The National Institute of Standards (“NIST”) and Technology today released the updated guidance Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. It was prepared in response to to Presidential Executive order 14028.
It is a timely and valuable resource dealing with cyber security risks in supply chains. Supply chain vulnerabilities is a chronic problem for organisations. Given the relatively sparse material generated in Australia on this issue it should be used by those working in the cyber security and privacy sphere.
NIST’s summary of the Executive Order in so far as it is relevant to it provides:
The President’s Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity issued on May 12, 2021, charges multiple agencies – including NIST – with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain.
Section 4 directs NIST to solicit input from the private sector, academia, government agencies, and others and to identify existing or develop new standards, tools, best practices, and other guidelines to enhance software supply chain security. Those guidelines, which are ultimately aimed at federal agencies but which also are available for industry and others to use, include:
-
- criteria to evaluate software security,
- criteria to evaluate the security practices of the developers and suppliers, and
- innovative tools or methods to demonstrate conformance with secure practices.
NIST is to consult with other agencies in producing some of its guidance; in turn, several of those agencies are directed to take steps to ensure that federal procurement of software follows that guidance.
The EO also assigns NIST to work on two labeling efforts related to consumer Internet of Things (IoT) devices and consumer software with the goal of encouraging manufacturers to produce – and purchasers to be informed about– products created with greater consideration of cybersecurity risks and capabilities.
The Guide is 326 pages long, extensive even for NIST.
The abstract Read the rest of this entry »