The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
|
|
|
- Gerald Harris
- 10 years ago
- Views:
Transcription
1 The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC Brad Minnis, Juniper Networks Chris Fagan, Microsoft Corp. Cheri McGuire, Microsoft Corp. Paul Nicholas, Microsoft Corp. Diego Baldini, Nokia Janne Uusilehto, Nokia Gunter Bitz, SAP Yuecel Karabulut, SAP Gary Phillips, Symantec
2 Table of Contents Introduction 1 Defining Software Integrity 2 Identifying the Challenge to Software Integrity 4 Describing the Software Supply Chain 6 Principles for Designing Software Integrity Controls 10 Next Steps 11 ii
3 Introduction Commercial software underpins the information technology infrastructure that businesses, governments and critical infrastructure owners and operators rely upon for even their most vital operations. For that reason, enterprise customers are rightfully concerned about the security of commercial software and the potential for its exploitation by those seeking to maliciously disrupt, influence or take advantage of their operations. Historically, commercial software was developed at a central location. However, as market demands for innovation and competitiveness have increased, a more distributed approach to software development is evolving as commercial software vendors expand to serve international markets and seek engineering skills and numbers wherever they reside globally. Though it is generally agreed that limiting the use of global resources for software development is not practical in today s market environment, the increased distribution of development activities globally does raise questions about what additional product security and commercial brand risks are introduced, how these risks should be assessed, and what proactive measures can minimize their occurrence. Given the reliance of businesses, governments and critical infrastructure owners on commercial software, these questions are of interest to suppliers and customers alike and have recently been aggregated under the label of software supply chain integrity. Yet, the concept of software supply chain integrity and its key components of software integrity and software supply chain are not clearly defined, creating significant challenges for customers and suppliers working to identify, compare, communicate and evaluate software integrity best practices. Recognizing this gap, SAFECode is working to address the issue of software supply chain integrity from a software engineering perspective. Under this effort, SAFECode will identify the threats, assess the risks, share its members current practices for mitigating those corresponding risks, and develop process guidelines that other software companies should consider adopting to protect the integrity of the software they produce through the global supply chain. This paper, the first in a series, will assess software supply chain integrity in the context of software engineering, providing a framework and common taxonomy for evaluating the associated risks and defining the industry s role in addressing them. This framework will serve as the foundation for subsequent work aimed at describing and analyzing software integrity best practices. 1
4 Defining Software Integrity Software integrity is an element of software assurance. SAFECode defines Software Assurance as confidence that software, hardware and services are free from intentional and unintentional vulnerabilities and that the software functions as intended. 1 Software assurance is most frequently discussed in the context of ensuring that code itself is more secure through the repeatable application of secure software development practices. However, while there has been a growing and appropriate focus on eliminating software vulnerabilities through secure development practices, this represents only one aspect of software assurance. Another key consideration for customers and software suppliers is the security of the processes used to handle software components during their sourcing, development and distribution since a variety of potential attack vectors exist throughout the software lifecycle. To help others in the industry initiate or improve their own secure development programs, SAFECode has published Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today. Based on an analysis of the individual software assurance efforts of SAFECode members, the paper outlines a core set of secure development practices that can be applied across diverse development environments to improve software security. The brief and highly actionable paper describes each identified security practice across the software development lifecycle Requirements, Design, Programming, Testing, Code Handling and Documentation and offers implementation advice based on the real-world experiences of SAFECode members. To obtain a free copy of the paper, visit 1. SAFECode, Software Assurance: An Overview of Current Best Practices, February
5 In practice, software assurance involves a shared responsibility among suppliers (synonymous with vendors), service and/or solution providers, and customers encompassing three areas: Security: Security threats are anticipated and addressed in the software s design, development and testing. This requires a focus on both quality aspects (e.g., free from buffer overflows ) and functional requirements (e.g., passport numbers must be encrypted in the database ). Authenticity: The software is not counterfeit and customers are able to confirm that they have the real thing. Integrity: The processes for sourcing, creating and delivering software contain controls to enhance confidence that the software functions as the supplier intended. While the delivery of secure software products requires that all three elements of software assurance be addressed, the focus of this paper is on software integrity practices the collection of processes and controls that enable a supplier to deliver a product to customers that is uncompromised, thereby containing only what the supplier intends. Software integrity practices address the security of the processes used to handle software components during their sourcing, development and delivery. In this way, they differ from (and complement) secure development practices that improve the security characteristics of the code comprising the software components. Software integrity practices are essential to minimizing the risk of software tampering in the global supply chain. Integrity ASSURANCE Authenticity Security Figure 1: The three elements of software assurance 3
