With cybersecurity guidelines coming down from the executive branch, industry and policymakers clearly both see the extent of the cyberattack problem. Take a look at the contents of the Biden administration’s May executive order and what it means for people working in the industry, especially in regards to supply chain attacks.

The executive order covers a wide range of issues, including sharing threat information, public/private partnerships and closer teamwork with federal partners. It puts the onus on the federal government to take at least some responsibility for protecting digital systems, establishes working groups and takes existing NIST guidelines as formal instructions around some government agencies. Today, we’ll focus primarily on part 4 of the order, which covers software supply chain security. Why is this important, and how can the industry use it to make our jobs easier?

Why Attackers Use Supply Chain Attacks

Supply chain attacks get their own section for a reason. They’re a major feature of the security landscape right now. As we learned during the work-from-home era, functioning interconnectivity is critical to keeping businesses running. Much of that interconnectivity relies on the software supply chain. As a result, you no longer have to worry about just your own problems. You also have to take into account the problems of those you rely on. Put another way, your risk footprint just got a whole lot bigger. Plus, a wide group of stakeholders will feel that risk.

That is the appeal of supply chain attacks. Threat actors know they can force multiply an attack, hitting a wide group of stakeholders all at once. Attackers see supply chain attacks as highly rewarding.

If you want to stop an attack, you need to understand what is driving it. You see, threat actors are still operating ‘a business’, albeit a dishonest one. They are looking for a reward for their efforts. That reward comes in many forms, including but not limited to money, influence or suppression and pressure campaigns, just to name a few. Just like any other aspiring or successful business person, attackers will seek means to maximize their return on investment. Software supply chain attacks give them just that.

That’s why the software supply chain needs to be top of mind for both developers and users.

Securing Against Software Supply Chain Attacks

Section 4 of the order gives us a good primer on hardening the software supply chain, outlining nearly two dozen action items. Let’s look at some of those areas in a bit more detail, specifically the three general areas directed at NIST guidelines:

  • Criteria to evaluate software security
  • Criteria to evaluate the security practices of the developers and suppliers themselves
  • New tools or methods to demonstrate they follow secure practices.

Because safety is always a hard sell. That is, just up until the moment right before you have been bitten. In order to have an honest and candid dialogue about supply chains, we need to address the two elephants in the room. First, good code is not cheap, as it requires serious talent to develop and test.

Second, being productive is still taking precedent over security. If we were at a stage where enough organizations had adopted security by design principles, one could argue that attackers are simply better at using the tech than their victims. However, we’re far from that adoption being complete. Instead, we’re still at the step of making business decisions about how to fit our defenses in. Therefore, it is worth going back to the old favorite: what amount of risk are you willing to take on? It’s all about risk management, every single time. You have to know that before you can even start to talk about defending against supply chain attacks.

Setting Standards

One major outcome of the executive order is baselining. People may disagree what would constitute ‘critical’, but at least we have a formal definition on the books now.

As cybersecurity issues sometimes feel as though we are Alice in Wonderland, it is worthwhile to invoke the words of Lewis Carroll: “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”

Let’s, therefore, begin with the first two supply chain security essentials defined by NIST: definitions of critical software and suggested minimum standards for testing software source code.

Critical software as mentioned in the executive order is defined as any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes:

  • Is designed to run with elevated privilege or manage privileges
  • Has direct or privileged access to networking or computing resources
  • Is designed to control access to data or operational technology
  • Performs a function critical to trust
  • Operates outside of normal trust boundaries with privileged access.

One of the first steps to achieving cyber resilience against supply chain attacks requires you to know what to protect. This is the core of the all-hazards approach. Therefore, anything that ‘looks’ like the above is deemed critical and must be secured. The attached guide goes into greater detail on what to focus on first (in this case, on-premises systems, with hybrid and cloud systems later) and provides a handy table on software classification. Again, this is more of ‘begin at the beginning’ type material required to level-set ourselves. Call it the ‘what’.

Next, we move to the ‘how’.

If You Haven’t Tested Your Plan, You Don’t Have a Plan

Another short-term result of the order was for NIST to develop a minimum standard for vendor or developer verification of code. This is more of the ‘same song sheet’ type material, but if we can actually get to a minimum level of verification, we will be in a better place (more detailed NIST document here). We are not there yet, and we may never get there because of the two elephants, but this is a step towards something like an Underwriters Laboratories certification for products and code. (For those unfamiliar with the UL label, it is a safety consulting and certification company that carries out performance and safety testing on products.)

But does a best practices authority for software like this actually exist? Not yet, but in the future, it could become a force on how we address software flaws and risks that can lead to supply chain attacks. Think about the downstream effects: if safer and more secure code replaces vulnerable code, all of a sudden, your risks change, including those that are people-intensive. The pressures on your managed services providers, in-house team, security operations center and incident responders, at least in theory, should all go down (and do wonders for burnout rates). Imagine your team only has to worry about 1,000 fires instead of 100,000 fires. But again, this type of sea change requires addressing the two elephants in the room.

Why the Executive Order Is Heavy on the Basics

While covering supply chain attacks, section 4 of the executive order also discusses some more issues we continually hear about: using administratively separate builds, auditing relationships, multi-factor authentication, minimizing dependencies, monitoring and, of course, encryption. Why are these being called out if we should know them already? It is because we keep on missing the basics and lack that culture of cybersecurity in the workplace. If money is the first elephant, the culture issue is the second.

… And What It Doesn’t Do

There’s also the problem of putting this into practice. While the executive branch can enforce some guidelines over the federal government, there is no legal mechanism to ‘write well’ yet. Therefore, it is going to have to fall on the software industry to make a business decision. Otherwise, if the product failures or mishaps keep piling up, it will start to directly cost them money.

In the end, that may be the motivation that drives good security in the supply chain. Right now, the attacker sees supply chain attacks as a great return on investment. We need to turn the tables on them. Make it expensive, difficult and time-consuming for them to attack the supply chain. They may just back off this specific fight.

More from Government

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Updated SBOM guidance: A new era for software transparency?

3 min read - The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains.In December 2023, the National Security Agency (NSA) published new guidance to help organizations incorporate SBOMs and combat the threat of supply chain attacks.Let’s look at how things have developed since Biden’s 2021 order and what these updates mean for…

Roundup: Federal action that shaped cybersecurity in 2023

3 min read - As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level.These stories highlight the challenges federal agencies faced in securing digital infrastructure in the past year and explore the evolving nature of cyber threats, as well as the innovative responses required to address them.New White House cybersecurity strategyThe White House’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today