Software SCRM during Delivery (Handover) Flashcards

1
Q

Chain of Custody controlling

A

It means that each change to the software and handoff is authorized, transparent and verifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Chain of Custody - Authorized

A

The modification to the software is requested and permission to change the software is given in writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chain of Custody - Transparent

A

The requestor of the change and the entity that is making the change knows about the change being made. In other words, no hidden or unknown changes are being made to the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of Custody - Verifiable

A

The change that is made to the software can be attested against the request for the change and that no unauthorized or unrequested changes are made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How Secure Transfer can be achieved?

A

Protection in transit can be achieved using session encryption and end-to-end authentication. Not only
should the software code be protected but the contents being transmitted should be as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which encrypty technology can be used to protect during transmission of data?

A

In the transport layer (e.g., TLS, SSL) or network layer (e.g., IPSec) is advised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is code escrow?

A

The activity of having a copy of the source code of the implemented software in the custody of a mutually agreed upon neutral third party known as the escrow agency or party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are three parties involved in an escrow relationship:

A
The acquirer (licensee or purchaser), the publisher
(licensor or seller or supplier), and the escrow agency,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ORR

A

Operational Readiness Reviews (ORR) include configuring the software to be operational ready and resilient to hacker threats, establishing applicable perimeter defense controls and ensuring the security of the software during integration of systems including the validation of reused code components, interfaces and interdependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Secure Configuration means?

A

Software must be configured to be secure by default and secure in deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When the software is secure by default, it means that:

A

The installation of the software can be performed without any additional configuration changes needed to secure the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCAP

A

Security Content Automation Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Perimeter (Network) Security Controls - Perimeter defense controls continue to be necessary in a software supply chain. Which security controls should be in place.

A

Unauthorized individuals are cannot tap into a supplier’s network and tamper the software. So, firewalls, secure communications protocols, and
session management come in handy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System-of-Systems (SoS) Security - risk of a security breach to all SoS participants. Which are the security concerns?

A

Weaknesses in code and lack of security controls and secure configurations in any of the software products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operations and maintenance (sustainment) supply chain risk management includes.

A

Assuring reliable functioning (integrity) of the software when it is operational. It also includes patching and upgrades, termination access controls, custom code extension checks, continuous monitoring and incident management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to ensure Runtime Integrity Assurance

A

Code signing (integrity) provides runtime permissions to the code at runtime; Trusted Platform Module (TPM) augments runtime integrity by assuring the authenticity of both hardware and software components.

17
Q

What is a weakness in the TPM?

A

If the code is not signed, the TPM checks for authenticity may not be effective as expected.

18
Q

How to ensure that the software can continue to function reliably with acceptable resilience and recoverability?

A

Discovered vulnerabilities must be tracked, managed

and resolved as quickly as possible.

19
Q

One of the most overlooked security issues in the supply chain is the correct implementation of.

A

Termination access controls.

20
Q

Lack of termination access control protection can be avoid through.

A

A appropriate termination access control protection such as development staff should be revoked of any access to the software if they are terminated or if they change roles that do not require them to have continued access.

21
Q

The primary objective of continuous monitoring activities is.

A

Periodic testing and evaluation of the software supply chain’s products, processes, and people involved, is necessary to provide insight into the effectiveness of security controls that are planned, designed, implemented, deployed or inherited.

22
Q

Useful activities to monitor the software and operational environment in a supply chain.

A

Scanning (vulnerability, network, operating systems),

penetration testing, and intrusion detection systems.