6 Identifying the Challenge to Software Integrity Governments, businesses and consumers purchase IT solutions (systems, products or services) that are a complex collection of inter-related components assembled from hardware, software, networks, cloud services and outsourced operations. Throughout an IT solution s lifecycle, which can extend over more than a decade, many individuals have legitimate access to its components and operations. As the software industry has become increasingly globalized, a concern has risen over the possibility that an IT solution could be compromised by the intentional insertion of malicious code into the solution s software during its development or maintenance. This type of attack is often referred to as a supply chain attack. A supply chain attack can be directed at any category of software, including custom software, software delivering a cloud service, a software product, or software embedded in a hardware device. Software in any of these categories is often packaged as a collection of files. To be successful, a software supply chain attack must result in either: a) the modification of an existing software file(s); or, b) the insertion of an additional file(s) into the collection of software files. Reports 2 that have considered supply chain attacks have concluded that: 1) there is no one way to defend against all the potential attack vectors a motivated attacker may identify; 2) focusing on the place where software is developed is less useful for improving security than focusing on the process by which software is produced and tested; and 3) there are circumstances when the insertion of malicious code would be almost impossible to detect. It is important to recognize that while there is a risk that someone with malicious intent could attack software during its development, experts 3 have concluded that supply chain attacks are not the most likely attack vector. For example, the practice of hackers or other malicious actors finding and exploiting existing vulnerabilities remains the most common method of attack. 2. Mission Impact of Foreign Influence on DoD Software, U.S. Defense Science Board, September Foreign Influence on Software: Risk and Recourse, Center for Strategic and International Studies, March Framework for Lifecycle Risk Mitigation For National Security Systems in the Era of Globalization, U.S. Committee on National Security Systems, November Mission Impact of Foreign Influence on DoD Software, U.S. Defense Science Board, September Foreign Influence on Software: Risk and Recourse, Center for Strategic and International Studies, March
7 However, the fact that a risk does exist requires preventive action. While individual software companies have taken steps to assure the integrity of their own supply chains, there is currently no framework or shared taxonomy through which the software industry can collectively identify and develop best practices to address software supply chain threats to software integrity. Further, the software supplier has a dual challenge. As the vendor offering a product, the customer often views the supplier as responsible for all the offering s components. That supplier is also an acquirer of software components. As such, a supplier must ascertain the integrity (along with authenticity and security) of both the software components they build and those that they acquire or use to be well-positioned to assert integrity claims for their product. 5
8 Describing the Software Supply Chain Sophisticated IT solutions have much in common with other engineering undertakings. Each IT solution is a collection of components. Each component or its parts can be a) developed by its supplier or on that supplier s behalf by their subcontractors; or b) licensed to the supplier by another vendor or obtained from Open Source repositories; or c) acquired outright by the supplier. However, this complexity of components within components can be organized. In the physical world many industries create complex products that contain components from multiple sources. Processes in the manufacturing of physical goods have two parallels that can be adopted in the cyber world. One is the use of a Bill of Materials (BOM) to organize the hierarchy of product components. The other is the use of supply chain management processes, which describe the business activities associated with satisfying a customer s demand spanning the range from the supplier s supplier to the customer s customer. By recognizing and adapting techniques pioneered for the physical world, IT suppliers can identify natural control points within software supply chains. To identify these points, consider that each software supplier has three links of the supply chain. For these three links each IT supplier takes similar actions: 1. Supplier Sourcing: Select the suppliers, establish the specification for the supplier s deliverables, and receive software/ hardware deliverables from the suppliers; 2. Development and Testing: Build, assemble, integrate and test components and finalize for delivery; and, 3. Delivery: Deliver and maintain their product components to their customer. Supplier Sourcing Procurement Development and Testing Environment Personnel Software Development Figure 2: Each supplier in the software supply chain manages three sets of controls Delivery Distribution Maintenance Now consider that delivered software is just one component of a larger IT solution and each software supplier is only one vendor in a complex chain of suppliers and systems integrators. Customer relationships extend even beyond the traditional system integrators since some acquirers implement systems as solutions for other end users. As such, the software supply chain is only one part of a larger, more complex IT solution supply chain. 6
