A 'Golden Pipeline' To Secure The Supply Chain

Today’s business leaders need to address some key challenges as they forge ahead with digital transformation plans. On the one hand they need to press the fast forward button when it comes to developing software that offers a better or more specialised customer experience, so they can stay on the front foot where market leadership is concerned.

On the other, they need to ensure their software development cycles are robust and secure, because the stakes are high when it comes to supply chain vulnerabilities. 

A growing dependence on the open-source software ecosystem that sits at the heart of modern software development means that software supply chains are increasingly at risk of compromise. Indeed, last year saw a record breaking 742% jump in open source software supply chain attacks perpetrated by cybercriminals looking to exploit malicious code unwittingly introduced into commercial applications. 

To address this threat, organisations need to build immutability and security into their software development pipelines. Templating a ‘golden pipeline’ that will prove reliable time and time again.

Incorporating Security By Default

Under growing pressure to deliver software faster, developers are increasingly reliant on open-source code and other third-party components that enable them to build products and services more rapidly. The problem is this introduces potential vulnerabilities into development pipelines that will likely expose organisations to supply chain attacks.

As a result, building security into the development process has become a top priority for organisations looking to avoid the risk of a supply chain compromise.

This is no easy task when security teams are wrangling multiple tools to try and connect the dots and need to avoid compromising development flows at all costs. We’re seeing that regardless of multiple large investments in development and security tooling, companies still find themselves resorting to manual exports and correlation processes to attempt to extract valuable insights across the different tools. 

To overcome these issues, organisations should incorporate comprehensive and inter-related security testing and validation from the get-go and across their entire end-to-end application development and deployment process. 

The 'Golden Pipeline' Principles – Start Clean, Stay Clean & Store Approvals

By embedding and automating security and enforcement practices across the supply chain, organisations can create a ‘golden pipeline’ that ensures an application is validated at every stage of development. So, by the time it reaches production, it’s as clean as possible – and all known supply chain risks have been eliminated. 

Principle 1 - Start clean:   When it comes to building a golden pipeline, organisations should first aim to start ‘clean’ by integrating auto-triggered periodic scans into their source code management (SCM) system. Designed around a defined policy that triggers specific actions and responses, this will help assure the quality and integrity of existing components, keeping them up to date with a real-time updated vulnerability and risk database. 

Principle 2 - Stay clean:   Next, to ensure their pipelines ‘stay clean’ and are secure-by-default, every new pull request by a developer should activate an automated scan that generates a pass/warn/fail outcome. These results are then notified to developers via the SCM, together with any fix suggestions. 

Principle 3 - Store approvals:   At the build stage a definitive automated scan provides the final audit and seal of approval. If compliant, the component gets the green light and goes into production – accompanied by a detailed software bill of materials (SBOM) and security manifest that provides full visibility into all software components and dependencies. If yes, this is stored in a manageable pane with all other SBOMS, for clear and easy investigation whenever needed. If not, teams gain insights into next actions to take.

By incorporating robust policy-driven controls into the development pipeline, organisations are able to get instant feedback on supply chain risks.

This means vulnerabilities can be caught and fixed the moment they are introduced, and before they reach run time, a stage in the application’s lifecycle where the stakes (and the costs) are much higher.

Counting The Gains

Companies that commit to this golden pipeline reporting approach are able to achieve some significant returns on investment. Alongside protecting revenue streams from the risks arising from application breaches or compliance issues, they’ve benefited in a number of other key ways: 

  • Automating previously manual processes to streamline their programme orchestration and cut the time and cost associated with patching and remediation. 
  • Giving back valuable time and bandwidth to their security and development teams that can be used more productively on other projects. 
  • Consolidating and reducing the number of security tools they need to procure and use – generating further sizeable cost savings that go straight to the bottom line.

In addition to elevating the supply chain defence posture of the enterprise itself, implementing a golden pipeline enables organisations to develop and deploy applications faster. Generating efficiencies along the way that will make a lasting contribution to the long term sus

Nurit Bielorai is Go-To-Market Manager, Supply Chain Security at Aqua Security

You Might Also Read: 

Which CI/CD Tools Can Promote Supply Chain Security?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cybersecurity Is No Longer The Sole Responsibility Of IT Specialists 
DoppelPaymer Hackers Caught »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is the European Union’s independent data protection authority. We monitor and ensure the protection of personal data and privacy when EU institutions and bodies process personal information.

MyTurn Career LLC

MyTurn Career LLC

Looking for a rewarding career in cybersecurity? Explore a wide range of cybersecurity jobs and opportunities in this rapidly evolving field.