Zero Trust Defines Software Supply Chain Security at CFPB, DOE
CFPB and DOE shift their attention to zero trust as they work to eliminate risks and build a higher level of protection around their software supply chains.
Zero trust has become a major focal point for software supply chain security efforts at the Consumer Financial Protection Bureau (CFPB) and the Department of Education since the SolarWinds and Log4j attacks.
Dr. Tiina Rodrigue, CISO with the Office of Technology and Innovation at CFPB, said cybersecurity is a team sport, which is critical from a zero trust and software supply chain management perspective.
โThereโs no one team thatโs responsible for software, we have software everywhere and the risk itself is dynamic,โ Rodrigue said during ATARCโs How to Be Prepared Against Evolving Software Supply Chain Attacks webinar last week. โSecurity is not a destination, so we have to instill change in the heads, hearts and hands of those who are doing the work.โ
Because stolen credentials and user identities are often an entry point for bad cyber actors, CFPB is focused on ensuring its own employees arenโt โthe enemy.โ
โWe need to make sure those opportunities that we identify are prioritized and as weโre doing our sketching and prototyping that security is integrated whether we build it ourselves, get it from open source or if we buy it,โ Rodrigue said.
Education Department CISO Steven Hernandez said many agencies are thinking about how to secure the application layer, or Layer 7, of software in the Open Systems Interconnection (OSI) Model. Hernandez believes when you get to the point where zero trust is being enforced, monitored and executed at Layer 7 you can stop caring about Layer 6 and down.
โIf we can get our development teams racked and stacked on zero trust a lot of what weโre doing below can be phased out even faster and really at the end we will be talking about applications and software, interfacing with people and services and all of the zero trust options getting brokered at that layer,โ Hernandez said during the ATARC webinar.
Many software supply chain risks have been maliciously embedded and canโt detected, so zero trust needs to become the mantra for federal agencies ramping up digital product development.
โWe need to recognize that even in our updates and upgrades the security is still critical,โ Rodrigue said. โAnywhere you have an input into your system, it doesnโt matter whether itโs a mobile mart or WiFi all of those have to be secured. Itโs about zero trust. Always, always, always verify and reauthenticate.โ
When looking at software supply chain security, some of CFPBโs best practices include making sure the contracting team is trained in cybersecurity and maintaining transparency throughout the entire software lifecycle.
โThere should be early, open and honest communication with the software vendor, if they have a problem, that they donโt try to hide it, is critical,โ Rodrigue said. โItโs not when a problem happens anymore, itโs did the problem happen, and when it does, make sure youโre proactive not reactive so that everyone can take the right steps because in the end we just want to stay resilient and strong.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Congress Seeks 10-Year Renewal of Cyber Threat Sharing Law
The PAACT Act seeks a 10-year CISA 2015 reauthorization to improve threat reporting and strengthen federal cyber defenses.
2m read -
White House Eyes New Pillar in Cyber Strategy Refresh
Sean Cairncross unpacked the upcoming national cybersecurity strategy's new deterrence pillar and expansion of public-private collaborations.
4m read -
Inside the Pentagonโs 2025 Cyber, Tech, Acquisition Reforms
Pentagon officials signal era of continuous verification, operational velocity and unprecedented autonomy to meet urgent threats.
7m read -
NIST Says Risk Management is Central to Generative AI Adoption
Agencies must prioritize a "risk-aware culture" and use the AI Risk Management Framework to deploy the tech effectively amid growing cyberattacks.
5m read