9 Figuratively, an IT solution supply chain resembles a collection of staircases. Each staircase aggregates smaller useful components from different suppliers into an ever-greater collection of components until ultimately sufficient IT components have been assembled to meet the customer s business requirements. Figure 3 illustrates the software supply chain as one of these staircases, where each step holds a different supplier. Between each step is a step-up. The step-up represents the transmission of software components from a supplier to its customer. Components move along this staircase supply chain as they are handed off from one supplier to the next. At each step a supplier controls three links in the supply chain: a) goods received from suppliers; b) their product production; and c) what is delivered to their customers. Suppliers apply integrity controls at each link. For example, a supplier can conduct acceptance tests on components received from their suppliers, and release tests on the components they deliver to their customer. That means that each transition of custody along the chain of suppliers is an opportunity to preserve code integrity. Customer Supplier Sourcing Dev & Testing Delivery Figure 3: The software supply chain resembles a staircase, where each step holds a different supplier. Supplier Sourcing Dev & Testing Delivery Integrator Supplier Sourcing Dev & Testing Delivery Tier 1 Software Supplier Supplier Sourcing Dev & Testing Delivery Tier n Supplier Tier 2 Supplier Software Supply Chain Staircase Acceptance Test Release Test Project Lifecycles 7
10 The effective application of integrity controls requires that each individual supplier understand and manage: The components that are integrated into their products. This includes identifying their suppliers and the related parties including, for example, software from original equipment manufacturers (OEMs), software built to specification by external contractors, or sourced from repositories of Open Source Software (OSS); Their internal processes for controlling access to software components during development, integration, testing and release; and, The channels they use to receive components from suppliers and to deliver products. Within a supplier s organization, operations for supplier sourcing, product development and testing, and product delivery coexist with other business operations such as sales, marketing, legal and IT. The procedures a supplier uses for internal collaboration, distribution and other important business processes outside product development and testing can impact a product s integrity. Concern about personnel with malicious intent is not confined to only employees at numerous locations, but extends across all members of the workforce including that of tiered suppliers. Other factors must come into play to address integrity. The type of physical and IT environment supporting product development and testing has a bearing on the likelihood of a product s integrity being compromised. For instance, are the facilities where code is developed secure? Is the data center where code is stored secure? Are communications secure between distributed teams? Within a supplier, different business functions are performed by different staff, and these personnel require different levels of access to corporate assets. Access to corporate assets is based on the security principle of separationof-duties. This principle should be similarly applied to access to development assets by a supplier s staff engaged in supplier sourcing, product development and testing, and product delivery. Access to development assets can be restricted based on the activities a staff member performs in the development process. Additionally, suppliers control: a) how they procure code from their suppliers; b) how code once delivered is screened and tested; and c) how code is inserted and tracked throughout their development, testing and delivery processes. While the effective application of 8
11 these controls has a direct impact on software integrity, it should be recognized that leading software suppliers also establish and maintain these controls for sound engineering reasons since the production of commercial software products is an industrial-strength process. To assist customers, suppliers provide mechanisms to enable validation of a product s authenticity, and to confirm that a product has not been tampered with before it reaches them. These may include certificates of authenticity, online product registration and validation, and product packaging designed to be tamper-resistant. Having recognized these issues, suppliers have controls over their software products when components are received from their suppliers, created through their product development process, and passed on to their customers. It is this collection of controls that enable a supplier to assure that the software components they use are known and properly protected along the supply chain. 9
12 Principles for Designing Software Integrity Controls Viewing potential malicious acts in the proper context is essential. Suppliers are aware of threats to their products and are, consequently, extremely protective of their code base not only is the integrity of their products at stake but also their highly valuable intellectual property and brand. As such, suppliers have significant experience implementing powerful management, policy and technical controls that reduce the risk that their code can be compromised. However, while there are established practices to mitigate the potential for malicious activity as products are built, analyzing these efforts in the context of providing assurance of integrity is an emerging discipline. As a result, there is a lack of common understanding regarding what these efforts entail, where they are best applied in the context of a software supply chain, and how collectively they raise the assurance of an IT solution. Within SAFECode s software supply chain integrity framework, software supply chain integrity controls address the access, storage and handling of development assets throughout the key links in the software supply chain supplier sourcing, product development and testing, and product delivery. Within a supplier s organization these controls exist in the context of other IT functions such as backup and recovery, business continuity services, physical and network security, and configuration management systems. Software supply chain integrity controls derive from established security and integrity principles: Chain of Custody: The confidence that each change and handoff made during the source code s lifetime is authorized, transparent and verifiable. Least Privilege Access: Personnel can access critical data with only the privileges needed to do their jobs. Separation of Duties: Personnel cannot unilaterally change data, nor unilaterally control the development process. Tamper Resistance and Evidence: Attempts to tamper are obstructed, and when they occur they are evident and reversible. Persistent Protection: Critical data is protected in ways that remain effective even if removed from the development location. Compliance Management: The success of the protections can be continually and independently confirmed. Code Testing and Verification: Methods for code inspection are applied and suspicious code is detected. To be effective in today s complex global supply chains, software integrity processes and controls must be designed to be independent of geography, accommodate diverse sources of software components, and extend from a vendor s suppliers to its customers. 10
