Software SCRM during Retirement Flashcards

1
Q

The retirement of software includes.

A

Decommissioning (or deletion) of the software from operations, but also disposal of the data processed, transmitted, or stored by the software, if the data is no longer needed for business operations, or if there is no regulatory requirement to maintain the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When acquirers fail to establish end-of-life decommissioning or disposal requirements or rules.

A

The likelihood of unauthorized access and disclosure

threats increase considerably.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acquisition Lifecycle Phase

A

Media sanitization, overwriting (formatting) data, disk degaussing, physical destruction, removal of sensitive information, and cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acquisition Lifecycle Phase - Planning (Initiation)

A

Perform an initial risk assessment to determine
assurance requirements (protection needs
elicitation); Develop acquisition strategy and formulate plan with evaluation criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acquisition Lifecycle Phase - Contracting

A

Include SCRM as part of the acquisition
advertisement (RFP, RFQ, etc.); Develop contractual and technical controls requirements; Perform Supplier Risk Assessment (Supplier Sourcing); Evaluate Supplier Responses; Establish Intellectual Properties (IP) ownership and responsibilities; Negotiate and award contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acquisition Lifecycle Phase - Development & Testing

A

Evaluate conformance to assurance requirements; Conduct code reviews; Ensure security of code repositories; Ensure security of built tools and environment; Conduct security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acquisition Lifecycle Phase - Acceptance

A

Validate anti-tampering resistance and controls; Verify authenticity (code signing) & anticounterfeiting
controls; Verify supplier claims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acquisition Lifecycle Phase - Delivery (Handover)

A

Maintain Chain of Custody; Secure transfer; Enforce code escrows (if required); Comply with export control & foreign trade data regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acquisition Lifecycle Phase - Deployment (Installation/Configuration)

A

Configure the software securely; Implement perimeter (network) defense controls; Validate System-of-Systems (SoS) security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acquisition Lifecycle Phase - Operations & Monitoring

A

Check runtime integrity assurance controls; Patch & Upgrade; Implement termination access controls; Check custom code extensions; Continuously monitor software/supplier; Manage security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acquisition Lifecycle Phase - Retirement (Decommissioning / Disposal)

A

Decommission (delete) or replace software; Dispose data to avoid risk of data remanence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The three goals of software supply chain includes.

A

Conformance, trustworthiness and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Location agnostic protection means

A

The security of the software is not dependent on where (location) it is developed, but instead, it is dependent on the maturity of the software development practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Contracts based is that

A

Both parties engaged in the transaction mutually agree to abide by any terms of the agreement. Contracts are legally binding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly