The EO creates higher standards for software verification techniques and other software supply chain controls. Therefore, additional scrutiny is being placed on the software that the vendors produce, as well as the business entities within a given software supply chain that may sell, distribute, store, or otherwise have access to the software code. Federal agencies that seek to enhance their assessment of supplier software supply chain controls can perform additional scrutiny on vendor SDLC capabilities, security postures, and risks associated with FOCI.
The following capabilities provide recommended vendor risk assessment and attestation capabilities beyond those outlined in Section 4 of EO 14028.
Automatically verify hashes/signatures for all vendor-supplied software installation and updates, where feasible.[1]
--------------
[1] Enduring Security Framework. (2021). User Group’s Overview of the Top Supply Chain Threats. https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/Cybersecurity-Partnerships/ESF/
[2] Contrast Security. (2021). 5. Guidelines for software integrity chains and provenance.
[3] Amazon Web Services. (2021). NIST June 2021 EO Workshop Submission.
[4] Enduring Security Framework. (2021). User Group’s Overview of the Top Supply Chain Threats. https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/Cybersecurity-Partnerships/ESF/
Content: