Malware Devil

Tuesday, May 18, 2021

Learn what the new domain validation requirements mean for your business

2021 is shaping up to be another interesting year in the world of digital certificates and PKI, as the TLS/SSL…

The post Learn what the new domain validation requirements mean for your business appeared first on Entrust Blog.

The post Learn what the new domain validation requirements mean for your business appeared first on Security Boulevard.

Read More

The post Learn what the new domain validation requirements mean for your business appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/learn-what-the-new-domain-validation-requirements-mean-for-your-business-5/?utm_source=rss&utm_medium=rss&utm_campaign=learn-what-the-new-domain-validation-requirements-mean-for-your-business-5

The Security Digest: #61

Hello and welcome to TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter that our Security Lead, …

The post The Security Digest: #61 appeared first on Cyral.

The post The Security Digest: #61 appeared first on Security Boulevard.

Read More

The post The Security Digest: #61 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/the-security-digest-61-4/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-61-4

A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order

Software security is a big focus of the Biden administration???s recentツ?executive orderツ?on cybersecurity. In fact, an entire section, or 25 percent, of the order is dedicated to software security requirements. In the wake of the SolarWinds cyberattack, the security of the software supply chain is clearly top of mind at the White House, and has prompted these unprecedented and detailed security requirements for any software vendor looking to do business with the federal government. The order states:

The security of software used by the Federal Government is vital toツ?the Federal Government???s ability to perform its critical functions.ツ? The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors.ツ? There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended.ツ? The security and integrity of ???critical software??? ??? software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) ??? is a particular concern.ツ? Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.

How will the requirements be developed, and what do they cover?

The order mandates that NIST will identify existing or develop new standards for software security that ???shall include criteria that can be used to evaluate software security, include criteria to evaluate the security practices of the developers and suppliers themselves, and identify innovative tools or methods to demonstrate conformance with secure practices.??? NIST has 180 days to publish the preliminary guidelines, so we expect to see them before the end of the year.

Once the preliminary guidelines are published, NIST will then, within 60 days, issue guidance on best practices for securing the software supply chain (most likely early 2022). This guidance must include standards for:

Secure software development environments
Generating proof of adherence to the standards
Employing automated tools to ???ensure the integrity of code???
Employing automated tools to check for vulnerabilities and remediate them
Generating proof of the results of the automated tools??? findings
Maintaining data on the origins of all software code
Providing a software bill of materials
Participating in a vulnerability disclosure program
Attesting to conformity with secure software development practices
Ensuring the integrity of open source software in use

The order covers both new software purchases, and a review of existing legacy software.

There will also be guidance coming on what constitutes a software bill of materials and what should be considered ???critical software.???

Finally, the order requires the development of a pilot program that will examine a security labeling and rating system for consumer software products, including IoT devices.

What???s notable?

SBOM requirement:ツ?The requirement to provide a software bill of materials for each software product is a notable acknowledgement of the reality of modern software ??? very little of it is created from scratch, in-house. Just as requirements surrounding nutrition and ingredients labeling evolved over time as food products became more complicated and awareness of health risks increased, the government is now mandating transparency about what is in software as awareness of the security risks has increased.

Open source inclusion:ツ?As with the SBOM requirement, this inclusion acknowledges another reality of modern software ??? much of it is built on open source libraries, most of which contain vulnerabilities. In fact, ourツ?recent researchツ?found that 70 percent of applications contain a vulnerability in an open source library. This requirement highlights the fact that organizations today can???t call their software secure without assessing the security of the open source components of their applications.

Security testing specifics:ツ?This order gets more specific about software security testing than we had anticipated. It requires using automated tools (or comparable processes) that check for both known and potential vulnerabilities and remediate them. It also notes that the tools should operate regularly, or at least before product, version, or update releases. In the SaaS and PaaS world, this will mean these tools will need to become part of the development process and execute in the pipeline on each build since they often operate with continuous delivery. The emphasis on remediation is also important; we talk to a lot of organizations that feel like they???ve checked the software security box if they are testing their code. In reality, testing just reveals the problem, it doesn???t fix it.

