For enterprise safety professionals alarmed concerning the rising variety of supply chain assaults, a report launched this week by Google and provide chain safety agency Chainguard has excellent news: Devsecops greatest practices have gotten an increasing number of widespread.
The recent prevalence of supply chain attacks—most notably the SolarWinds attack, which affected numerous large companies in 2021—has introduced the subject into prominence. The Google-Chainguard report, although, discovered that many provide chain safety practices really useful by the foremost frameworks are already in place amongst software program builders, based mostly on an ongoing “snowball” survey of 33,000 such builders over the previous eight years.
There are two main frameworks for addressing software program provide chain growth points, that are those who stem from the advanced nature of contemporary software program growth—many tasks embody open supply elements, licensed libraries, and contributions from quite a few builders and varied third events.
Two main safety frameworks purpose at provide chain assaults
One main safety framework is Supply-chain Levels for Software Artifacts, a Google-backed normal, and the opposite is the NIST’s Secure Software Development Framework. Each enumerate plenty of greatest practices for software program growth, together with two-person evaluation of software program modifications, protected supply code platforms, and dependency monitoring.
“The attention-grabbing factor is that quite a lot of these practices, based on the survey, are literally comparatively established,” mentioned John Pace Meyers, one of many report’s authors and a safety knowledge scientist at Chainguard. “Quite a lot of the practices in there, 50% of the respondents mentioned that they have been established.”
The most typical of these practices, based on Google consumer expertise researcher Todd Kulesza—one other writer of the report—is CI/CD (continuous integration/continuous development), which is a technique of quickly delivering functions and updates by leveraging automation at completely different levels of growth.
“It’s one of many key enablers for provide chain safety,” he mentioned. “It’s a backstop – [developers] know that the identical vulnerability scanners, et centera, are all going to be run towards all their code.”
Furthermore, the report discovered {that a} more healthy tradition in software program growth groups was a predictor of fewer safety incidents and higher software program supply. Larger-trust cultures—the place builders felt snug reporting issues and assured that their studies would convey motion – have been more likely to provide safer software program and retain good builders.
“Typically, cultural arguments can really feel actually fluffy,” mentioned Pace Meyers. “What is good about a few of these … tradition concepts is that they really result in concrete requirements and practices.”
Kulesza echoed that emphasis on high-trust, collaborative tradition in software program working teams, which the report refers to as “generative” tradition, versus rules-based “bureaucratic” or power-focused cultures. He mentioned that practices like after-action studies for growth incidents and preset requirements for work led to raised outcomes throughout the board.
“A technique to consider that is that if there’s a safety vulnerability that an engineer realizes has made it into manufacturing, you don’t wish to be in a corporation the place that engineer worries about bringing that drawback to gentle,” he mentioned.