For reasons we all know, software supply chain attacks took on new meaning near the end of 2020. This hasn’t changed over this year. One of the best modern ways to combat these cyberattacks is to integrate a secure software development framework (SSDF) into a vendor’s software development life cycle (SDLC). Why is this such an important way to prevent software supply chain attacks? And how can you put it in place?

Recent Cyberattacks Show Attackers’ Tactics

To illustrate, the following three supply chain attacks made headlines in the first half of the year.

Throughout December 2020 and January 2021, a firewall vendor released a patch for four vulnerabilities affecting its file transfer application. The new year began with dozens of businesses and government entities announcing they had suffered a breach as a result of the software flaws. Wired reported that many of those incidents involved extortion at the hands of the Clop ransomware gang.

Other attackers struck with four zero day flaws in an email server product. The software developer released patches to address the flaws on March 2 — after a “highly skilled and sophisticated actor” began exploiting the flaws as part of a series of attack campaigns. The software fixes didn’t prevent other threat actors from seizing on the weaknesses and spreading more malware strains.

In June, researchers uncovered software supply chain cyberattacks involving an Android emulator for PCs and Macs. Threat actors compromised the update mechanism and used it to distribute three different malware families. In doing so, the attackers infected an untold number of users who used the emulator to play Android games on their computers.

All three of the supply chain attacks involved similar techniques. Each of them involved some attempt by threat actors to perform network reconnaissance of their victims’ machines. This gave digital attackers crucial information that they could have used to exfiltrate sensitive data or engage in other attacks.

How the SSDF Figures Into the Software Supply Chain

The U.S. government is paying attention to software supply chain cyberattacks like these. The White House made improving software supply chain security one of the core objectives of an executive order released in May 2021. In addition, the Cybersecurity & Infrastructure Security Agency (CISA) partnered with the National Institute for Standards and Technology (NIST) to publish a resource around the topic of software supply chain attacks.

Let’s examine this in more detail below.

Defending Against Software Supply Chain Cyberattacks

In their guide, CISA and NIST discuss some of the most common types of supply chain cyberattacks. One of those tactics is hijacking update mechanisms, such as what we saw above. The resource goes on to recommend guidelines that customers can use to keep themselves safe before discussing how software vendors can minimize the risk of a supply chain compromise.

That’s where the SSDF comes in. It’s key to include an SSDF in a vendor’s SDLC. An SSDF consists of four types of practices that help secure the SDLC.

  • Prepare the Organization: In this stage, the affected business or agency must ensure that their people, processes and tech can support secure software development. They can do that by defining relevant rules for software development, adding relevant roles and responsibilities and putting a supporting tool chain in place, as well as defining criteria for secure software checks.
  • Protect the Software: Next, it’s time to safeguard software against tampering attempts and instances of unwanted access. As part of that process, you need to protect code, create a pipeline for making sure new software releases are trustworthy and archive and protect each software release.
  • Produce Well-Secured Software: Next, it’s time to develop secure software with a minimal number of flaws. Towards this end, your employees need to design software that matches your security needs and repair risks, verify that the design of their software complies with their software requirements and reuse secure software (when possible) instead of doubling up.
  • Respond to Vulnerabilities: The final duty is to identify flaws in software releases, address them and prevent similar bugs from emerging in the future. This involves an ongoing process of finding and confirming those flaws. From there, you need to triage and patch those weaknesses, as well as find their root causes.

Augmenting the SSDF With Human Controls

The SSDF provides software vendors with a framework by which they can implement security measures and cut down on cyberattacks. But, using an SSDF won’t accomplish much unless software vendors secure buy-in from some key stakeholders.

In particular, vendors need to work with their developers to make sure they involve security in their work. One of the best ways they can do this is by investing in security training. This can start by training a few people as mentors to elevate the importance of security across the entire department. They can then leverage ongoing training to educate their developers about some of the most common types of risks.

Once that culture is in place, vendors can look to build on it. They can do that by revising their job postings to emphasize the need for security training and skills among applicants. They could also create a suite of key performance benchmarks to reward developers for their secure behavior in the workplace.

A Coherent Structure Around Software Supply Chain Security

Software supply chain cyberattacks aren’t going away anytime soon. As such, it’s up to software vendors to secure their products. This requires a holistic approach. If organizations unite their people, processes and technology, they can build a coherent culture centered around software supply chain security.

more from Application Security

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be…

Controlling the Source: Abusing Source Code Management Systems

For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within organizations and have been an afterthought in terms of defenses compared to other critical enterprise systems such as Active Directory.…