The order also indicates that, within 60 days, NIST will publish guidelines recommending minimum standards for software security testing, including recommended types of testing, such as static and dynamic analysis, software composition analysis, and pen testing. This level of specificity is also important, since there is no software security silver bullet. All theseツ?testing typesツ?identify different types of vulnerabilities at different stages of the development process, and neglecting any of them widens your threat landscape. For instance, static analysis won???t find authorization issues or business logic problems, but dynamic analysis can???t point to the line of code where a vulnerability originates.

Development environment security:ツ?There has been a realization that the environment software is developed in has to have equal or greater security controls than the environment the software operates in. Critical software operated in the most restricted and controlled environments is often developed in environments with weak security controls.

IoT security:ツ?This is perhaps the most groundbreaking and far-reaching inclusion in the order. The order requires the development of pilot programs for IoT and consumer software security that will be ???informed by existing consumer product labeling programs to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices, and shall consider ways to incentivize manufacturers and developers to participate in these programs.???ツ?Recent legislationツ?created requirements around the security of IoT devices purchased by the U.S. federal government, and Singapore and the UK have voluntary programs for labeling IoT. This executive order suggests that this type of regulation may expand to the U.S. consumer market. Consumers of software and IoT devices haven???t to this point overwhelmingly demanded that vendors create secure products, and haven???t been deterred by security, or a lack thereof, when purchasing. But as recentツ?DDoS attacksツ?perpetrated through IoT devices highlight, these interconnected devices create a wide and very dangerous attack surface. Establishing some requirements and transparency around the security of these consumer devices is overdue.

For more information on the executive order, see our previousツ?blog postツ?on the topic, and stay tuned for more posts in the coming days and weeks.

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Security Boulevard.

Read More

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-4/?utm_source=rss&utm_medium=rss&utm_campaign=a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-4

Learn what the new domain validation requirements mean for your business

2021 is shaping up to be another interesting year in the world of digital certificates and PKI, as the TLS/SSL…

The post Learn what the new domain validation requirements mean for your business appeared first on Entrust Blog.

The post Learn what the new domain validation requirements mean for your business appeared first on Security Boulevard.

Read More

The post Learn what the new domain validation requirements mean for your business appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/learn-what-the-new-domain-validation-requirements-mean-for-your-business-4/?utm_source=rss&utm_medium=rss&utm_campaign=learn-what-the-new-domain-validation-requirements-mean-for-your-business-4

Learn what the new domain validation requirements mean for your business

2021 is shaping up to be another interesting year in the world of digital certificates and PKI, as the TLS/SSL…

The post Learn what the new domain validation requirements mean for your business appeared first on Entrust Blog.

The post Learn what the new domain validation requirements mean for your business appeared first on Security Boulevard.

Read More

The post Learn what the new domain validation requirements mean for your business appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/learn-what-the-new-domain-validation-requirements-mean-for-your-business-3/?utm_source=rss&utm_medium=rss&utm_campaign=learn-what-the-new-domain-validation-requirements-mean-for-your-business-3

Learn what the new domain validation requirements mean for your business

2021 is shaping up to be another interesting year in the world of digital certificates and PKI, as the TLS/SSL…

The post Learn what the new domain validation requirements mean for your business appeared first on Entrust Blog.

The post Learn what the new domain validation requirements mean for your business appeared first on Security Boulevard.

Read More

The post Learn what the new domain validation requirements mean for your business appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/learn-what-the-new-domain-validation-requirements-mean-for-your-business-2/?utm_source=rss&utm_medium=rss&utm_campaign=learn-what-the-new-domain-validation-requirements-mean-for-your-business-2

Learn what the new domain validation requirements mean for your business

2021 is shaping up to be another interesting year in the world of digital certificates and PKI, as the TLS/SSL…

The post Learn what the new domain validation requirements mean for your business appeared first on Entrust Blog.

