[ISM] Security testing:

Applications are comprehensively tested for vulnerabilities, using static application security testing and dynamic application security testing, prior to their initial release and any subsequent releases.

[SSDF] Monitor and respond to vulnerabilities proactively (SSS-02-10-01)

Continuously gather information on potential vulnerabilities in both the software and any third-party components it relies on. Monitor public vulnerability databases, leverage threat intelligence sources, and use tools that automatically review software composition and provenance data to stay informed about emerging threats. This proactive monitoring ensures that credible reports are promptly investigated, reducing the risk of known vulnerabilities in the software.

[S2C2F] Continuously monitor and remediate vulnerabilities in OSS dependencies (SSS-02-10-01-01)

Implement automated tools to scan open-source software (OSS) dependencies for known vulnerabilities, leveraging public vulnerability databases like the National Vulnerability Database (NVD) and tools such as OWASP Dependency-Check or Snyk. Maintain the ability to update OSS components promptly to mitigate identified risks. Ensure the monitoring process integrates with the CI/CD pipeline to detect vulnerabilities early in the development lifecycle. Regularly review vulnerability reports and prioritize remediation based on severity and impact to reduce exposure to emerging threats. Employ software composition analysis (SCA) tools to track component provenance and ensure only secure, updated versions of OSS are used. This approach minimizes risks associated with third-party dependencies while enhancing overall software security.

Operations

ID Operation Description Phase Agent
SSS-02-10-01-01-01 Integrate automated vulnerability scanners Use Software Composition Analysis (SCA) tools to scan open-source software (OSS) dependencies for known vulnerabilities during the build and deployment phases. Development DevOps team, Security team
SSS-02-10-01-01-02 Generate and review vulnerability reports Review a report highlighting a high-severity vulnerability in a third-party library used in the backend API. Development Security team, Development leads
SSS-02-10-01-01-03 Plan and execute updates for vulnerable OSS Develop a plan to update OSS dependencies to mitigate identified vulnerabilities while ensuring compatibility with existing code and functionality. Deployment Development teams, QA team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-0402)
NIST Secure Software Development Framework (RV.1.1)
S2C2F: Secure Supply Chain Consumption Framework (SCA-1)

[SAMM] Enforce timely patch management across the portfolio (SSS-02-10-01-02)

Develop and maintain management dashboards and reports to monitor compliance with patching processes and service-level agreements (SLAs) across all software components. Ensure that dependency management and application packaging systems are configured to support the rapid application of component-level patches, enabling updates to meet SLA requirements promptly. Treat any missed or delayed updates as critical security defects, subject to triage and resolution in line with established defect management protocols. Go beyond routine vendor notifications by actively monitoring external threat intelligence sources to stay informed about vulnerabilities, including zero-day threats. Address vulnerabilities as part of a comprehensive risk management strategy, ensuring that all affected applications and components are evaluated and remediated to mitigate exposure.

Operations

ID Operation Description Phase Agent
SSS-02-10-01-02-01 Implement patch management dashboards Develop dashboards and reports to track compliance with patching SLAs across the application portfolio, ensuring visibility for stakeholders. Post-deployment IT operations, Security team
SSS-02-10-01-02-02 Enable component-level patch deployment Ensure application dependency management and packaging processes can support rapid deployment of component-level patches at any time. Deployment DevOps team, Development teams
SSS-02-10-01-02-03 Treat missed updates as defects Log missed updates as security-related defects in the defect management system, and prioritize them for triage and resolution based on risk and SLA impact. Deployment Security team, Development leads
SSS-02-10-01-02-04 Monitor threat intelligence sources Continuously monitor external threat intelligence for zero-day vulnerabilities and associated patches, integrating findings into risk management processes. Development Security team, IT operations
SSS-02-10-01-02-05 Handle zero-day vulnerabilities as risks Treat zero-day vulnerabilities as risk management issues, applying temporary mitigations or compensating controls while awaiting vendor patches. Deployment Security team, Risk management team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-0402)
NIST Secure Software Development Framework (RV.1.1)
OWASP SAMM: Software Assurance Maturity Model (O-EM-3-B)