SlideShare a Scribd company logo
1 of 16
The new armor for
cybersecurity
SOFTWARE COMPOSITION
ANALYSIS:
CYBERSECURITY SUPPLY CHAIN SBOM SCA
Process and set of tools used to
identify and manage the open-
source and third-party software
components and libraries used in
software applications
Open-Source Software
constitutes 70-90% of any given
piece of modern software solutions
• Component Identification
• License Compliance
• Vulnerability Management
• Dependency Management
• Policy Enforcement
• Reporting and Remediation
KEY ASPECTS
• Enhance security
• Maintain license compliance
• Mitigate risk
GOALS
SCA
What is Software Composition Analysis?
DEFINITION
PREVALENCE
The value of SCA in
your security strategy
You can’t comply, secure and remediate
open source if you’re not aware of where
it exists in your organization
Cybersecurity is becoming
a global movement
Emerging regulations to protect software users
• Enhance supply chain security. The strategy includes initiatives to improve
the security of the supply chains that support critical infrastructure, and
federal systems to reduce the risk of cyberattacks and disruptions.
• Improve incident response and recovery. The strategy emphasizes the need
for effective incident response and recovery capabilities.
• Promote cybersecurity workforce development. The strategy includes
initiatives to address the cybersecurity skills gap — such as
promoting cybersecurity education and training programs.
• Strengthen partnerships with the private sector. The strategy highlights the
private sector’s key role in cybersecurity and includes initiatives to enhance
public-private partnerships — such as sharing threat intelligence, promoting
best practices, and facilitating joint exercises and simulations.
• Transparency in the use of third-party OSS components
• Software Bill of Materials - mandatory
• Process for remediation - mandatory
• Concerns regarding liability exemptions for OSS developers
• Going through Parliament
©2022 Revenera | Company Confidential
Minimum SBOM Elements
A Software Bill of Materials (SBOM) is a formal
and queryable record containing the details and
relationships of various components used in
building software.
https://www.ntia.gov/SBOM
• Supplier info
• SBOM author and timestamp
• SBOM part component version
• SBOM part other unique identifiers (purl, etc.)
• SBOM part dependency relationship
( https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdf )
Open source visibility and control are
essential to maintain the security,
license compliance, and code quality
of automotive software applications
and platforms
Today’s connected
vehicles
Source: How Software Engineering is Changing the Automotive Industry
Enhancing your security posture through
scan, analysis and SBOM management
Recognize and manage risks associated with
third-party and open-source software
components
Identify components
Scan for vulnerabilities
Assess your risk
Receive remediation guidance and support
Access dependency graphs
Automate policy enforcement
Generate a Software Bill of Materials
Key
takeaways
Put in place the right tooling to complement your tech stack
and what works for your business.
1
Implement the right policies, processes and people.
2
Understand both the industry you’re in and the industry(s) you sell to.
3
Set yourself up to provide an inventory of the products you produce
and/or procure for the next major vulnerability event (i.e. Log4j).
4
Do something; take the next step.
5
THANK YOU!
Kendra Morton
kemorton@revenera.com
Russ Eling
russ@ossconsultants.com
Karl Rohrbach
krohrbach@blackberry.com

More Related Content

Similar to Software Composition Analysis: The New Armor for Your Cybersecurity

Eric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core BankingEric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core Banking
Positive Hack Days
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Positive Hack Days
 
Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6
Abdul Basit
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
saurabhshertukde
 
Ch 4 components of the sqa system
Ch 4 components of the sqa systemCh 4 components of the sqa system
Ch 4 components of the sqa system
Kittitouch Suteeca
 

Similar to Software Composition Analysis: The New Armor for Your Cybersecurity (20)

Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Optimizing Software Supply Chains
Optimizing Software Supply ChainsOptimizing Software Supply Chains
Optimizing Software Supply Chains
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Eric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core BankingEric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core Banking
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Driving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive SoftwareDriving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive Software
 
Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6Planning for software quality assurance lecture 6
Planning for software quality assurance lecture 6
 
Building a QMS for Your SaMD Part II
Building a QMS for Your SaMD Part IIBuilding a QMS for Your SaMD Part II
Building a QMS for Your SaMD Part II
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
New Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web ApplicationNew Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web Application
 
Sofware engineering
Sofware engineeringSofware engineering
Sofware engineering
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
SPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and IdentificationSPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and Identification
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
SQA-Lecture-4.pptx
SQA-Lecture-4.pptxSQA-Lecture-4.pptx
SQA-Lecture-4.pptx
 
Ch 4 components of the sqa system
Ch 4 components of the sqa systemCh 4 components of the sqa system
Ch 4 components of the sqa system
 

More from Aggregage

Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Aggregage
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
Aggregage
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
Aggregage
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
Aggregage
 
Breaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for ExcellenceBreaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for Excellence
Aggregage
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Aggregage
 