The post Learn what the new domain validation requirements mean for your business appeared first on Security Boulevard.

Read More

The post Learn what the new domain validation requirements mean for your business appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/learn-what-the-new-domain-validation-requirements-mean-for-your-business/?utm_source=rss&utm_medium=rss&utm_campaign=learn-what-the-new-domain-validation-requirements-mean-for-your-business

The Security Digest: #61

Hello and welcome to TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter that our Security Lead, …

The post The Security Digest: #61 appeared first on Cyral.

The post The Security Digest: #61 appeared first on Security Boulevard.

Read More

The post The Security Digest: #61 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/the-security-digest-61-3/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-61-3

The Security Digest: #61

Hello and welcome to TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter that our Security Lead, …

The post The Security Digest: #61 appeared first on Cyral.

The post The Security Digest: #61 appeared first on Security Boulevard.

Read More

The post The Security Digest: #61 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/the-security-digest-61-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-61-2

The Security Digest: #61

Hello and welcome to TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter that our Security Lead, …

The post The Security Digest: #61 appeared first on Cyral.

The post The Security Digest: #61 appeared first on Security Boulevard.

Read More

The post The Security Digest: #61 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/the-security-digest-61/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-61

A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order

Software security is a big focus of the Biden administration???s recentツ?executive orderツ?on cybersecurity. In fact, an entire section, or 25 percent, of the order is dedicated to software security requirements. In the wake of the SolarWinds cyberattack, the security of the software supply chain is clearly top of mind at the White House, and has prompted these unprecedented and detailed security requirements for any software vendor looking to do business with the federal government. The order states:

The security of software used by the Federal Government is vital toツ?the Federal Government???s ability to perform its critical functions.ツ? The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors.ツ? There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended.ツ? The security and integrity of ???critical software??? ??? software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) ??? is a particular concern.ツ? Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.

How will the requirements be developed, and what do they cover?

The order mandates that NIST will identify existing or develop new standards for software security that ???shall include criteria that can be used to evaluate software security, include criteria to evaluate the security practices of the developers and suppliers themselves, and identify innovative tools or methods to demonstrate conformance with secure practices.??? NIST has 180 days to publish the preliminary guidelines, so we expect to see them before the end of the year.

Once the preliminary guidelines are published, NIST will then, within 60 days, issue guidance on best practices for securing the software supply chain (most likely early 2022). This guidance must include standards for:

Secure software development environments
Generating proof of adherence to the standards
Employing automated tools to ???ensure the integrity of code???
Employing automated tools to check for vulnerabilities and remediate them
Generating proof of the results of the automated tools??? findings
Maintaining data on the origins of all software code
Providing a software bill of materials
Participating in a vulnerability disclosure program
Attesting to conformity with secure software development practices
Ensuring the integrity of open source software in use

The order covers both new software purchases, and a review of existing legacy software.

There will also be guidance coming on what constitutes a software bill of materials and what should be considered ???critical software.???

Finally, the order requires the development of a pilot program that will examine a security labeling and rating system for consumer software products, including IoT devices.

What???s notable?

SBOM requirement:ツ?The requirement to provide a software bill of materials for each software product is a notable acknowledgement of the reality of modern software ??? very little of it is created from scratch, in-house. Just as requirements surrounding nutrition and ingredients labeling evolved over time as food products became more complicated and awareness of health risks increased, the government is now mandating transparency about what is in software as awareness of the security risks has increased.

Open source inclusion:ツ?As with the SBOM requirement, this inclusion acknowledges another reality of modern software ??? much of it is built on open source libraries, most of which contain vulnerabilities. In fact, ourツ?recent researchツ?found that 70 percent of applications contain a vulnerability in an open source library. This requirement highlights the fact that organizations today can???t call their software secure without assessing the security of the open source components of their applications.

