CISA comments on the upcoming software transparency requirement

Subscribe to our newsletter.

Stay connected

Over five days in July, the Infrastructure Security and Cybersecurity Agency will hold a series of listening sessions to increase visibility across the federal business, a basic precept of an executive order for the country’s cybersecurity, by using a software nomenclature or SBOM. .

“E. O. 14028 defines SBOM as “a formal record containing the main points and source chain relationships of various parts used in structure software,” CISA explained in a statement published Wednesday in the Federal Register. software developers and vendors create products by assembling existing advertising and open source software parts. The SBOM lists those parts in a product. ‘

As noted in a data paper produced through the House Science Committee before a recent hearing on the subject, “Modern software products feature a plethora of parts from other developers, code repositories, and other sources. Software component vendors also use other naming schemes for the same parts. Therefore, identifying which vulnerabilities compromise which products can be a technical feat. SBOMs would possibly be able to address this challenge by creating a machine-readable stock that allows software developers and users to keep track of software parts and accounts and make it less difficult to respond to vulnerabilities in the event of an incident.

“However,” the committee wrote, “as heard through the Investigations and Oversight Subcommittee at its network security hearing in May 2021, doubts remain about the effectiveness of SBOMs and the ability of organizations to adopt them. “

Under Executive Order 14028, prospective vendors will be required to provide agencies with the minimum elements of an SBOM, the use of which is a component of a broader set of practices, adding the use of multi-factor authentication and similar security measures in progression environments, management needs agencies when purchasing software.

The statement states that the company “will not request express effects from assembly attendees, nor does CISA intend to use the data shared in the listening sessions to directly address or inform any federal policy decisions. “

Federal Director of Information Security Chris DeRusha told Nextgov that the Office of Management and Budget, the National Institute of Standards and Technology and CISA have already submitted their recommendations to the Federal Procurement Regulatory Council on software acquisition laws, pursuant to the decree.

CISA said it was hosting the sessions, “recognizing the importance of SBOMs in transparency and security, and that the evolution and refinement of SBOMs comes from the network to maximize efficiency. “the creation, use and implementation of SBOM across the generation ecosystem. “

The company welcomes the additional ideas, but is interested in 4 topics: cloud and online applications, SBOM sharing and sharing, teams and deployment, and ramps and adoption.

On the first of these, CISA said: “Most of the existing discussions about SBOM, especially about SBOM use cases, have focused on local software. Cloud-based software and software as a service (SaaS) is a vital and developing segment. of the software ecosystem. Potential subtopics would possibly include: How do netpaintings think about SBOM in the context of online programs and modern infrastructure?How can netpaintings integrate SBOM designs into emerging cloud-native opportunities? »

Help us personalize the particular content for you:

Leave a Comment

Your email address will not be published. Required fields are marked *