Beyond the Code / SBOM: Supply Chain Security

Bsides London 2023

2023/12/09

Beyond the Code / SBOM: Supply Chain Security

VIDEO

Slides

OUTLINE

Supply Chain security is the new buzzword of the town and everyone is gaga about it. After the executive order and SSDF / SLSA documents being released, every single vendor has added SBOM capabilities and declared the problem solved. The problem is its not solved, Supply chain security is not a new problem and sbom is not the final solution. This talk wants to throw lights on supply chain security overview and then address following points.

  1. How supply chain security is a age old concept.
  2. What has changed in last few year and how that affects this problem space
  3. At a broader level how SLSA / SSDF are trying to address the problem.
  4. What is still missing in market and what is needed to be done beyond buying tools.

We will start by exploring how software supply chain problems have existed in past already, We will then talk about sbom’s what they really are and what they can do. we then focus on the shortcomings of the formats and especially where gaps occur (for example the place to record which compiler version was used to compile the code). After we have looked at sbom we will explore different scenarios where current sbom would not have helped in any ways (this includes solarwind if you are wondering) We then explore how different bodies have attempted to tackle it from npm’s trying to isolate packages, to debian trying to control central repositories, pros and cons on each side. We will then focus on how paradigm shift such as IaC and provinence tools could be of help what they can do and can’t do. we will then conclude the talk around SSDF / SLSA as frameworks to start tackling the problems but also to give people a clear idea where tooling can help and where policies and process would be helpful.

This talk is especially useful for practitioners who want to understand what is going on and how to start looking at these frameworks to put some protection in the environment.

AI Generated Summary

This comprehensive talk on supply chain security and SBOM provides historical context, practical frameworks, and critical vendor evaluation questions for practitioners.

Key Topics Discussed

Supply Chain Security Fundamentals:

Historical Context - This is NOT a New Problem:

What Changed:

SBOM (Software Bill of Materials) Basics:

What SBOM Does NOT Contain:

SBOM Limitations:

What SBOM Can Help With:

Provenance:

Industry Problems We Created:

Two Historical Approaches to Supply Chain Management:

1. Centralized/Vetted Software (e.g., Debian, Linux distributions):

2. Isolated/Decentralized (e.g., npm, Python pip/venv):

Modern Solutions:

Frameworks:

1. SLSA (Supply-chain Levels for Software Artifacts) - Google:

2. NIST SSDF (Secure Software Development Framework):

3. NIST CSF v2 (Cybersecurity Framework v2):

Tools Mentioned:

1. OSSF Scorecard:

2. Sigstore / Cosign:

3. SafeDep:

4. StackLock:

Three Critical Questions to Ask SBOM Vendors:

1. What do I do with the SBOM?

2. Are you validating vulnerabilities or just spotting them?

3. Do you have alternative solutions?

Q&A Insights:

COE (Customer-Owned Environments) / User-Installed Code:

Prioritization of Vulnerabilities:

Key Insights:

Important Projects and Tools Mentioned:

Actionable Takeaways:

  1. Ask vendors the three critical questions before purchasing SBOM solutions
  2. Test vendor claims with sample projects (vulnerable dependency in unused code path)
  3. Look at SLSA, SSDF, and CSF v2 frameworks
  4. Use OSSF Scorecard for software health
  5. Implement organizational rules for dependencies (SafeDep)
  6. Prioritize vulnerabilities using: Code coverage β†’ CVSS β†’ EPSS β†’ KEV
  7. Use Semgrep to identify if vulnerable functions are actually called
  8. Remember: SBOM is inventory management, not complete security solution
  9. Provenance should be independently verifiable
  10. Don’t expect SBOM to prevent all supply chain attacks (e.g., SolarWinds CI compromise)