Security testing specifics:ツ?This order gets more specific about software security testing than we had anticipated. It requires using automated tools (or comparable processes) that check for both known and potential vulnerabilities and remediate them. It also notes that the tools should operate regularly, or at least before product, version, or update releases. In the SaaS and PaaS world, this will mean these tools will need to become part of the development process and execute in the pipeline on each build since they often operate with continuous delivery. The emphasis on remediation is also important; we talk to a lot of organizations that feel like they???ve checked the software security box if they are testing their code. In reality, testing just reveals the problem, it doesn???t fix it.

The order also indicates that, within 60 days, NIST will publish guidelines recommending minimum standards for software security testing, including recommended types of testing, such as static and dynamic analysis, software composition analysis, and pen testing. This level of specificity is also important, since there is no software security silver bullet. All theseツ?testing typesツ?identify different types of vulnerabilities at different stages of the development process, and neglecting any of them widens your threat landscape. For instance, static analysis won???t find authorization issues or business logic problems, but dynamic analysis can???t point to the line of code where a vulnerability originates.

Development environment security:ツ?There has been a realization that the environment software is developed in has to have equal or greater security controls than the environment the software operates in. Critical software operated in the most restricted and controlled environments is often developed in environments with weak security controls.

IoT security:ツ?This is perhaps the most groundbreaking and far-reaching inclusion in the order. The order requires the development of pilot programs for IoT and consumer software security that will be ???informed by existing consumer product labeling programs to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices, and shall consider ways to incentivize manufacturers and developers to participate in these programs.???ツ?Recent legislationツ?created requirements around the security of IoT devices purchased by the U.S. federal government, and Singapore and the UK have voluntary programs for labeling IoT. This executive order suggests that this type of regulation may expand to the U.S. consumer market. Consumers of software and IoT devices haven???t to this point overwhelmingly demanded that vendors create secure products, and haven???t been deterred by security, or a lack thereof, when purchasing. But as recentツ?DDoS attacksツ?perpetrated through IoT devices highlight, these interconnected devices create a wide and very dangerous attack surface. Establishing some requirements and transparency around the security of these consumer devices is overdue.

For more information on the executive order, see our previousツ?blog postツ?on the topic, and stay tuned for more posts in the coming days and weeks.

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Security Boulevard.

Read More

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-3/?utm_source=rss&utm_medium=rss&utm_campaign=a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-3

Trust But Verify With System Hardening

DATA SECURITY PODCAST

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine,  Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on verifying “Trust”, and why “Trust But Verify” is important in today’s cybersecurity climate. The podcast can be listened to in its entirety below.

The post Trust But Verify With System Hardening appeared first on Security Boulevard.

Read More

The post Trust But Verify With System Hardening appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/trust-but-verify-with-system-hardening-5/?utm_source=rss&utm_medium=rss&utm_campaign=trust-but-verify-with-system-hardening-5

A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order

Software security is a big focus of the Biden administration???s recentツ?executive orderツ?on cybersecurity. In fact, an entire section, or 25 percent, of the order is dedicated to software security requirements. In the wake of the SolarWinds cyberattack, the security of the software supply chain is clearly top of mind at the White House, and has prompted these unprecedented and detailed security requirements for any software vendor looking to do business with the federal government. The order states:

The security of software used by the Federal Government is vital toツ?the Federal Government???s ability to perform its critical functions.ツ? The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors.ツ? There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended.ツ? The security and integrity of ???critical software??? ??? software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) ??? is a particular concern.ツ? Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.

How will the requirements be developed, and what do they cover?

The order mandates that NIST will identify existing or develop new standards for software security that ???shall include criteria that can be used to evaluate software security, include criteria to evaluate the security practices of the developers and suppliers themselves, and identify innovative tools or methods to demonstrate conformance with secure practices.??? NIST has 180 days to publish the preliminary guidelines, so we expect to see them before the end of the year.

