{"id":14185,"date":"2024-02-19T08:16:09","date_gmt":"2024-02-19T11:16:09","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14185"},"modified":"2024-02-19T08:16:09","modified_gmt":"2024-02-19T11:16:09","slug":"la-transparencia-del-software-es-clave-para-una-gestion-eficaz-de-los-riesgos-gubernamentales","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14185","title":{"rendered":"La transparencia del software es clave para una gesti\u00f3n eficaz de los riesgos gubernamentales"},"content":{"rendered":"<p>El software adquirido de terceros a menudo plantea un desaf\u00edo para los programas de gesti\u00f3n de riesgos debido a la falta de visibilidad de los componentes del software y sus vulnerabilidades. Para abordar este desaf\u00edo, CISA, NSA y sus socios publicaron un informe: &#8221; Seguridad de la cadena de suministro de software: pr\u00e1cticas recomendadas para el consumo de la lista de materiales de software &#8220;. El informe establece las mejores pr\u00e1cticas para el uso de SBOM, que son documentos que enumeran los componentes de software y sus atributos, como versiones, licencias y dependencias.<\/p>\n<hr \/>\n<p>Software procured from third parties often poses a challenge for risk management programs due to the lack of visibility into the software components and their vulnerabilities. To address this challenge, the CISA, NSA and partners published a report: \u201c<a href=\"https:\/\/media.defense.gov\/2023\/Nov\/09\/2003338086\/-1\/-1\/0\/SECURING%20THE%20SOFTWARE%20SUPPLY%20CHAIN%20RECOMMENDED%20PRACTICES%20FOR%20SOFTWARE%20BILL%20OF%20MATERIALS%20CONSUMPTION.PDF\" target=\"_blank\" rel=\"noopener\">Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption<\/a>.\u201d The report sets forth the best practices for using SBOMs, which are documents that list the software components and their attributes, such as versions, licenses and dependencies.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">However, SBOMs are not an end in themselves, but a means to software transparency. Software consumers, such as government agencies, demand software transparency to make informed risk management decisions. The SBOM has been the focus of conversation as the means by which software producers share information with software consumers.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Therefore, to advance software transparency, both software consumers and producers need to adopt maturity models and targets that guide their practices and expectations. We recommend a four-phased maturity model for software transparency, which consists of the following stages:<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><b>Establishing expectations<\/b>: Software consumers and producers need to agree on the level and frequency of software transparency, as well as the format and delivery of SBOMs. Software consumers should not request SBOMs only for one-time supply chain risk assessment, but for continuous monitoring and updating of software inventory and security.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">To be on the right track, the following questions need to be answered:<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Where can I pick up your SBOM for each new software release?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Is there a standard location where I can get it?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 What is the process by which I consume new information automatically? Do I need to build a process to consume new information?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 How will you share information about your own risk assessment of vulnerabilities?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 What level of transparency is expected and how complete of an SBOM is expected?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><b>Making software transparency actionable<\/b>: Software consumers need to maintain an accurate and up-to-date inventory of their software assets, and map them to the corresponding SBOMs. This enables them to identify the owners and locations of software applications, and implement corrective actions when needed. Software producers need to support software consumers in this process by providing timely and accurate SBOMs, and by notifying them of any changes or issues in software components.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><b>Making risk assessment repeatable<\/b>: In this phase, software consumers need to define trigger events for conducting risk assessment of software, such as new software releases, vulnerability disclosures, or configuration changes. Software consumers also need to standardize their risk assessment methods and criteria, and engage with software producers to verify and validate the impact and exploitability of vulnerabilities in software components. Software producers need to cooperate with software consumers in this process, by providing relevant and reliable information, and by offering remediation options and guidance.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">It\u2019s also important for risk management teams to ask themselves these questions:<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><i><b>What are the trigger events for risk assessment:<\/b><\/i><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 When a new software release is issued?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 When a security score falls below a certain level?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 For known exploited vulnerabilities?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><i><b>When do these triggers apply?<\/b><\/i><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Do I tier my suppliers and only engage with those above a certain tier?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Does a risk reduction campaign impact all of my suppliers?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><i><b>What are the most effective ways to engage with my suppliers?<\/b><\/i><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Do I expect my supplier to publish this information regularly or do I email them?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u2014 Do we assess on a schedule?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The SBOM guidance document suggests that a scoring system be created to help scale risk assessment practices and make them more repeatable. These scoring systems could help normalize trigger events and engagement practices with suppliers. But before an output such as a score can be created, its inputs must be defined. Practicing risk assessment based on triggered events<b>\u00a0<\/b>before a scoring system is put in place\u00a0will help prioritize and define the inputs of a scoring system.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><b>Governing the cost-effectiveness of software transparency<\/b>: Software transparency is essential for both consumers and suppliers, but it also requires cost-effectiveness and that\u2019s what the final phase of the maturity is all about.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Let\u2019s say I trigger a risk assessment for a critical COTS application and find that the security score of the SBOM deployed in production has dropped below a threshold. I need to contact my vendor to fix it. They may suggest upgrading, correcting the score, or updating the application to address the risk. If a vendor has already made updates, they can be automated. If not, I have to rely on risk assessment and relationship management.<\/p>\n<p>To reduce the cost of vendor engagement, I can use VEX (<a href=\"https:\/\/cyclonedx.org\/capabilities\/vex\/\" target=\"_blank\" rel=\"noopener\">Vulnerability Exploitability eXchange<\/a>), a tool that standardizes and streamlines vulnerability sharing and management across the software supply chain. However, maintaining VEX documents is expensive and demands transparency and commitment from both parties. Therefore, VEX automation depends on either setting clear expectations or lowering the cost of customer engagement. Until then, I have to follow the recommended practices that involve frequent communication and collaboration with vendors through emails or other customer-vendor collaboration applications.<\/p>\n<p>Software transparency needs to be cost-effective for both consumers and suppliers in order to be successful. As more government programs seek to get visibility across their third- and first-party applications, recommended practices will evolve into a maturity model. Ultimately, software transparency is going to be battle-tested.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/opinions\/2024\/02\/13\/software-transparency-is-key-to-effective-government-risk-management\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El software adquirido de terceros a menudo plantea un desaf\u00edo para los programas de gesti\u00f3n de riesgos debido a la falta de visibilidad de los&hellip; <\/p>\n","protected":false},"author":1,"featured_media":14186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14185"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14185"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14185\/revisions"}],"predecessor-version":[{"id":14187,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14185\/revisions\/14187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/14186"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}