Time to Worry about your Software Supply Chain?

Published October 9, 2018

Category: Innovation | Sourcing

Become A Contributor

Written by: Brandon Curry
Author Image

Brandon Curry

Brandon Curry has worked as an expert in the information technology industry for more than 25 years. During this time, he has held a variety of roles ranging from sales and post-sales account management to operations and solution architecture, on both the IT and network sides of the information communications technology (ICT) business.

Curry brings a unique, out-of-the-box perspective to problem solving, technology strategies and customer solutions. He joined NTT America in 2015 after working for T-Systems North America in several capacities, including Head of Sales and Service Management. In his current role, Curry is NTT America’s Vice President of Solutions, Product and Service Management, leading the end-to-end pre-sales, product management, post-sales governance and account management functions.

Curry is a strong believer in continuous learning, and is a thought leader on new technologies and market trends. He holds an Associate of Science degree in pre-medicine from the University of Kentucky, an MBA from Northwestern University’s Kellogg School of Management, and an MS in security from Carnegie Mellon University. He has earned many advanced level certifications such as CCIE, CISSP and is a Certified Ethical Hacker. In addition, Mr. Curry is a member of the (ISC)2 national and Chicago chapters, as well as the Global IT Architects Association.
Twitter: @nttcom

Read More
Software has become crucial to every industry. Yet ensuring the software system you are buying or licensing is authentic and free from defect or malware is a challenge. The QA procedure in old-school manufacturing is to test a random set of newly delivered widgets for their compliance with approved specifications. But you can’t really take the same simple approach with software. 
 
Vendors deliver – and update – software on an ongoing basis, making it difficult to know when to test. And because a software system may contain millions of lines of code, it’s hard to know how to test and exactly what to test for. Then there’s the significant question of how much control a supplier can truly exert on whom and what contributes to a product’s development. 
 
Recent Threat History 
 
This brings up the challenge of bad actors. Over the past few years, as organizations have continued to harden their defenses, some hackers have moved upstream and found ways to inject malware into products prior to their distribution to customers. 
 
In 2015, software security company Kaspersky Lab discovered what it believed was a state-sponsored, advanced attack on its own internal networks. While the intent of the hack seems to have been spying, it could have led to malware injection. That is precisely what happened the same year to an event log application used by enterprise Windows system administrators. In that case, Trojan malware led to a sophisticated supply chain operation, named “Kingslayer,” which RSA Research reported on in 2017.  
 
The potential impact of Kingslayer was extensive. According to RSA, organizations that had subscribed to the event log portal included: four major telecom providers; five major defense contractors; more than 10 western military organizations; and dozens of Fortune 500 companies, IT product manufacturers, government organizations, banks, financial organizations and higher education institutions. 
 
Bad actors pressed ahead in 2017, which the National Counterintelligence and Security Center recently called a watershed year in terms of awareness of software supply chain infiltration. Cases that made the news in 2017 include a backdoor attack on CCleaner, a PC cleaning and optimization tool; a hit on the PyPI (Python Package Index) repository; and an attack on a tax accounting app that sent NotPetya ransomware to banks, airports and power companies in Ukraine, Russia and parts of Europe. 
 
On the Radar, the Vetting Process 
 
The attack on Python is especially significant. If a programming language itself can be corrupted, then the impact downstream could be tremendous. And while awareness is growing, it is not yet where it needs to be. 
 
In interviews conducted earlier this year with 1,300 senior IT decision makers and security pros sponsored by CrowdStrike, VansonBourne found six topics that outranked supply chain attacks, namely: general malware, phishing, password attacks, ransomware, advanced targeted attacks and denial of service. At the same time, supply chain is on the radar of these IT leaders, as 79 percent agreed with the statement: “I believe that software supply chain attacks have the potential to become one of the biggest cyber threats to organizations like mine within the next three years.” 
 
So what’s a sourcing exec to do? As I wrote in this ComputerWorld article on SaaS security, enterprise users can try and gauge a provider’s security profile and test their “good citizenship.” For instance, ensure that they follow relevant best practices, such as those promoted by the Open Web Application Security Project (OWASP) or the Web Application Security Forum Consortium. 
 
But can you actually inspect a software company’s own sources? That’s hard to do, and not high on anyone’s agenda. The IT leaders interviewed by VansonBourne ranked “a supplier’s relationship with their suppliers” at the bottom of the vetting process. One alternative is to work with a trusted managed services provider. 
 
Don’t Forget the Basics 
 
Meanwhile, with software supply chain attacks costing an average $1.1 million per attack globally, according to VansonBourne, it makes a lot of sense to simply strengthen your overall cybersecurity posture. In a related article in the NTT Security Global Threat Intelligence Center (GTIC) monthly report for August, Senior NTT Security Analyst Danika Blessman makes three basic recommendations: 
 
  • “Ensure your organization has a comprehensive, defense-in-depth security strategy in place as threats morph from one to another.  
  • Ensure you include your supply chain in your security strategy, holding your vendors to the same security standard you hold your own organization.  
  • Implement threat intelligence to help your organization understand and mitigate a variety of threats.” 
As a sourcing expert, you’re no stranger to supply chain management. When adding software to the mix, pay special attention to Blessman’s second point, which is kind of a golden rule for IT security: Hold your vendors to the same standards you maintain yourself.

You May Also Like…

Adam Smith and outsourcing

What does Adam Smith tell us about outsourcing? The answer is somewhat complicated: Nothing directly, but then again everything. I’ll explain. Obviously, the term outsourcing did not exist when...

All in the Game

This article originally appeared in Outsource Magazine Issue #23 Spring 2011 Leading academics charted a path that challenges the conventional definition of winning. Smart companies are applying these concepts, showing that...

SIG|ORG Spotlight Content