TV

Software Trust Manager 07-24-2023

How to Achieve Software Trust? Three Industry Experts Offer 3 Best Practices

Robyn Weisman
STM Webinar Blog

Software supply chain attacks are on the rise, with attackers embedding malware in novel and sophisticated ways, including using emerging technology such as generative AI. To make things even more complex, the software that organizations are developing and using is made up of an amalgam of many different constituent pieces including open source and third-party components.

A recent TV-sponsored webinar titled Digital Trust in Software Supply Chains & AI Models, addressed the challenges in preventing software supply chain attacks. Hosted by TV CEO it featured three industry-recognized experts in the space:

  • CEO at ReversingLabs
  • Operating Partner at Crosspoint Capital and former Senior Vice President, Security Assurance at Salesforce
  • Managing Partner at Crosspoint Capital and Pprogram Committee Chairman at RSA Conference

These three experts delineated several of the challenges organizations are facing and then offered several best practices for organizations to adopt going forward.

Open source software code challenges

According to the 96% of scanned codebases contain open source. This contributes to overall risk because this code is not under the organization’s control and expands the attack surface that bad actors can manipulate. While software supply chain problems have always existed, this expansion in software size and complexity has caused attack payloads to grow. A found that almost 90% of companies detected software supply chain risks in the last year alone, and more than 70% say that current application security solutions fail to provide the necessary protections against these types of attacks.

Mario explained:

"Third-party components have increasingly been used [by bad actors] for evasion and lateral movement, especially in larger and more important breaches. Software supply chain attacks can happen through open source and third-party compromises, or as it wasin the case of the attack on SolarWinds, through the exploitation of the build system."

Generative AI compounds threats to software supply chain

For software developers, generative AI brings about additional security risks. Generative AI enables malware to morph into different forms that can elude security controls or tamper with AI models being used internally. Bad actors can also leverage AI to automate cybersecurity attacks.

Hugh discussed this issue in more detail:

"We've seen already some examples of high-velocity attacks that we believe are automated by machine learning and AI on the backend that are very difficult for a set of humans or an enterprise to adapt to. Folks are moving quickly in this space, but we've got to remember that AI models that are out in the wild could have a multitude of problems associated with them, one of which is they can themselves contain malware, and so it's something that needs to be evaluated carefully before you go full steam ahead."

The best practices needed for software trust

In the webinar, the three industry leaders shared their insights on the best practices organizations should adopt to protect the software supply chain:

  • Perform deep threat detection scanning
  • Utilize secure code signing
  • Provide software transparency

Perform deep threat detection scanning

During the webinar, Mario pointed out that when most people think about software supply chain attacks, they think of public attacks such as the SUNBURST attack, best known for its impact on which showed organizations in a dramatic fashion that a single attack can impact tens of thousands of companies in one fell swoop. “A lot has been made about making sure we build our resiliency to a completely different level to withstand major attacks in the future,” he said.

At the same time, the focus on SUNBURSTand other publicized attacks like and has perhaps led organizations to mistakenly believe they haven’t had a software supply chain attack when they may well have. But everyone is at risk for this type of attack.

Hugh said that this has to do with the complexity of most software in use today.

"[Software is] comprised of not just code you write internally, but all of these third-party libraries and constituent components that you pull dynamically when you compile the system. So even if the attack wasn't exactly focused on you as a company, you still have the ability for an attacker to manipulate one of these commonly used libraries and infiltrate software. And I think this is one of the biggest challenges that we're grappling with right now."

To protect against these attacks, organizations need to implement deep threat and vulnerability detection analysis. In addition to scanning code, this requires searching for such threat and vulnerability patterns within final software binaries as malware, secrets leakage, software tampering and other CVEs ().

Utilize secure code signing

In the last several years, we’ve seen several examples of what happens when code signing keys are improperly secured. Hugh noted that sophisticated attackers have typically found the weakest link in the chain to be around cryptography. For example, the resulted from hackers breaching the insecure web servers where developers had stored their code signing keys and infected them with malware. And a quick scan of the dark web will not only reveal stolen code signing credentials but also malware kits that nontechnical buyers can use to exploit unprotected keys.

