How Deep Does the MITRE Supply Chain Security System of Trust Framework Go?
Despite high-profile attacks like Log4j and SolarWinds increasingly starring in the breaches hit parade, supply chain security has remained, until now, a hard-to-define and difficult-to-measure concept. This lack of agreed-upon methodology and metrics to evaluate supply chain security has led MITRE to create a framework prototype to facilitate risk management for risks associated with supply chains attacks. MITRE Supply Chain Security System of Trust (SoT) Framework addresses 14 top-level decisional risk areas associated with trust that agencies and enterprises must evaluate and make choices about during the entire life cycle of their acquisition activities. These 14 risk areas are subdivided into around 200 risk sub-areas evaluated with the help of about 2200 questions that aim to provide a scalable, repeatable, evidence-based, and customizable supply chain risk assessment process. The lion's share of these questions is related to non-digital due diligence questions related to the supplier's reliability from multiple angles, ranging from financial stability to organizational stature, external influence, and maliciousness, including organizational security. Still, in a prototype phase, MITRE SoT is a wide-ranging supply risk evaluation framework that covers both the physical and the digital world. It intends to cover the software supply chain risk assessment in detail.
MITRE SoT Software Supply Chain Risk Management
Already at the CAPEC Program User Summit in February 2022, Robert Martin, Senior Principal Engineer at MITRE Corporation and Chair of the Steering Committee of the Industrial Internet Consortium, was expanding on the issues at hand with software supply chain risk management. In the absence of statistics on which to base probabilities, the crux of the effort in facilitating the risk evaluation for the software supply chain revolves around the Software Bill of Materials (SBOM), a first step to answering the growing need for insight into the supply chain. In section 4 about Enhancing Software Supply chain Security, last May's Executive Order 14208 mandates providing an SBOM either directly or by publishing it on a public website. It defines SBOM as "a formal record containing the details and supply chain relationships of various components used in building software. Software developers and vendors often create products by assembling existing open source and commercial software components," similar to a list of ingredients on food packaging. Pursuant to that executive order, NTIA published "The Minimum Elements for a Software Bill of Materials (SBOM)", which defines its minimum constitutive elements and reiterates its goal to increase the potential to track known and newly emerged vulnerabilities and risks. Those minimum elements are:- Data Fields: Documenting baseline information about each component that should be tracked
- Automation Support: Allowing for scaling across the software ecosystem through the automatic generation and machine readability
- Practices and Processes: Defining the operations of SBOM requests, generation, and use