![]() |
市場調查報告書
商品編碼
1844034
CISO洞察:軟體供應鏈安全領域的挑戰與機會Insights for CISOs: Challenges and Opportunities in the Software Supply Chain Security Space |
||||||
超越傳統應用程式安全測試,重新思考軟體供應鏈安全
軟體供應鏈安全(SSCS)是指包含工具、服務和實踐的安全解決方案,用於保護軟體開發生命週期(SDLC)免受網路安全攻擊,涵蓋從軟體開發(初始編碼和測試)到運行時的各個階段。 SSCS 保護的典型載體包括開放原始碼和第三方元件(庫和框架)、專有程式碼、儲存庫、開發工具和開發者帳戶/程式碼共用平台。
軟體供應鏈中不斷擴大的攻擊面和日益成長的網路威脅,使得軟體供應鏈安全控制系統(SSCS)成為組織網路安全策略的重要組成部分。從利用第三方程式碼漏洞到配置錯誤的雲端服務,軟體供應鏈事件的報告無疑是司空見慣的。這些攻擊包括專有程式碼和商業程式碼,對軟體生產商和消費者的安全、監管和營運都產生影響。
由於技術進步和網路威脅,SSCS 格局不斷發展,SSCS 供應商提供了廣泛的功能、方法和策略來確保 SDLC 各個階段的安全:一些供應商致力於提供左移解決方案,其他供應商採用右移方法,還有一些供應商致力於 SDLC 的建置後和部署前階段。
對於當今的企業來說,採用全面的SSCS 非常重要,它可以保護其軟體供應鏈,並確保在現代數位化環境中取得永續的成功。然而,由於 SSCS 的複雜性、不斷變化的威脅載體以及第三方和開放原始碼組件的快速普及,許多首席資訊安全長(CISO)仍然對 SSCS 感到困惑。組織要麼採取「觀望」的態度,傾向於依賴基礎技術來保護 SSCS,要麼像早期採用者一樣,零散地應對 SSCS,最終未能獲得其承諾的安全保障。
該洞察檢驗了SSCS 的發展,發現了 SSCS 中的差距,並評估了使 CISO 能夠為更廣泛的SSCS 保護做出更明智決策的框架和方法。
Rethinking Software Supply Chain Security Beyond Traditional Application Security Testing
Software supply chain security (SSCS) refers to the security solutions, including tools, services, and practices that protect the software development life cycle (SDLC) against cybersecurity attacks covering phases from software development (initial coding and testing) to runtime. Typical vectors that SSCS secures include open-source or third-party components (libraries or frameworks), proprietary code, repositories, development tools, and developer accounts/code-sharing platforms.
SSCS has become vital to organizations' cybersecurity strategy, given the ever-expanding attack surface and rising cyber threats on the software supply chain. Reports of software supply chain incidents, ranging from exploitations of vulnerabilities in third-party code and misconfigured cloud services, have become undeniably common. These attacks include proprietary and commercial codes, and pose security, regulatory, and operational impacts on software producers and consumers.
As the SSCS landscape continuously evolves with technological advancements and cyber threats, SSCS vendors are offering a wide range of capabilities, approaches, and strategies in securing different stages of the SDLC. Some vendors focus on offering shift left solutions, some employ shift right, while others emphasize the post-build and pre-deployment stage of the SDLC.
It is essential that businesses today adopt comprehensive SSCS to secure their software supply chain and ensure sustainable success in this modern digital landscape. However, many CISOs are still confused about SSCS due to its complexity, evolving threat vectors, and the rapid adoption of third-party and open-source components. Organizations either adopted a "wait-and-see" approach and prefer to rely on the basic technologies to ensure SSCS, or are among the early adopters who approached SSCS in a fragmented way and did not reap the promised security.
This insight examines the evolution of SSCS, identifies the gaps in SSCS, and evaluates the frameworks or approaches that enable CISOs to make a more informed decision for broader SSCS protection.