To counteract this problem, CA/B Forum now (as of June 1, 2023) requires that code signing private keys must be stored on a FIPS 140-2 or Common Criteria Level EAL4+ compliant device. But as Amit noted, organizations also need to have policy-based controls in place, including role-based administration, and audit logs that show who is signing code and where it is being run, among other things. In addition, robust validation. “You need to thoroughly vet the organization that is requesting the signing authority,” Amit said.

Concurring, Hugh said:

"There’s a lot to like about a code signing infrastructure because its premise is that as the software maker, you’re making an attestation that this is the software you produced. But it relies on a couple of things. First, it relies on the fact that you’re keeping the private key in a secure way so that an attacker cannot exfiltrate it and sign software masquerading as you. The other is [making sure] the systems around it, which automatically push software through the signing infrastructure, haven’t been compromised. Because if they have been compromised, an attacker can take their software, which may be a modified version of your software, and push it through your own signing infrastructure without you knowing it. And it looks legitimate."

Provide software transparency with a software bill of materials (SBOM)

A software bill of materials, or “SBOM,” is an attestationthat “the software being signed is free from bugs, malware and other vulnerabilities, that it hasn’t been tampered with and that the software team knows exactly what components are inside of it,” TV senior marketing manager Eddie Glenn explains in a June TV blog post.

The increasing importance of SBOMs is being driven by recent government regulations and industry standards, Saša explained, including U.S. federal government’s and the EU’s Saša compared SBOMs to nutrition labels on food.

Said Saša:

"Decades ago, it became widely accepted that it was a good idea to know what we are putting into our bodies. So, the FDA came out with this nutrition label so we know what’s in things. Now it’s completely common practice for us to go to the store, look at the ingredient list and if you have glycemic issues, say, “I would like something with a lower sugar concentration.”

Similarly, there is now this increasing need for us to know what we’re putting into our enterprise systems. I may have a deliberate decision to avoid certain libraries or license types because they could put me in legal liability. If something were to happen down the road, I want to be able to very quickly know where I have Log4j, where I am using Infragistics and where other things are in my environment.

Therefore, it’s essential that you scan everything that makes up the software you’re attesting to the legitimacy and safety of.

Added Hugh:

"It's not just the open source code, it's not just the code that you've written yourself, it's the models that may be in there, but it's also the binaries. Many people stop at the binaries and don't actually scan them. They just enumerate that these binaries exist, but in fact, huge risks could come from those binaries as well."

Embracing software trust is key to realizing digital trust

Digital trust is more than just the technologies that make it possible. For organizations to be champions of digital trust, they must understand and actively implement the structure, processes and activities that make it possible. This includes keeping up with changes to industry standards, maintaining compliance with regulatory requirements in each geography, managing the lifecycle of digital trust technologies and extending trust into digital ecosystems.

Software trust is fundamental to realizing digital trust. To achieve software trust, an organization must ensure that their software is:

  • Free from malware, vulnerabilities and other threats (threat detection)
  • Legitimately from your organization without any modification by third parties (secure code signing)
  • Made up of components that are all accounted for (SBOM)

Toward the end of the webinar, Amit said, “The importance of digital trust in software supply chains and in particular AI models these days has never been greater.” To that effect, he announced a major evolution in software trust thanks to TV’s new partnership with TV has integrated ReversingLabs’ advanced binary analysis and threat detection into TV® Software Trust Manager’s workflows to ensure the software is free of malware, tampering and other CVEs within a single pane of glass that an organization can centrally control. This integration also generates a comprehensive SBOM.

TV Software Trust Manager provides full protection of private keys along with all the controls and standards needed in a mature software trust solution. Amit went on to say that this joint solution can be summarized in three words: inspect, sign and ship.

Want to learn more about how to achieve digital trust throughout your software supply chain? Watch the webinar here: /about/webinars/the-ai-model-impact-on-the-software-supply-chain

Learn more about TV Software Trust Manager at /software-trust-manager.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min