More from Aggregage (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Planning your Restaurant's Path to Profitability
Planning your Restaurant's Path to ProfitabilityPlanning your Restaurant's Path to Profitability
Planning your Restaurant's Path to Profitability
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor DynamicsThe Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
 
Breaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for ExcellenceBreaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for Excellence
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
How to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product DevelopmentHow to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product Development
 
Bridging the Gap: The Intersection of DEI Initiatives and Employee Benefits
Bridging the Gap: The Intersection of DEI Initiatives and Employee BenefitsBridging the Gap: The Intersection of DEI Initiatives and Employee Benefits
Bridging the Gap: The Intersection of DEI Initiatives and Employee Benefits
 
Mapping Digital Transformation: Retail’s Strategic Shift
Mapping Digital Transformation: Retail’s Strategic ShiftMapping Digital Transformation: Retail’s Strategic Shift
Mapping Digital Transformation: Retail’s Strategic Shift
 
AI & DEI: With Great Opportunities Comes Great HR Responsibility
AI & DEI: With Great Opportunities Comes Great HR ResponsibilityAI & DEI: With Great Opportunities Comes Great HR Responsibility
AI & DEI: With Great Opportunities Comes Great HR Responsibility
 
Can Brain Science Actually Help Make Your Training & Teaching "Stick"?
Can Brain Science Actually Help Make Your Training & Teaching "Stick"?Can Brain Science Actually Help Make Your Training & Teaching "Stick"?
Can Brain Science Actually Help Make Your Training & Teaching "Stick"?
 
How Personalized Customer Experiences Drive Retail Growth and Revenue
How Personalized Customer Experiences Drive Retail Growth and RevenueHow Personalized Customer Experiences Drive Retail Growth and Revenue
How Personalized Customer Experiences Drive Retail Growth and Revenue
 
Your Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer JourneysYour Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer Journeys
 

Recently uploaded

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 

Software Composition Analysis: The New Armor for Your Cybersecurity

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. The new armor for cybersecurity SOFTWARE COMPOSITION ANALYSIS:
  • 7. Process and set of tools used to identify and manage the open- source and third-party software components and libraries used in software applications Open-Source Software constitutes 70-90% of any given piece of modern software solutions • Component Identification • License Compliance • Vulnerability Management • Dependency Management • Policy Enforcement • Reporting and Remediation KEY ASPECTS • Enhance security • Maintain license compliance • Mitigate risk GOALS SCA What is Software Composition Analysis? DEFINITION PREVALENCE
  • 8. The value of SCA in your security strategy You can’t comply, secure and remediate open source if you’re not aware of where it exists in your organization
  • 9. Cybersecurity is becoming a global movement
  • 10. Emerging regulations to protect software users • Enhance supply chain security. The strategy includes initiatives to improve the security of the supply chains that support critical infrastructure, and federal systems to reduce the risk of cyberattacks and disruptions. • Improve incident response and recovery. The strategy emphasizes the need for effective incident response and recovery capabilities. • Promote cybersecurity workforce development. The strategy includes initiatives to address the cybersecurity skills gap — such as promoting cybersecurity education and training programs. • Strengthen partnerships with the private sector. The strategy highlights the private sector’s key role in cybersecurity and includes initiatives to enhance public-private partnerships — such as sharing threat intelligence, promoting best practices, and facilitating joint exercises and simulations. • Transparency in the use of third-party OSS components • Software Bill of Materials - mandatory • Process for remediation - mandatory • Concerns regarding liability exemptions for OSS developers • Going through Parliament
  • 11. ©2022 Revenera | Company Confidential Minimum SBOM Elements A Software Bill of Materials (SBOM) is a formal and queryable record containing the details and relationships of various components used in building software. https://www.ntia.gov/SBOM • Supplier info • SBOM author and timestamp • SBOM part component version • SBOM part other unique identifiers (purl, etc.) • SBOM part dependency relationship ( https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdf )
  • 12. Open source visibility and control are essential to maintain the security, license compliance, and code quality of automotive software applications and platforms Today’s connected vehicles Source: How Software Engineering is Changing the Automotive Industry
  • 13. Enhancing your security posture through scan, analysis and SBOM management Recognize and manage risks associated with third-party and open-source software components Identify components Scan for vulnerabilities Assess your risk Receive remediation guidance and support Access dependency graphs Automate policy enforcement Generate a Software Bill of Materials
  • 14. Key takeaways Put in place the right tooling to complement your tech stack and what works for your business. 1 Implement the right policies, processes and people. 2 Understand both the industry you’re in and the industry(s) you sell to. 3 Set yourself up to provide an inventory of the products you produce and/or procure for the next major vulnerability event (i.e. Log4j). 4 Do something; take the next step. 5
  • 15.
  • 16. THANK YOU! Kendra Morton kemorton@revenera.com Russ Eling russ@ossconsultants.com Karl Rohrbach krohrbach@blackberry.com