Cybersecurity Frameworks and Standards for Securing Software Supply Chains
A comprehensive resource library for implementing NIST SSDF, Google SLSA, Gartner, MITRE, and OWASP to achieve end-to-end software integrity.
Google SLSA and NIST SSDF: Emerging Software Supply Chain Security Best Practices
Google SLSA and NIST SSDF: Emerging Software Supply Chain Security Best Practices
While a de facto standard for securing software supply chains does not exist, best practices to improve application security posture are starting to emerge. We have many frameworks to choose from, including National Institute of Standards and Technology (NIST) SSDF, Google/OpenSSF SLSA, Gartner, MITRE, and OWASP. While none of these cybersecurity frameworks and standards are individually comprehensive, they enable us to compile a complete set of best practices.
Watch NowSoftware Supply Chain Cybersecurity Frameworks
Google SLSA
Official SiteGoogle Supply-chain Levels for Software Artifacts (SLSA), announced in mid-2021, is a framework for ensuring the integrity of software artifacts throughout the software supply chain.
NIST SSDF
Official SiteWith its creation spurred by Executive Order 16025, the NIST Secure Software Development Framework (SSDF) is a cybersecurity framework designed to help ensure the integrity of critical software infrastructure. While compulsory for federal agencies, NIST application security may be applied to any government, private, public, or non-profit organization.
Application Security Frameworks
OWASP SAMM
Official SiteOWASP SAMM is short for the Software Assurance Maturity Model. It was created to help organizations formulate and implement a strategy for software security.
PCI DSS
Official SitePayment Card Industry Data Security Standard (PCI DSS) is a security framework first introduced in 2004 and is required by the contract for those handling cardholder data. This standard was created to increase controls around cardholder data to reduce credit card fraud.
ISO 27001
Official SiteInternational Organization for Standardization (ISO) 27001 provides requirements for an information security management system. This report covers a company’s controls and its operating effectiveness.
SOC 2 Type II
Official SiteSystem and Organization Controls 2 (SOC 2) Type II is an audit on how a cloud-based service provider handles sensitive information. This report covers a company’s controls and its operating effectiveness.
FedRAMP
Official SiteThe Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security authorizations for Cloud Service Offerings. This report covers a company’s controls and its operating effectiveness.
MITRE SoT
Official SiteMITRE’s System of Trust (SoT) is a recently announced framework designed to help evaluate suppliers, supplies, and service providers; this is done to help mitigate software supply chain attacks. MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, and has helped formulate the SoT.
Frequently Asked Questions
How Do Application Security Standards Apply to Modern Software Supply Chains?
Which Cybersecurity Frameworks and Standards Matter Most for DevSecOps Teams?
To achieve a higher level of maturity, teams should also look toward app security tools that support NIST application security guidelines. These tools ensure that security is not a bottleneck but a continuous part of the development workflow