Once the preliminary guidelines are published, NIST will then, within 60 days, issue guidance on best practices for securing the software supply chain (most likely early 2022). This guidance must include standards for:

Secure software development environments
Generating proof of adherence to the standards
Employing automated tools to ???ensure the integrity of code???
Employing automated tools to check for vulnerabilities and remediate them
Generating proof of the results of the automated tools??? findings
Maintaining data on the origins of all software code
Providing a software bill of materials
Participating in a vulnerability disclosure program
Attesting to conformity with secure software development practices
Ensuring the integrity of open source software in use

The order covers both new software purchases, and a review of existing legacy software.

There will also be guidance coming on what constitutes a software bill of materials and what should be considered ???critical software.???

Finally, the order requires the development of a pilot program that will examine a security labeling and rating system for consumer software products, including IoT devices.

What???s notable?

SBOM requirement:ツ?The requirement to provide a software bill of materials for each software product is a notable acknowledgement of the reality of modern software ??? very little of it is created from scratch, in-house. Just as requirements surrounding nutrition and ingredients labeling evolved over time as food products became more complicated and awareness of health risks increased, the government is now mandating transparency about what is in software as awareness of the security risks has increased.

Open source inclusion:ツ?As with the SBOM requirement, this inclusion acknowledges another reality of modern software ??? much of it is built on open source libraries, most of which contain vulnerabilities. In fact, ourツ?recent researchツ?found that 70 percent of applications contain a vulnerability in an open source library. This requirement highlights the fact that organizations today can???t call their software secure without assessing the security of the open source components of their applications.

Security testing specifics:ツ?This order gets more specific about software security testing than we had anticipated. It requires using automated tools (or comparable processes) that check for both known and potential vulnerabilities and remediate them. It also notes that the tools should operate regularly, or at least before product, version, or update releases. In the SaaS and PaaS world, this will mean these tools will need to become part of the development process and execute in the pipeline on each build since they often operate with continuous delivery. The emphasis on remediation is also important; we talk to a lot of organizations that feel like they???ve checked the software security box if they are testing their code. In reality, testing just reveals the problem, it doesn???t fix it.

The order also indicates that, within 60 days, NIST will publish guidelines recommending minimum standards for software security testing, including recommended types of testing, such as static and dynamic analysis, software composition analysis, and pen testing. This level of specificity is also important, since there is no software security silver bullet. All theseツ?testing typesツ?identify different types of vulnerabilities at different stages of the development process, and neglecting any of them widens your threat landscape. For instance, static analysis won???t find authorization issues or business logic problems, but dynamic analysis can???t point to the line of code where a vulnerability originates.

Development environment security:ツ?There has been a realization that the environment software is developed in has to have equal or greater security controls than the environment the software operates in. Critical software operated in the most restricted and controlled environments is often developed in environments with weak security controls.

IoT security:ツ?This is perhaps the most groundbreaking and far-reaching inclusion in the order. The order requires the development of pilot programs for IoT and consumer software security that will be ???informed by existing consumer product labeling programs to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices, and shall consider ways to incentivize manufacturers and developers to participate in these programs.???ツ?Recent legislationツ?created requirements around the security of IoT devices purchased by the U.S. federal government, and Singapore and the UK have voluntary programs for labeling IoT. This executive order suggests that this type of regulation may expand to the U.S. consumer market. Consumers of software and IoT devices haven???t to this point overwhelmingly demanded that vendors create secure products, and haven???t been deterred by security, or a lack thereof, when purchasing. But as recentツ?DDoS attacksツ?perpetrated through IoT devices highlight, these interconnected devices create a wide and very dangerous attack surface. Establishing some requirements and transparency around the security of these consumer devices is overdue.

For more information on the executive order, see our previousツ?blog postツ?on the topic, and stay tuned for more posts in the coming days and weeks.

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Security Boulevard.

Read More

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-2/?utm_source=rss&utm_medium=rss&utm_campaign=a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order-2

A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order

Software security is a big focus of the Biden administration???s recentツ?executive orderツ?on cybersecurity. In fact, an entire section, or 25 percent, of the order is dedicated to software security requirements. In the wake of the SolarWinds cyberattack, the security of the software supply chain is clearly top of mind at the White House, and has prompted these unprecedented and detailed security requirements for any software vendor looking to do business with the federal government. The order states:

The security of software used by the Federal Government is vital toツ?the Federal Government???s ability to perform its critical functions.ツ? The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors.ツ? There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended.ツ? The security and integrity of ???critical software??? ??? software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) ??? is a particular concern.ツ? Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.

