Cybersecurity, Privacy, & AI

Trending Now
AI May Revive Old-School Tradecraft Even as It Transforms Intelligence Work • Agency CIOs Must Supply Top-Down IT Contract Information, OMB Memo States • OPM Isn’t Using Its Own Dashboard for Cyber Workforce Planning • Enhancing Security Operations Builds on Zero Trust: Strengthening National Security Through Deception • Attack on Axios Software Developer Tool Threatens Widespread Compromises

MITRE Offers Recommendations on Securing Critical Software Supply Chains

everything possible | Shutterstock

In the newest addition to its Deliver Uncompromised series, the MITRE Corporation has released a new paper on security critical software supply chains. Noting that the current environment lacks systematic integrity, the authors say that a series of specific actions by the software development community and larger IT sector could significantly reduce the risk of compromise, exploitation, exfiltration, or sabotage from software supply chain attacks. “While no silver bullet exists, establishing and implementing an end-to-end framework for software supply chain integrity will reduce risks from too-big-to-fail applications that are central to private sector enterprises, governments, and the critical capabilities they rely upon each day,” they write.

They propose that NIST update its existing supply chain standard, NIST SP 800-161, to include a new framework for securing software supply chains and that the federal government require vendors, resellers, and integrators to implement this framework. The authors also propose that the government leverage the framework to identify trusted suppliers, and that the Department of Defense incorporate the standards into its Cybersecurity Maturity Model Certification.

Source:

 

Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–SaturdaySubscribe here.