Thursday, September 28, 2023
Kiratas
  • Home
  • World
  • Lifestyle

    Trending Tags

    • Pandemic
  • Business
  • Entertainment
  • Sports
No Result
View All Result
  • Home
  • World
  • Lifestyle

    Trending Tags

    • Pandemic
  • Business
  • Entertainment
  • Sports
No Result
View All Result
Kiratas
No Result
View All Result
Home World

List of ingredients: BSI establishes rules for securing the software supply chain

Eliza Houghton by Eliza Houghton
August 8, 2023
in World
0
List of ingredients: BSI establishes rules for securing the software supply chain
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

List of ingredients: BSI establishes rules for securing the software supply chain

The Federal Office for Information Security (BSI) wants to support companies and public administration in better securing software supply chains and mitigating the effects of security debacles such as Log4j. The Bonn authority published a technical guideline (TR) on cyber resilience on Friday, in which it sets out formal and technical specifications for the Software Bill of Materials (SBOM) concept. This is a machine-readable document that contains an electronic parts list and its code dependencies.

Advertisement

A software inventory database

SBOM list the components of a software project as completely as possible. In addition to the direct source text, this includes internal and external references to open source packages used, for example. Since the latter in turn often depend on other projects, these must also be listed in the software bill of materials. The information in a software inventory database “can be presented in different widths and depths,” writes the BSI in the new TR-03183. They ranged from a rough structure to a fine-grained breakdown of products and components. There were also different formats for displaying and transmitting an SBOM, and the authors of the document provide information and instructions on how to use them.

According to the BSI, every software producer and provider should have an SBOM in order to be able to show the complexity of the programs used transparently. This is the only way to find out which components are used and how libraries are used. This knowledge is essential for management processes, such as the product life cycle and in particular for a continuous IT security process. It is considered best practice in a secure software supply chain.

In the case of Log4J, many administrators in smaller IT departments had to sift through every application on their own, and in corporations they had to compile tables in a hurry, in which those responsible for an application were supposed to enter whether the affected library was used in it. SBOM would have simplified the overview here.

Only with automation

Such a list of ingredients can be public or private “and distributed via different distribution channels”, according to the TR. Typically, a software developer uses one or more third-party components. He creates and administers the SBOM of his own programs, but at the same time takes on the “consumer role” of the lists of ingredients of the integrated components. The wealth of SBOM information and the possible structural differences meant a lot of effort for each creator, it goes on to say, “which can only be countered effectively with automation”.

Advertisement

A relevant directory can be used to check “whether a product is potentially affected by a vulnerability,” explains the BSI. However, there are no statements about security gaps and their exploitability. It is therefore important to include additional security information such as the CVE (Common Vulnerabilities and Exposures) from the component providers. In detail, the authority lists any necessary data fields for the SBOM itself in the TR, such as a URL along with the e-mail address of the creator and time stamp, as well as the information required for each component, its version and dependencies. There is also an overview of additional data fields that should also be specified if possible.

Compulsory SBOM at EU level already under way

Open source tools like Cilium already contain an SBOM. The version control platform GitHub introduced a function in March that allows those responsible to create such an overview for their project. Previously, GitHub owner Microsoft released its own open source tool, Salus, in July 2022, which produces an SBOM for development initiatives. Since April, Google has offered a similar function with a programming interface for querying the data from Open Source Insights. In parallel, the group made its Assured Open Source Software service generally available free of charge on an SBOM basis.

The EU Commission’s draft for a Cyber ​​Resilience Act contains an obligation to prepare an SBOM, the BSI refers to a currently ongoing legislative process. Products with digital elements for which vulnerability management becomes mandatory are recorded. In the United States, US President Joe Biden’s May 2021 Cybersecurity Order 14028 requires government agencies to maintain a bill of materials. Similar rules have applied to medical devices in the USA since March. Last year, the EU Council also focused on the security of IT supply chains.

(tiw)

Go to home page
#List #ingredients #BSI #establishes #rules #securing #software #supply #chain

Tags: BSIchainestablishesingredientsListrulessecuringSecuritysoftwaresupply
Previous Post

Lukashenko provokes his neighbors, according to the Belarusian opposition

Next Post

The narcos’ boats are already used as ultra-fast ‘taxis’ for immigrants between Spain and Morocco

Eliza Houghton

Eliza Houghton

Related Posts

A 67-year-old man arrested in Zarautz accused of sharing videos of pedophile content on the Internet
World

A 67-year-old man arrested in Zarautz accused of sharing videos of pedophile content on the Internet

by Eliza Houghton
September 28, 2023
Elite Taxi denounces Uber Eats before the National Court for hiring false self-employed workers
World

Elite Taxi denounces Uber Eats before the National Court for hiring false self-employed workers

by Eliza Houghton
September 28, 2023
OVHcloud expands its range of Nvidia GPUs
World

OVHcloud expands its range of Nvidia GPUs

by Eliza Houghton
September 28, 2023
The humanitarian NGO SOS Méditerranée receives the ‘alternative Nobel’
World

The humanitarian NGO SOS Méditerranée receives the ‘alternative Nobel’

by Eliza Houghton
September 28, 2023
Rosa Peral and Albert López: the reasons why Pedro Rodríguez was killed, according to his lawyer
World

Rosa Peral and Albert López: the reasons why Pedro Rodríguez was killed, according to his lawyer

by Eliza Houghton
September 28, 2023
Next Post
The narcos’ boats are already used as ultra-fast ‘taxis’ for immigrants between Spain and Morocco

The narcos' boats are already used as ultra-fast 'taxis' for immigrants between Spain and Morocco

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Premium Content

iX workshop: Legally compliant – testing and certifying IT products according to EU law

iX workshop: Legally compliant – testing and certifying IT products according to EU law

September 16, 2023
Russian authorities recover the black boxes from the crashed plane in which Prigozhin was traveling

Russian authorities recover the black boxes from the crashed plane in which Prigozhin was traveling

August 26, 2023
Pedro Sánchez: “Rubiales’ apologies are neither sufficient nor adequate;  It was an unacceptable gesture.”

Pedro Sánchez: “Rubiales’ apologies are neither sufficient nor adequate; It was an unacceptable gesture.”

August 22, 2023

Browse by Category

  • Science
  • Sports
  • World

Browse by Tags

Apple Artificial Intelligence attack attacks China Court Cup data Death due Feijóo Germany Google government investiture iOS iPhone law live Madrid man Microsoft million news people police President Pro Rubiales Russia Russia-Ukraine invasion Security Software development Spain Sánchez time Today Ukraine Updates video Vulnerabilities war workshop world years
Kiratas

Latest News from World, Health, Politics, Sports, Business, Education, Technology, Arts and Latin America, the Middle East, South Asia.

Categories

  • Science
  • Sports
  • World

Browse by Tag

Apple Artificial Intelligence attack attacks China Court Cup data Death due Feijóo Germany Google government investiture iOS iPhone law live Madrid man Microsoft million news people police President Pro Rubiales Russia Russia-Ukraine invasion Security Software development Spain Sánchez time Today Ukraine Updates video Vulnerabilities war workshop world years

Recent Posts

  • A 67-year-old man arrested in Zarautz accused of sharing videos of pedophile content on the Internet
  • Elite Taxi denounces Uber Eats before the National Court for hiring false self-employed workers
  • OVHcloud expands its range of Nvidia GPUs
  • About Us
  • Home
  • Privacy Policy
  • Terms and Conditions

© Aroged 2023. All Rights Reserved.

No Result
View All Result
  • Home
  • Landing Page
  • Buy JNews
  • Support Forum
  • Contact Us

© Aroged 2023. All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.