Article Details
Scrape Timestamp (UTC): 2024-01-24 09:01:47.413
Source: https://thehackernews.com/2024/01/the-unknown-risks-of-software-supply.html
Original Article Text
Click to Toggle View
The Unknown Risks of The Software Supply Chain: A Deep-Dive. In a world where more & more organizations are adopting open-source components as foundational blocks in their application's infrastructure, it's difficult to consider traditional SCAs as complete protection mechanisms against open-source threats. Using open-source libraries saves tons of coding and debugging time, and by that - shortens the time to deliver our applications. But, as codebases become increasingly composed of open-source software, it's time to respect the entire attack surface - including attacks on the supply chain itself - when choosing an SCA platform to depend upon. The Impact of One Dependency When a company adds an open-source library, they are probably adding not just the library they intended to, but also many other libraries as well. This is due to the way open-source libraries are built: just like every other application on the planet, they aim for a speed of delivery and development and, as such, rely on code other people built - i.e., other open-source libraries. The actual terms are direct dependency - a package you add to your application, and a transitive dependency - which is a package added implicitly by your dependencies. If your application uses package A, and package A uses package B, then your application indirectly depends on package B. And if package B is vulnerable, your project is vulnerable, too. This problem gave rise to the world of SCAs - Software Composition Analysis platforms - that can help with detecting vulnerabilities and suggesting fixes. However, SCAs solve only the problem of vulnerabilities. What about supply chain attacks? Supply Chain Security Best Practices Cheat Sheet Software supply chain attacks are on the rise. According to Gartner's predictions, by 2025, 45% of organizations will be affected. The traditional Software Composition Analysis (SCA) tools are not enough, and the time to act is now. Download our cheat sheet to discover the five types of critical supply chain attacks and better understand the risks. Implement the 14 best practices listed at the end of the cheat sheet to defend against them. 🔗 Download the Cheat Sheet Now Attacks VS. Vulnerabilities It might not be obvious what we mean by an "unknown" risk. Before we dive into the differentiation, let's first consider the difference between vulnerabilities and attacks: A vulnerability: A supply chain attack: An unknown risk is, almost by definition, an attack on the supply chain that is not easily detectable by your SCA platform. SCA Tools Aren't Enough! SCA tools might seem to solve the issue of protecting you from supply chain risks, but they do not address any of the unknown risks - including all major supply chain attacks - and leave you exposed in one of the most critical pieces of your infrastructure. Thus, a new approach is needed to mitigate the known and unknown risks in the ever-evolving supply chain landscape. This guide reviews all the known and unknown risks in your supply chain, suggests a new way to look at things, and provides a great reference (or introduction!) to the world of supply chain risks. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.
Daily Brief Summary
The reliance on open-source software components in application infrastructures is increasing, highlighting the attack surface including supply chain vulnerabilities.
Incorporating one open-source library often means adding multiple dependent libraries, exposing applications to any vulnerabilities within those libraries.
Software Composition Analysis (SCA) platforms help detect and fix known vulnerabilities but are not fully equipped to handle unknown risks, such as supply chain attacks.
Gartner predicts that by 2025, up to 45% of organizations will experience supply chain attacks, stressing the urgency to prepare and defend against them.
Traditional SCA tools are insufficient for supply chain attack prevention, necessitating a new approach to tackle both known and unknown supply chain risks.
A comprehensive cheat sheet is available for download, offering insights into five types of critical supply chain attacks and 14 best practices for defense.
The article also highlights the importance of differentiating between vulnerabilities and attacks, suggesting a more robust protection strategy is needed.
Executives are encouraged to consider a masterclass on SaaS security which is based on insights from a study of 493 companies, for practical dos and don'ts in the field.