October 14, 2015 By Andras Szakal 3 min read

It’s been an interesting few weeks for us cybersecurity and supply chain security boffins. Last week, the National Institute of Standards and Technology (NIST) held a workshop titled Best Practices in Cyber Supply Chain Risk Management. It was a great opportunity for those of us working in supply chain risk management to communicate and discuss recently completed standards like ISO-20243 (O-TTPS) and validate proposed governance, guidance and tools developed by agencies to help the acquisition community mitigate risk.

I had the privilege of participating in the workshop and discussing the history and potential use of the standards and tools created. I walked away with two observations: Firstly, most companies and organizations don’t understand the difference between technology supply chain security and implementing cybersecurity controls within IT. The other observation — which seemed to be validated by our hosts — was that government and industry appear to have many of the standards and tools necessary to address these risks.

Major Events Call Attention to Supply Chain Security

By complete coincidence, the NIST workshop came on the heels of two very public events that can certainly be categorized as cyber supply chain incidents. Both of these incidents were topics of many workshop discussions. Workshop participants agreed that these incidents should be considered from both the manufacturing/development and acquisition perspectives.

Problems With Malicious SDKs

The first incident found major mobile application vendors cleaning up their mobile app stores after discovering that application developers blatantly circumvented procedures for accessing and integrating software development kits (SDKs). As it turns out, many foreign mobile application development companies were not following policy and opted to use unauthorized SDKs instead. Of course, these SDKs turned out to be maliciously counterfeited, putting end users and their data at risk.

One might ask why a developer would access counterfeit development libraries on purpose. The fault probably comes in several flavors: Some developers might have wanted to develop applications before submitting a formal request for hosting the app — or possibly were just lazy. Another potential possibility could be limited bandwidth access in certain countries throttling access to foreign sites; it’s easier to download from local sites than throttled out-of-country sites.

Regardless, the outcome was predictable. Unwittingly, developers accessed SDKs that were maliciously tainted, which provided attackers with potential back doors to those applications. Expect changes in mobile application governance and tools to migrate this risk going forward.

Issues With the Auto Industry

Supply chain integrity practices are intended to help ensure that customers receive the product and functionality for which they paid. When this doesn’t happen, questions about supply chain standards arise — which is exactly what happened with the second incident, involving the auto industry. This incident was unique because it was actually sanctioned from within the very company that made the product, and it could be characterized as an insider attack intended to undermine the very functionality that customers thought they were buying.

This could be characterized as a supply chain attack because the code intentionally undermined the functionality of the manufactured product as advertised. In addition, we can assume that not everyone in the company knew about this rogue functionality because of the amount of time it remained hidden and the fact that no whistleblower ever came forward (that we know of).

What’s the Answer?

There are no easy solutions to prevent these types of supply chain risks. But we do have the tools to significantly mitigate them. Developers should scan code for vulnerabilities and attempt to ascertain the lineage of components. At the end of the day, supply chain security is directly proportional to the level of integrity of those manufacturers or developers that contribute to the end product.

And as we validated in this workshop, supply chain security risks are often manifested in cybersecurity incidents. Those developers who flagrantly flaunt established supply chain security policies and practices should be penalized, if not banned altogether from participating in the growing mobile and cloud digital ecosystems.

Industry best practices and security standards such as ISO 20243 and NIST 800-161 form the bases for guidance, future tools and even a code of conduct as digital markets evolve. While standards, governance and policy will not reduce the risk to zero, it does provide the guidance necessary to mitigate ignorance or laziness. Intentionally injecting a vulnerability to circumvent regulators brings to light a whole new class of supply chain risks.

To learn more, read the article I co-authored in the IBM Journal of Research and Development.

More from Government

CIRCIA feedback update: Critical infrastructure providers weigh in on NPRM

3 min read - In 2022, the Cyber Incident for Reporting Critical Infrastructure Act (CIRCIA) went into effect. According to Secretary of Homeland Security Alejandro N. Mayorkas, "CIRCIA enhances our ability to spot trends, render assistance to victims of cyber incidents and quickly share information with other potential victims, driving cyber risk reduction across all critical infrastructure sectors."While the law itself is on the books, the reporting requirements for covered entities won't come into force until CISA completes its rulemaking process. As part of…

Important details about CIRCIA ransomware reporting

4 min read - In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments.The CIRCIA incident reports are meant to enable CISA to:Rapidly deploy resources and render assistance to victims suffering attacksAnalyze incoming reporting across sectors to spot trendsQuickly share information with network defenders to warn other…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today