How will the requirements be developed, and what do they cover?

The order mandates that NIST will identify existing or develop new standards for software security that ???shall include criteria that can be used to evaluate software security, include criteria to evaluate the security practices of the developers and suppliers themselves, and identify innovative tools or methods to demonstrate conformance with secure practices.??? NIST has 180 days to publish the preliminary guidelines, so we expect to see them before the end of the year.

Once the preliminary guidelines are published, NIST will then, within 60 days, issue guidance on best practices for securing the software supply chain (most likely early 2022). This guidance must include standards for:

Secure software development environments
Generating proof of adherence to the standards
Employing automated tools to ???ensure the integrity of code???
Employing automated tools to check for vulnerabilities and remediate them
Generating proof of the results of the automated tools??? findings
Maintaining data on the origins of all software code
Providing a software bill of materials
Participating in a vulnerability disclosure program
Attesting to conformity with secure software development practices
Ensuring the integrity of open source software in use

The order covers both new software purchases, and a review of existing legacy software.

There will also be guidance coming on what constitutes a software bill of materials and what should be considered ???critical software.???

Finally, the order requires the development of a pilot program that will examine a security labeling and rating system for consumer software products, including IoT devices.

What???s notable?

SBOM requirement:ツ?The requirement to provide a software bill of materials for each software product is a notable acknowledgement of the reality of modern software ??? very little of it is created from scratch, in-house. Just as requirements surrounding nutrition and ingredients labeling evolved over time as food products became more complicated and awareness of health risks increased, the government is now mandating transparency about what is in software as awareness of the security risks has increased.

Open source inclusion:ツ?As with the SBOM requirement, this inclusion acknowledges another reality of modern software ??? much of it is built on open source libraries, most of which contain vulnerabilities. In fact, ourツ?recent researchツ?found that 70 percent of applications contain a vulnerability in an open source library. This requirement highlights the fact that organizations today can???t call their software secure without assessing the security of the open source components of their applications.

Security testing specifics:ツ?This order gets more specific about software security testing than we had anticipated. It requires using automated tools (or comparable processes) that check for both known and potential vulnerabilities and remediate them. It also notes that the tools should operate regularly, or at least before product, version, or update releases. In the SaaS and PaaS world, this will mean these tools will need to become part of the development process and execute in the pipeline on each build since they often operate with continuous delivery. The emphasis on remediation is also important; we talk to a lot of organizations that feel like they???ve checked the software security box if they are testing their code. In reality, testing just reveals the problem, it doesn???t fix it.

The order also indicates that, within 60 days, NIST will publish guidelines recommending minimum standards for software security testing, including recommended types of testing, such as static and dynamic analysis, software composition analysis, and pen testing. This level of specificity is also important, since there is no software security silver bullet. All theseツ?testing typesツ?identify different types of vulnerabilities at different stages of the development process, and neglecting any of them widens your threat landscape. For instance, static analysis won???t find authorization issues or business logic problems, but dynamic analysis can???t point to the line of code where a vulnerability originates.

Development environment security:ツ?There has been a realization that the environment software is developed in has to have equal or greater security controls than the environment the software operates in. Critical software operated in the most restricted and controlled environments is often developed in environments with weak security controls.

IoT security:ツ?This is perhaps the most groundbreaking and far-reaching inclusion in the order. The order requires the development of pilot programs for IoT and consumer software security that will be ???informed by existing consumer product labeling programs to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices, and shall consider ways to incentivize manufacturers and developers to participate in these programs.???ツ?Recent legislationツ?created requirements around the security of IoT devices purchased by the U.S. federal government, and Singapore and the UK have voluntary programs for labeling IoT. This executive order suggests that this type of regulation may expand to the U.S. consumer market. Consumers of software and IoT devices haven???t to this point overwhelmingly demanded that vendors create secure products, and haven???t been deterred by security, or a lack thereof, when purchasing. But as recentツ?DDoS attacksツ?perpetrated through IoT devices highlight, these interconnected devices create a wide and very dangerous attack surface. Establishing some requirements and transparency around the security of these consumer devices is overdue.

