Cyber Safety Report Outlines Software Security Best Practices

0
317
Cyber Safety Report Outlines Software Security Best Practices

Dit bericht verscheen eerder bij FOSSlife

The recent (and persistent) Log4j incident highlighted the need for standardized practices that “lead to software that is secure by design,” says the new report from the Cyber Safety Review Board (CSRB). In this article, we’ll look at some of the report’s recommendations for securing software and managing vulnerabilities.

The CSRB, which was tasked with identifying cybersecurity improvements and making strategic and actionable recommendations, says that, in regard to Log4j, organizations should:

  • Be prepared to address Log4j vulnerabilities for years to come 
  • Continue to report (and escalate) observations of Log4j exploitation

Best Practices

More generally, organizations are encouraged to “adopt current industry-accepted practices and standards for vulnerability management and security hygiene.” 

The report spells out 19 recommendations to help organizations deal with threats and improve overall security, including directives to:

  • Maintain an accurate IT asset and application inventory
  • Invest in capabilities to identify vulnerable systems 
  • Have a documented vulnerability response program as well as a documented disclosure process 
  • Improve SBOM tooling and adoptability 
  • Train developers in secure software development 
  • Increase investments in open source software security

Secure Software Development

In addition to providing guidance for organizations, the report also outlines best practices for software developers and maintainers. 

Specifically, the report says, software developers and maintainers should:

  • Adopt standard practices and technologies to build secure software in accordance with ISO 27034:2011160 and NIST’s Secure Software Development Framework
  • Establish a comprehensive approach to code maintenance that encompasses consistent secure development processes, security assessments, and vulnerability management operations
  • Implement communication processes and mechanisms that provide consistent and relevant security messaging to users 
  • Use integrated development environment (IDE) tools to help secure software development
  • Integrate source code scanning and tools

Community Initiatives

The report also encourages open source software developers to participate in community-based security initiatives to help improve the security of their processes and code, such as:

“The infrastructure on which we rely daily has become deeply interconnected through the use of shared communications, software, and hardware, making it susceptible to vulnerabilities on a global scale,” says the report. Thus, we must work together to strengthen our shared systems. 
 

Dit bericht verscheen eerder bij FOSSlife

Vorig artikelHP Dev One Linux Laptop Reviewed
Volgend artikelMicrosoft anticipates $3.3bn savings by extending server life