The Government’s Software Bill of Materials (SBOM) Mandate Is Part of...

The Government’s Software Bill of Materials (SBOM) Mandate Is Part of…

News Image

SBOMs are meaningless unless they are part of a larger strategy that identifies risks and vulnerabilities across the software supply chain management system.

The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021.(1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027.(2) To support the nation’s critical infrastructure and Federal Government networks, the White House issued Executive Order 14028, “Improving the Nation’s Cybersecurity” in May 2021.(3) The EO defines the security measures that must be followed by any software publisher or developer that does business with the Federal Government. One of these measures requires all software developers to provide a Software Bill of Materials (SBOM), a complete inventory list of components and libraries that comprise a software application. Walt Szablowski, Founder and Executive Chairman of Eracent, which has provided complete visibility into its large enterprise clients’ networks for over two decades, observes, “SBOMs are meaningless unless they are part of a larger strategy that identifies risks and vulnerabilities across the software supply chain management system.”

The National Telecommunications and Information Administration (NTIA) defines a Software Bill of Materials as “a complete, formally structured list of components, libraries, and modules that are required to build a given piece of software and the supply chain relationships between them.”(4) The U.S. is especially vulnerable to cyberattacks because much of its infrastructure is controlled by private companies who may not be equipped with the level of security necessary to thwart an attack.(5) The key benefit of SBOMs is that they enable organizations to identify whether any of the components that make up a software application may have a vulnerability that can create a security risk.

While U.S. government agencies will be mandated to adopt SBOMs, commercial companies would clearly benefit from this extra level of security. As of 2022, the average cost of a data breach in the U.S. is $9.44 million, with a global average of $4.35 million.(6) According to a Government Accountability Office (GAO) report, the Federal Government runs three legacy technology systems dating back five decades. The GAO warned that these outdated systems increase security vulnerabilities and frequently run on hardware and software that is no longer supported.(7)

Szablowski explains, “There are two key aspects that every organization will have to address when using SBOMs. First, they must have a tool that can quickly read all of the details in an SBOM, match the results to known vulnerability data, and provide heads-up reporting. Second, they must be able to establish an automated, proactive process to stay on top of SBOM-related activity and all of the unique mitigation options and processes for each component or software application.”

Eracent’s cutting-edge Intelligent Cybersecurity Platform (ICSP)™ Cyber Supply Chain Risk Management™ (C-SCRM) module is unique in that it supports both of these aspects to provide an additional, critical level of protection to minimize software-based security risks. This is essential when initiating a proactive, automated SBOM program. The ICSP C-SCRM offers comprehensive protection with instant visibility to mitigate any component-level vulnerabilities. It recognizes obsolete components that can also increase security risk. The process automatically reads the itemized details within the SBOM and matches each listed component to the most up-to-date vulnerability data using Eracent’s IT-Pedia® IT Product Data Library — a single, authoritative source for essential data concerning millions of IT hardware and software products.”

A vast majority of commercial and custom applications contain open-source code. Standard vulnerability analysis tools do not scrutinize individual open-source components within applications. However, any one of these components may contain vulnerabilities or obsolete components, increasing software susceptibility to cybersecurity breaches. Szablowski notes, “Most tools let you create or analyze SBOMs, but they are not taking a consolidated, proactive management approach — structure, automation, and reporting. Companies need to understand the risks that may exist in the software they use, whether open-source or proprietary. And software publishers need to understand the potential risks inherent in the products they offer. Organizations need to fortify their cybersecurity with the enhanced level of protection Eracent’s ICSP C-SCRM system delivers.”

About Eracent

Walt Szablowski is the Founder and Executive Chairman of Eracent and serves as Chair of Eracent’s subsidiaries (Eracent SP ZOO, Warsaw, Poland; Eracent Private LTD in Bangalore, India; and Eracent Brazil). Eracent helps its customers meet the challenges of managing IT network assets, software licenses, and cybersecurity in today’s complex and evolving IT environments. Eracent’s enterprise clients save significantly on their annual software spend, reduce their audit and security risks, and establish more efficient asset management processes. Eracent’s client base includes some of the world’s largest corporate and government networks and IT environments — the USPS, VISA, US Airforce, British Ministry of Defense — and dozens of Fortune 500 companies rely on Eracent solutions to manage and protect their networks. Visit https://eracent.com/. 

References:
1) Venkat, A. (2023, January 4). Cyberattacks against governments jumped 95% in last half of 2022, Cloudsek says. CSO Online. Retrieved February 23, 2023, from csoonline.com/article/3684668/cyberattacks-against-governments-jumped-95-in-last-half-of-2022-cloudsek says.html#:~:text=The%20number%20of%20attacks%20targeting,AI%2Dbased%20cybersecurity%20company%20CloudSek
2) Fleck, A., Richter, F. (2022, December 2). Infographic: Cybercrime expected to skyrocket in coming years. Statista Infographics. Retrieved February 23, 2023, from statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/#:~:text=According%20to%20estimates%20from%20Statista’s,to%20%2423.84%20trillion%20by%202027
3) Executive order on improving the nation’s cybersecurity. Cybersecurity and Infrastructure Security Agency CISA. (n.d.). Retrieved February 23, 2023, from cisa.gov/executive-order-improving-nations-cybersecurity
4) The Linux Foundation. (2022, September 13). What is an SBOM? Linux Foundation. Retrieved February 23, 2023, from linuxfoundation.org/blog/blog/what-is-an-sbom
5) Christofaro, B. (n.d.). Cyberattacks are the newest frontier of war and can strike harder than a natural disaster. here’s why the US could struggle to cope if it got hit. Business Insider. Retrieved February 23, 2023, from businessinsider.com/cyber-attack-us-struggle-taken-offline-power-grid-2019-4
6) Published by Ani Petrosyan, 4, S. (2022, September 4). Cost of a data breach in the U.S. 2022. Statista. Retrieved February 23, 2023, from statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/
7) Malone, K. (2021, April 30). Federal government is running 50-year-old technology – with no updates planned. CIO Dive. Retrieved February 23, 2023, from ciodive.com/news/GAO-federal-legacy-tech-security-red-hat/599375/

Share article on social media or email:

Time Stamp:

More from Computer Security