For more information on the executive order, see our previousツ?blog postツ?on the topic, and stay tuned for more posts in the coming days and weeks.

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Security Boulevard.

Read More

The post A Closer Look at the Software Supply Chain Requirements in the Cybersecurity Executive Order appeared first on Malware Devil.



https://malwaredevil.com/2021/05/18/a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order/?utm_source=rss&utm_medium=rss&utm_campaign=a-closer-look-at-the-software-supply-chain-requirements-in-the-cybersecurity-executive-order

Monday, May 17, 2021

47% of Criminals Buying Exploits Target Microsoft Products

Researchers examine English- and Russian-language underground exploits to track how exploits are advertised and sold.

The post 47% of Criminals Buying Exploits Target Microsoft Products appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/47-of-criminals-buying-exploits-target-microsoft-products-2/?utm_source=rss&utm_medium=rss&utm_campaign=47-of-criminals-buying-exploits-target-microsoft-products-2

Latest Security News From RSAC 2021

Subscribe to Newsletters

White Papers

Video

Cartoon Contest

Write a Caption, Win an Amazon Gift Card! Click Here

Latest Comment: Google Maps is taking “interactive” to a whole new level!

Current Issue

2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!

Flash Poll


How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.

Twitter Feed

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-18194
PUBLISHED: 2021-05-17

Cross Site Scripting (XSS) in emlog v6.0.0 allows remote attackers to execute arbitrary code by adding a crafted script as a link to a new blog post.

CVE-2020-18195
PUBLISHED: 2021-05-17

Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component " /admin.php?action=page."

CVE-2020-18198
PUBLISHED: 2021-05-17

Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete specific images via the component " /admin.php?action=images."

CVE-2020-21831
PUBLISHED: 2021-05-17

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637.

CVE-2020-21842
PUBLISHED: 2021-05-17

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051.

The post Latest Security News From RSAC 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/latest-security-news-from-rsac-2021-3/?utm_source=rss&utm_medium=rss&utm_campaign=latest-security-news-from-rsac-2021-3

Private Facial Diagnosis as an Edge Service for Parkinson’s DBS Treatment Valuation

Read More

The post Private Facial Diagnosis as an Edge Service for Parkinson’s DBS Treatment Valuation appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/private-facial-diagnosis-as-an-edge-service-for-parkinsons-dbs-treatment-valuation/?utm_source=rss&utm_medium=rss&utm_campaign=private-facial-diagnosis-as-an-edge-service-for-parkinsons-dbs-treatment-valuation

A Fusion-Denoising Attack on InstaHide with Data Augmentation

Read More

The post A Fusion-Denoising Attack on InstaHide with Data Augmentation appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/a-fusion-denoising-attack-on-instahide-with-data-augmentation/?utm_source=rss&utm_medium=rss&utm_campaign=a-fusion-denoising-attack-on-instahide-with-data-augmentation

Information Theoretic Key Agreement Protocol based on ECG signals

Read More

The post Information Theoretic Key Agreement Protocol based on ECG signals appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/information-theoretic-key-agreement-protocol-based-on-ecg-signals/?utm_source=rss&utm_medium=rss&utm_campaign=information-theoretic-key-agreement-protocol-based-on-ecg-signals

Real-time Detection of Practical Universal Adversarial Perturbations

Read More

The post Real-time Detection of Practical Universal Adversarial Perturbations appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/real-time-detection-of-practical-universal-adversarial-perturbations/?utm_source=rss&utm_medium=rss&utm_campaign=real-time-detection-of-practical-universal-adversarial-perturbations

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...