Saturday, March 25, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

IBM Contributes Supply Chain Security Tools to OWASP

justmattg by justmattg
March 3, 2023
in Cyber Security
0
Check Point Boosts AppSec Focus With CNAPP Enhancements
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



IBM has contributed two open source supply chain tools — SBOM Utility and License Scanner — to the Open Worldwide Application Security Project (OWASP) Foundation’s CycloneDX Software Bill of Materials (SBOM) standard. These two tools will fill two crucial gaps in CycloneDX, which the OWASP describes as a “full-stack” BOM standard that provides advanced supply chain risk reduction.

The software bill of materials, or SBOM, is an inventory listing all individual components used in software. The discovery of the vulnerability in the Log4j library two years ago highlighted just how few organizations really understood what was inside the software they were running. It wasn’t enough to just know which third-party components, libraries, and frameworks were being used — organizations need to be aware of all the dependencies those components were using. In response to various supply chain attacks and the Log4j chaos, the White House issued an Executive Order mandating that developers improve the security of their supply chains. One way is to include and maintain an SBOM for every piece of software they distribute.

“IBM has been advocating for all developers and organizations creating modern software to begin their journey to create SBOMs,” says Jamie Thomas, IBM’s general manager of systems strategy and development. “These tools are foundational complements to aid developers in this journey, so they can better understand the potential risks in their software supply chains.”

Standardizing SBOMs

Efforts to standardize the SBOM have accelerated with the sharp rise in software supply chain attacks over the past two years.

CycloneDX is one of two primary SBOM standards, the other being the Linux Foundation’s Software Package Data Exchange (SPDX). Proponents of CycloneDX, which is newer, describe it as a more lightweight standard better suited to those seeking a machine-readable way to exchange information. The Linux Foundation in 2021 declared SPDX an SBOM standard, though it was initially created for intellectual property and licensing use cases. Both organizations are expanding their respective SBOM standards efforts.

IBM has actively participated in advancing CycloneDX’s standards efforts, Steve Springett, director of product security at ServiceNow and chair of the OWASP’s CycloneDX working group, tells Dark Reading. “Software supply chain security is a topic of board-level discussions,” Springett says. “There are many ways that organizations should improve their software supply chain assurance. And it starts with actually having all the data and more tools to drive more intelligence.”

Licensing Scanner Tool Brings Balance With SPDX

The CycloneDX working group has introduced some license scanning capabilities over the years, including base-level support for SPDX license IDs. But CycloneDX’s licensing capability has lagged the functionality of SPDX. Springett says the addition of IBM’s License Scanner fills that void. “It’s great that we have a license scanner as part of the project,” Springett tells Dark Reading. “Having a dedicated license tool actually will invite more people to the Cyclone DX table that we’ve built.”

Brian Fox, co-founder and CTO of AppSec tool provider Sonatype, agreed. “I think this helps balance things out with CycloneDX on the licensing side,” Fox said. “It will provide more building blocks to enable tools in the ecosystem to work better. Being able to more easily add licensed data to your CycloneDX SBOM, if you don’t have existing tooling to do that, is a useful utility. Having the ability to validate both formats is also a useful utility.”

In an OWASP blog post on Wednesday announcing IBM’s contribution, Springett noted that IBM’s License Scanner scans files for licenses and legal terms. “It can be used to help identify text matching licenses and license exceptions from the complete, published SPDX License List,” he wrote. “It can also be configured to identify additional legal terms, keywords, aliases, and non-SPDX licenses. As a library, License Scanner is designed to be integrated into existing BOM generation software or may be used by itself as a command-line utility.”

SBOM Utility Adds APIs to CycloneDX

Springett described IBM’s SBOM Utility as an API platform that can validate CycloneDX or SPDX-formatted BOMs with their published schemas. It can validate and analyze a variety of BOM types, including hardware (HBOMs) and SaaS (SaaSBOMs). In the future, Springett noted, SBOM Utility will support OWASP’s Software Component Verification Standard (SCVS), “which is defining a BOM Maturity Model (BMM) to help in identifying and reducing risk in the software supply chain.”

Also, he noted that SBOM Utility could process documents such as Vulnerability Disclosure Reports (VDRs) and Vulnerability Exploitability eXchange (VEX) data formats, which CycloneDX has specified provide risk assessment.

“The SBOM Utility is great because it takes an API approach and allows organizations to slice and dice the CycloneDX data model and all the data in it,” Springett says. “If you care about certain aspects of the bill of material, you can quickly query it, which is fantastic. And you can then allow organizations to start creating policy based on the types of data that may or may not exist in that bill of material.”

While IBM initially built SBOM Utility and License Scanner for its use, the company has not said whether it plans to release commercial versions.



Source link

READ ALSO

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

Red Teaming at Scale to Uncover Your Big Unknowns

Related Posts

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
Cyber Security

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

March 25, 2023
Red Teaming at Scale to Uncover Your Big Unknowns
Cyber Security

Red Teaming at Scale to Uncover Your Big Unknowns

March 24, 2023
Inside the High Risk of 3rd-Party SaaS Apps
Cyber Security

Inside the High Risk of 3rd-Party SaaS Apps

March 24, 2023
Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams
Cyber Security

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

March 24, 2023
Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts
Cyber Security

Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts

March 24, 2023
2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
Cyber Security

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks

March 23, 2023
Next Post
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices

New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

How to Stop Attackers That Target Healthcare Imaging Data

How to Stop Attackers That Target Healthcare Imaging Data

February 22, 2023
Encrypted Messaging App Exclu Used by Criminal Groups Cracked by Joint Law Enforcement

Encrypted Messaging App Exclu Used by Criminal Groups Cracked by Joint Law Enforcement

February 7, 2023
Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

January 1, 2023
25 Tricks To Sell Your House for a Bigger Profit

25 Tricks To Sell Your House for a Bigger Profit

January 30, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • The NSA and CISA Highlight On-device Privacy: Identity News Digest
  • Red Teaming at Scale to Uncover Your Big Unknowns
  • Inside the High Risk of 3rd-Party SaaS Apps
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.