Software SCRM during Delivery (Handover) Flashcards
Chain of Custody controlling
It means that each change to the software and handoff is authorized, transparent and verifiable.
Chain of Custody - Authorized
The modification to the software is requested and permission to change the software is given in writing.
Chain of Custody - Transparent
The requestor of the change and the entity that is making the change knows about the change being made. In other words, no hidden or unknown changes are being made to the software.
Chain of Custody - Verifiable
The change that is made to the software can be attested against the request for the change and that no unauthorized or unrequested changes are made.
How Secure Transfer can be achieved?
Protection in transit can be achieved using session encryption and end-to-end authentication. Not only
should the software code be protected but the contents being transmitted should be as well.
Which encrypty technology can be used to protect during transmission of data?
In the transport layer (e.g., TLS, SSL) or network layer (e.g., IPSec) is advised.
What is code escrow?
The activity of having a copy of the source code of the implemented software in the custody of a mutually agreed upon neutral third party known as the escrow agency or party.
There are three parties involved in an escrow relationship:
The acquirer (licensee or purchaser), the publisher (licensor or seller or supplier), and the escrow agency,
ORR
Operational Readiness Reviews (ORR) include configuring the software to be operational ready and resilient to hacker threats, establishing applicable perimeter defense controls and ensuring the security of the software during integration of systems including the validation of reused code components, interfaces and interdependencies.
What Secure Configuration means?
Software must be configured to be secure by default and secure in deployment.
When the software is secure by default, it means that:
The installation of the software can be performed without any additional configuration changes needed to secure the software.
SCAP
Security Content Automation Protocol.
Perimeter (Network) Security Controls - Perimeter defense controls continue to be necessary in a software supply chain. Which security controls should be in place.
Unauthorized individuals are cannot tap into a supplier’s network and tamper the software. So, firewalls, secure communications protocols, and
session management come in handy.
System-of-Systems (SoS) Security - risk of a security breach to all SoS participants. Which are the security concerns?
Weaknesses in code and lack of security controls and secure configurations in any of the software products and services.
Operations and maintenance (sustainment) supply chain risk management includes.
Assuring reliable functioning (integrity) of the software when it is operational. It also includes patching and upgrades, termination access controls, custom code extension checks, continuous monitoring and incident management.