October 14, 2015 By Andras Szakal 3 min read

It’s been an interesting few weeks for us cybersecurity and supply chain security boffins. Last week, the National Institute of Standards and Technology (NIST) held a workshop titled Best Practices in Cyber Supply Chain Risk Management. It was a great opportunity for those of us working in supply chain risk management to communicate and discuss recently completed standards like ISO-20243 (O-TTPS) and validate proposed governance, guidance and tools developed by agencies to help the acquisition community mitigate risk.

I had the privilege of participating in the workshop and discussing the history and potential use of the standards and tools created. I walked away with two observations: Firstly, most companies and organizations don’t understand the difference between technology supply chain security and implementing cybersecurity controls within IT. The other observation — which seemed to be validated by our hosts — was that government and industry appear to have many of the standards and tools necessary to address these risks.

Major Events Call Attention to Supply Chain Security

By complete coincidence, the NIST workshop came on the heels of two very public events that can certainly be categorized as cyber supply chain incidents. Both of these incidents were topics of many workshop discussions. Workshop participants agreed that these incidents should be considered from both the manufacturing/development and acquisition perspectives.

Problems With Malicious SDKs

The first incident found major mobile application vendors cleaning up their mobile app stores after discovering that application developers blatantly circumvented procedures for accessing and integrating software development kits (SDKs). As it turns out, many foreign mobile application development companies were not following policy and opted to use unauthorized SDKs instead. Of course, these SDKs turned out to be maliciously counterfeited, putting end users and their data at risk.

One might ask why a developer would access counterfeit development libraries on purpose. The fault probably comes in several flavors: Some developers might have wanted to develop applications before submitting a formal request for hosting the app — or possibly were just lazy. Another potential possibility could be limited bandwidth access in certain countries throttling access to foreign sites; it’s easier to download from local sites than throttled out-of-country sites.

Regardless, the outcome was predictable. Unwittingly, developers accessed SDKs that were maliciously tainted, which provided attackers with potential back doors to those applications. Expect changes in mobile application governance and tools to migrate this risk going forward.

Issues With the Auto Industry

Supply chain integrity practices are intended to help ensure that customers receive the product and functionality for which they paid. When this doesn’t happen, questions about supply chain standards arise — which is exactly what happened with the second incident, involving the auto industry. This incident was unique because it was actually sanctioned from within the very company that made the product, and it could be characterized as an insider attack intended to undermine the very functionality that customers thought they were buying.

This could be characterized as a supply chain attack because the code intentionally undermined the functionality of the manufactured product as advertised. In addition, we can assume that not everyone in the company knew about this rogue functionality because of the amount of time it remained hidden and the fact that no whistleblower ever came forward (that we know of).

What’s the Answer?

There are no easy solutions to prevent these types of supply chain risks. But we do have the tools to significantly mitigate them. Developers should scan code for vulnerabilities and attempt to ascertain the lineage of components. At the end of the day, supply chain security is directly proportional to the level of integrity of those manufacturers or developers that contribute to the end product.

And as we validated in this workshop, supply chain security risks are often manifested in cybersecurity incidents. Those developers who flagrantly flaunt established supply chain security policies and practices should be penalized, if not banned altogether from participating in the growing mobile and cloud digital ecosystems.

Industry best practices and security standards such as ISO 20243 and NIST 800-161 form the bases for guidance, future tools and even a code of conduct as digital markets evolve. While standards, governance and policy will not reduce the risk to zero, it does provide the guidance necessary to mitigate ignorance or laziness. Intentionally injecting a vulnerability to circumvent regulators brings to light a whole new class of supply chain risks.

To learn more, read the article I co-authored in the IBM Journal of Research and Development.

More from Government

Cyber experts applaud the new White House cybersecurity plan

4 min read - First, there was a strategy. Now, there’s a plan. The Biden Administration recently released its plan for implementing the highly anticipated national cybersecurity strategy published in March. The new National Cybersecurity Strategy Implementation Plan (NCSIP) lays out specific deadlines and responsibilities for the White House’s vision for cybersecurity. The plan is being managed by the White House’s Office of the National Cyber Director (ONCD). Cybersecurity experts have applauded the Administration’s plan as well as the new implementation calendar. For example,…

How the FBI Fights Back Against Worldwide Cyberattacks

5 min read - In the worldwide battle against malicious cyberattacks, there is no organization more central to the fight than the Federal Bureau of Investigation (FBI). And recent years have proven that the bureau still has some surprises up its sleeve. In early May, the U.S. Department of Justice announced the conclusion of a U.S. government operation called MEDUSA. The operation disrupted a global peer-to-peer network of computers compromised by malware called Snake. Attributed to a unit of the Russian government Security Service,…

How NIST Cybersecurity Framework 2.0 Tackles Risk Management

4 min read - The NIST Cybersecurity Framework 2.0 (CSF) is moving into its final stages before its 2024 implementation. After the public discussion period to inform decisions for the framework closed in May, it’s time to learn more about what to expect from the changes to the guidelines. The updated CSF is being aligned with the Biden Administration’s National Cybersecurity Strategy, according to Cherilyn Pascoe, senior technology policy advisor with NIST, at the 2023 RSA Conference. This sets up the new CSF to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today