13 Next Steps The complexities and interdependencies of the IT ecosystem require software suppliers to not only be able to demonstrate the security of products they produce, but also evaluate the integrity of products they acquire and use. For this reason, every software supplier has a significant stake in the identification, communication and evaluation of best practices for ensuring software integrity. The challenge is to create practical but effective methods that build on a broad understanding of the dependencies and threats along the complex software supply chain. Ultimately this should lead to greater confidence through integrity checks incorporated in a defined secure development lifecycle. While individual software companies have integrity assurance programs in place, there has been little industry-led effort to identify and share best practices for implementing the integrity controls described in this framework or to provide customers with more clarity into how the industry is addressing this issue. This is a critical gap that must be addressed by the software industry in order to continue to meet customer demands for both security and innovation. assure the integrity of their software. We will publish our findings later this year to extend these practices across the industry and provide customers with additional insight into how to view and evaluate the processes by which software integrity is achieved. Though the focus of this immediate work is on the responsibilities of software suppliers, it should be noted that systems integrators and customers also play roles in the assurance of software in IT solutions. The proper execution of activities such as integration, configuration and implementation are crucial to the integrity of an overall IT system. For this reason, SAFECode will work with suppliers, integrators and customers to adopt a shared framework that extends software integrity across systems of systems. To meet this important industry need, SAFECode will build upon this framework for software supply chain integrity with a focused effort to identify and analyze the most effective software integrity practices that its member companies use to help 11
14 About SAFECode The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Its members include Adobe Systems Incorporated, EMC Corporation, Juniper Networks, Inc., Microsoft Corp., Nokia, SAP AG and Symantec Corp. For more information, please visit SAFECode 2101 Wilson Boulevard Suite 1000 Arlington, VA (p) (f) ( ) [email protected] Software Assurance Forum for Excellence in Code (SAFECode)
Software Integrity Controls. An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain. June 14, 2010. Contributors.
Software Integrity Controls An Assurance-Based Approach to Minimizing Risks in the Software Supply Chain June 14, 2010 Editor Stacy Simpson, SAFECode Contributors Diego Baldini, Nokia Gunter Bitz, SAP
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
Software Assurance: An Overview of Current Industry Best Practices
Software Assurance: An Overview of Current Industry Best Practices February 2008 Executive Summary Software Assurance: An Overview of Current Industry Best Practices Software underpins the information
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Principles for Software Assurance Assessment. A Framework for Examining the Secure Development Processes of Commercial Technology Providers
A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager, Trustworthy Computing, Microsoft Corporation
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Software Assurance Forum for Excellence in Code
Software Assurance Forum for Excellence in Code Security Engineering Training: Building the Foundation for Software Security Success March 2012 About SAFECode The Software Assurance Forum for Excellence
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Presentation of April 22, 2015
A Standards Based Way To Avoid Counterfeit Electronic Parts Presentation of April 22, 2015 Robert S. Metzger Rogers Joseph O Donnell, P.C. 750 Ninth Street, N.W., Ste 710 Washington, D.C. 20001 (202) 777
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Developing a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
Security Patch Management
The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
Source Code Protection: Evaluating Source Code Security
Source Code Protection: Evaluating Source Code Security Stephanie Woiciechowski, GSEC Principal Software Engineer Product Security Office EMC Corporation 1 Goals Understand application of basic security
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
Towards a standard approach to supply chain integrity. Claire Vishik September 2013
Towards a standard approach to supply chain integrity Claire Vishik September 2013 1 Draws from: ENISA s report on this topic Slawomir Gorniak, European Network and Information Security Agency Demosthenes
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT
Medical Devices. Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire
Medical Devices Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire Introduction This perspective paper aims to help organizations understand the emerging issue of security
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE
DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE Lisa Harrington President, lharrington group llc Associate Director Supply Chain Management Center Robert H. Smith School of Business
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
SAP Product and Cloud Security Strategy
SAP Products and Solutions SAP Product and Cloud Security Strategy Table of Contents 2 SAP s Commitment to Security 3 Secure Product Development at SAP 5 SAP s Approach to Secure Cloud Offerings SAP s
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities
Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Utility Sector Best Practices for Cyber Security Supply Chain Risk Management Discussion with Chief Information Officer (CIO) Overview The safety and
