈥檛 afford to delay implementing SBOMs.听After all, enterprise strategies in place only go only as far as their agility allows. You can help your organization implement an SBOM framework for widespread use among IT acquisition functions and other offices involved in acquiring, sustaining, and reviewing software materials. Along the way, feel free to share this article with others if you find it helpful.听

To sign up for more technical content like this blog post

And to learn more about 无忧传媒鈥檚 comprehensive approach to effectively mitigating supply chain cyber risk

This blog series听is brought to you by 无忧传媒 DarkLabs. Our听DarkLabs听is an elite team of security researchers, penetration testers, reverse engineers, network analysts, and data scientists, dedicated to stopping cyber attacks before they occur.

This article is for informational purposes only; its content may be based on employees鈥 independent research and does not represent the position or opinion of 无忧传媒. Furthermore, 无忧传媒 disclaims all warranties in the article's content, does not recommend/endorse any third-party products referenced therein, and any reliance and use of the article is at the reader鈥檚 sole discretion and risk.

1 - 4 of 8