Lessons From OSC&R on Protecting the Software Supply Chain

Lessons From OSC&R on Protecting the Software Supply Chain

November 15, 2024 at 09:44AM

Today’s software development, combining open source, third-party, and custom code, faces heightened vulnerabilities, as evidenced by notable breaches. A recent report highlights that 95% of organizations encounter serious risks, emphasizing the need for proactive, multilayered security strategies throughout the development life cycle to mitigate these ongoing threats effectively.

### Meeting Takeaways on Software Supply Chain Security

**1. Current Landscape of Software Vulnerabilities**
– The software supply chain is increasingly complex, incorporating a mix of open-source, third-party, and internal components.
– 91% of organizations have experienced at least one software supply chain security incident in 2023, with trends not improving in 2024.
– Significant historical breaches (e.g., MOVEit, SolarWinds) highlight the widespread exposure across all sectors and company sizes.

**2. Open Software Supply Chain Attack Reference (OSC&R) Initiative**
– Launched by AppSec experts to assist organizations in understanding and mitigating software supply chain vulnerabilities.
– The inaugural report analyzes over 100 million alerts and provides insights into vulnerabilities throughout the supply chain.

**3. Key Findings from OSC&R Report**
– **Run-Time Vulnerabilities:** 20% of applications contain critical vulnerabilities during execution; early detection in software development is crucial.
– **Old Vulnerabilities Persist:** Common attack vectors include command injection (15.4%), sensitive data in logs (12.4%), and cross-site scripting (11.4%). Organizations must prioritize patching older vulnerabilities.
– **Multistage Vulnerabilities Amplify Threats:** 36% of applications are vulnerable at initial access stages, necessitating defense mechanisms across all attack stages.

**4. Recommendations for AppSec Teams**
– **Enhance Application Runtime Security:** Implement continuous monitoring and real-time defenses to catch vulnerabilities early.
– **Regularly Update Legacy Systems:** Establish a strong vulnerability management program to manage both old and new threats effectively.
– **Adopt Multilayered Security Solutions:** Deploy security measures that cover all stages of the attack lifecycle to prevent lateral movement by attackers.
– **Holistic Approach Required:** Emphasize systemic evaluations of software development and attack lifecycle processes, ensuring coverage from build to runtime.

**5. Future Focus Areas**
– Align security measures with the types of vulnerabilities present in live applications.
– Use OSC&R as a framework for mapping security programs to known attack vectors.
– Strive for a unified full-lifecycle AppSec strategy to minimize vulnerabilities reaching production.

This summary emphasizes the ongoing challenges and strategies in improving software supply chain resilience, highlighting the important role of proactive measures and comprehensive security frameworks.

Full Article