Technology How to mitigate security threats and supply chain attacks...

How to mitigate security threats and supply chain attacks in 2023 and beyond

-

View all on-demand sessions from the Intelligent Security Summit here.


The explosion of popular programming languages ​​and frameworks has reduced the effort required to create and deploy web applications.

However, most teams need more resources, budget, and knowledge to manage the massive number of dependencies and technical debts accumulated during the application development lifecycle. Recent supply chain attacks have leveraged the software development lifecycle (SDLC), highlighting the need for comprehensive application security operations in 2023 and beyond.

Attack on the software supply chain

Supply chain attacks happen when malicious actors compromise an organization through software supply chain vulnerabilities, as the SolarWinds breach has demonstrated all too well. These attacks take place in various ways, for example by exploiting malicious code hidden in popular open source libraries or by using third-party vendors with poor security posture.

Gartner predicts that 45% of organizations worldwide will experience attacks on their software supply chains by 2025. With this in mind, security and risk management leaders should work with other departments to prioritize digital supply chain risks and pressure suppliers to prove they have robust security practices in place.

Event

Intelligent Security Summit on demand

Learn the critical role of AI and ML in cybersecurity and industry-specific case studies. Check out on-demand sessions today.

Look here

Open-source and Software Bill of Materials (SBOMs)

Many organizations use ready-made libraries and frameworks to accelerate web application development. Once there’s a working prototype, teams can focus on automating build and deployment to deliver applications more efficiently. The rush to ship apps has led to development operations (DevOps) (which combine software development and IT operations to accelerate SDLC) and use continuous integration and development (CI/CD) pipelines to deliver software.

To solve the challenges posed by unknown code in critical applications, the Department of Commerce, in conjunction with the National Telecommunications and Information Administration (NTIA), has identified the “minimum elements” for a Software BOM (SBOM). An SBOM contains the details and supply chain relationships of various components used in building software, and serves as a source for:

  • Check which components are in a product.
  • Check that components are up to date.
  • Respond quickly when new vulnerabilities are found.
  • Check compliance with open source software (OSS) licenses.

The SBOM greatly improves visibility across the codebase, which is critical because the complexity of open-source software libraries and other third-party dependencies can make identifying malicious or vulnerable code in application components extremely difficult. Log4j is an excellent example of an open-source vulnerability that an SBOM can help organizations find and fix.

What is missing in application security?

Most security tools run as a layer on top of the development cycle – and the larger the organization, the harder it is to enforce the use of those tools. Far too often companies don’t consider security until after applications are deployed, so the focus is instead on reporting issues that are already baked into the application.

Many vendors make checks for software supply chain vulnerabilities into a product and ignore security during the pre-development phase, failing to address the proliferation of malware in open source packages and third-party libraries used to develop the applications .

Unfortunately, this gap between development and security makes a perfect target for malicious actors. Well-funded, highly motivated attackers have the time and resources to exploit the gap between DevOps and DevSecOps. Their ability to integrate and understand modern SDLC has far-reaching implications for application security.

7 ways to improve your AppSec attitude for 2023 (and beyond)

As malicious actors find new ways to exploit and exploit vulnerabilities, organizations must harden their environments and improve the security of their web applications. Following these seven best practices will help you build security into DevOps processes and prepare for the threats coming in 2023:

  • Use a SBOM to ensure visibility in the code to enable better application security.
  • Formalize an open-source software approval process, including all libraries, containers and their dependencies. Make sure DevSecOps has the tools and knowledge necessary to assess these packages for risk.
  • Suppose all software is compromised. Build a supply chain approval process and enforce security in the supply chain.
  • Never use production credentials in the continuous integration (CI) environment. and check that repositories are clean.
  • Enable GitHub security settingssuch as multi-factor authorization (MFA) to prevent account takeovers, secret leak alerts, and dependency bots that notify users when they need to update packages (but remember, these methods alone are not enough).
  • Merge development security in the application development lifecycle by implementing shift-left protocols for software development.
  • Provide comprehensive end-to-end protection for the digital ecosystem. Deploy a layer of security at every part of the supply chain – from the SDLC, the CI/CD pipeline, and the services that manage data in transit and store data at rest.

Following these comprehensive security best practices and continually reviewing and implementing them across an organization can help security teams better secure applications and successfully mitigate threats for years to come.

George Prici serves as VP of products at OPSWAT.

Data decision makers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people who do data work, can share data-related insights and innovation.

To read about advanced ideas and up-to-date information, best practices and the future of data and data technology, join DataDecisionMakers.

You might even consider contributing an article yourself!

Read more from DataDecisionMakers

Shreya Christinahttp://ukbusinessupdates.com
Shreya has been with ukbusinessupdates.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider ukbusinessupdates.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Latest news

1xbet App ᐉ Скачать 1xbet Mobile 1xbet Apk Android & Ios ᐉ My 1xbet Co

1xbet App ᐉ Скачать 1xbet Mobile 1xbet Apk Android & Ios ᐉ My 1xbet Com1xbet Официальное Приложение Скачать и...

Вулкан Вегас официальному Сайт: Автоматы в Деньги В Vulkan Vega

Вулкан Вегас официальному Сайт: Автоматы в Деньги В Vulkan VegasЛучшие Сайты Онлайн-слотов В 2024 году Игры На Игровые Автоматы...

Comment jouer au RDR2 Poker Un guide pour gagner au RDR2 Poker

Fort heureusement, vous pouvez sauvegarder entre chaque parties gagnées et quitter la table en cours de partie dans modifier...

comment ouvrir un casino 653756

Elle garantit que le casino opère selon des normes établies pour protéger les joueurs, garantir des jeux équitables et...

Royal Ace Casino Review Updated for April 2024

Nous sommes un annuaire indépendant et un réviseur de casinos en ligne, un forum sur les casinos et un...

Red Dead Redemption 2, comment tricher au poker

Lorsque vous jouez contre des joueurs expérimentés, cela les empêche d'apprendre votre style et de prédire vos décisions. Une...

Must read

You might also likeRELATED
Recommended to you