Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
No Result
View All Result
No Result
View All Result
Home Supply Chain Updates

Supply chain security guides are good, but checkboxes never deliver

usscmc by usscmc
March 1, 2021
Supply chain security guides are good, but checkboxes never deliver
Share on FacebookShare on Twitter

The hackers who compromised SolarWind’s Orion network-performance monitoring software pulled off one of the most thorough compromises of a target that has ever been carried out, and they did this by subverting a vendor’s software supply chain.

The attack has made thinking about (or at least talking about) the security of software supply chains trendy. Lots of meetings are being held to discuss the topic. I have already sat—or rather, Zoomed—through many.

Many enterprises are requiring all of their software vendors to fill out long questionnaires of dubious value so that they can reassure their auditors that they have taken commercially reasonable steps to ensure that they haven’t suffered a similar compromise. Software vendors in turn are requiring their subcontractors to fill out such questionnaires, and so on and so on.

It’s not hard to imagine this trickling down to the developers, who, because they can’t make someone else fill out a long questionnaire, will instead annoy the people at fast food drive-through windows by asking them about their supply chains.

“Hello, sir, may I take your order?”

“How do you know that fully refined paraffin wax was used to make your drink cups instead of a less expensive semi-refined version?”

“What?”

“Oh, never mind.”

But with timing that’s so perfect that it must have started a conspiracy theory or two somewhere on the Internet, NIST just released NISTIR 8276, “Key Practices in Supply Chain Risk Management,” which talks about best practices that you can use to ensure that your software supply chain is reasonably secure.

Being a good summary of current best practices for doing this, it’s a document that you should take a look at if you’re interested in this topic. It identifies eight key practices that can be used to implement a robust cyber supply chain risk management program (S-SCRM). 

Supply chain management best practices

NIST’s eight key practices for supply chain security are:

  • Integrate C-SCRM across the organization
  • Establish a formal C-SCRM program
  • Know and manage critical suppliers
  • Understand the organization’s supply chain
  • Closely collaborate with key suppliers
  • Include key suppliers in resilience and improvement activities
  • Assess and monitor throughout the supplier relationship
  • Plan for the full lifecycle

It also has a list of 24 recommendations for how to improve your own S-SCRM. They’re on page 13 of the document and are too long to include here. They make lots of sense and are the sorts of things that everyone should probably seriously think about doing.

But NISTIR 8276 should also remind you of Peter Allen singing “Everything Old Is New Again.” NIST has been publishing documents of one form or another since at least 2012 that talk about the security of software supply chains and even has a significant project dedicated to the problem. In addition to the recent NISTIR 8276, NIST has published:

And it’s not just NIST that has thought about how to deal with software supply chain issues. The people at Carnegie Mellon’s Software Engineering Institute also have had a thought of two, as demonstrated by “Evaluating and Mitigating Software Supply Chain Security Risks” (2010), “Software Supply Chain Risk Management: from Products to Systems of Systems” (2010), and “A Systemic Approach for Assessing Software Supply-Chain Risk” (2013).

There’s even an ISO standard on the topic: ISO/IEC 27036-3:2013, “Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security” (2013).

These documents have lots of good information, which is what you get when smart people have been working on a topic for a while. But the issue of software supply chain security, as well as how to deal with it, isn’t new. The NIST publications alone go back several years. And if there’s an ISO standard for something, that probably means that it’s been around for more than a few years.

Is that Peter Allen I hear singing?

But if we know so much about securing software supply chains, how was it possible that an attack as effective as the one on the SolarWinds product was possible?

A likely explanation for this is that the very existence of the NIST documents (and ones like them) caused this. But this isn’t a reflection on the usefulness of what NIST has done. It’s just that when it comes to security, people think they can get by checking a series of boxes.

“Yes, we comply with Requirement 1.” 

“Yes, we comply with Requirement 2.”

…

“Yes, we comply with Requirement 96.”

“That’s the last one. We’re secure! What a relief!”

But with this approach, checking the boxes often becomes the goal, while the more meaningful goal of getting effective security is generally forgotten about.

Chuck the checkbox approach

Information security is a complicated and hard job. It’s so complicated that it’s essentially impossible to get it right all of the time. But in this complex and ever-changing field, there seems to be at least one universal principle that’s always true: You never get a meaningful level of security by focusing on checking a series of boxes. Never.

But because that’s easier than solving the hard problem of securing our software supply chain, it’s likely that we’ll see more box-checking in the future, and the security of our software supply chain won’t get any better.

That means we can expect more compromises in the future that will be just as effective as the SolarWinds compromise was—meaning more Zoom meetings will be in my future. More questionnaires that everyone has to fill out will probably follow. And the guys selling hamburgers may have to answer even more questions from annoyed developers.

But I really hope that I’m wrong about this.

Keep learning

usscmc

usscmc

No Result
View All Result

Recent Posts

  • How Hapag Lloyd captured a major market share in the Container Shipping Industry in USA
  • Why USA’s East Coast is the Favorite Destination for Manufacturing Companies
  • How Trade Relations Between the USA and UK Improved After Keir Starmer Became Prime Minister
  • Tips and Tricks for Procurement Managers to Handle Their Supplier Woes
  • The Crazy Supply Chain of Walmart Spanning Across the Globe

Recent Comments

  • Top 5 Supply Chain Certifications that are in high demand | Top 5 Certifications on Top 5 Globally Recognized Supply Chain Certifications
  • 3 Best Procurement Certifications that are most valuable | Procurement Newz on Top 5 Globally Recognized Supply Chain Certifications

Archives

  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • September 2019

Categories

  • Global News
  • Supply Chain Updates

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Antispam
  • Contact Us
  • Disclaimer
  • Home
  • Privacy Policy
  • Terms of Use

© 2025 www.usscmc.com

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us

© 2025 www.usscmc.com