Implement NIST draft to protect the software supply chain

Implement NIST draft to protect the software supply chain

Share post

Software development and DevSecOps pipelines are popular targets for hackers. They can be better protected using the NIST framework.

“The way software is developed is constantly changing, with new methods increasing the efficiency of the development process. Software architecture is also evolving so that much of the software can be built from reusable standard components,” said Tom Molden, CIO Global Executive Engagement at Tanium.

Adapt control systems for software

“Think of it like building a prefab home, where the standard parts can be built in a factory with far greater efficiency and quality, while the truly valuable and customized parts of the home are left to the builder or on-site craftsman. As the world of software development changes rapidly, the opportunities for security risks multiply, meaning the control systems designed to help companies protect the software they develop and deploy must also adapt.

Constant Integration and Constant Deployment (the new processes introduced into cloud native development) push progress to a level where humans can no longer keep up. Even the best application security engineer couldn't keep up with something that's constantly changing.

NIST – equal protection for everyone involved

As lengthy as they are, the NIST frameworks are useful in that they take a very comprehensive approach to security controls - they think things through thoroughly and present a lot of detailed information. Another way to look at it is that they did the work for you - a gift horse, so to speak. A frame of reference like NIST, so widely used around the world, means that all actors involved in protecting the environment read the same sheet of music.

All types of security controls typically involve some level of manual component. At some point, a cyber analyst or operator has to look at something and make a judgment call. The implication of CI/CD is a higher level of automation in the software development process, and the challenge is usually how to cover those steps in the automation that are normally carried out by a human.

Various NIST frameworks

It will likely be very difficult to continue to support both cloud-native and legacy software development in the future. The evolution of the cloud has forced standardization and enabled efficiencies not typically found in the world of legacy development. Legacy software development occurs in so many different environments and in so many different ways that it's hard to imagine retooling. If I had a euro to spare, I would invest it in faster development towards cloud and devsecops instead of trying to fix something retroactively.

There are many different types of NIST frameworks, and it is helpful to understand how they work together. I think a leadership-level presentation of key findings from the NIST control environment would be useful – to show how this new framework relates to others.”

More at Tanium.com

 


About Tanium

Tanium, the industry's only Converged Endpoint Management (XEM) provider, is leading the paradigm shift in traditional approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, compliance, security, and risk into a single platform. The Tanium platform provides comprehensive visibility across all devices, a unified set of controls, and a common taxonomy.


Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more