Software Acquisition and the Supply Chain Flashcards

1
Q

Acquisition Lifecycle phases

A

Planning, contracting, development & testing, acceptance, delivery, deployment (installation), operations & monitoring (transitioning), and retirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure transfer involves

A

The protection of the delivery channels and processes so that the software is not only free of being tampered but authentic in its origin when it is transitioned from one supplier to another or to the acquirer. It is in the delivery phase of the acquisition Lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The software can be acquired in one or more of the following ways:

A

Direct purchase, Original Equipment Manufacturer (OEM) licensing, partnering (alliance) with the software vendor, outsourcing, and managed Services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software provenance is when

A

A software is handed over from one supplier to another, the responsibility for protection the software shifts as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary instrument by which managed services are procured, delivered and enforced?

A

Service Level Agreements (SLAs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Predictable execution ensures

A

The software demonstrates justifiable confidence that it functions reliably as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each entity of the supply chain assures the primary goal of predictable execution and minimizes the risk of a security breach meeting

A

Goals of conformance, trustworthiness, and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Conformance ensures

A

The software is planned and undergoes a systematic set of activities to conform to the requirement specifications, standards and best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trustworthiness ensures

A

The software does not have vulnerabilities that are maliciously or accidentally introduced into the code. In other words, the software functions reliably assuring trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authenticity ensures

A

The materials used in the production of the software is not counterfeited, pirated or in violation of any intellectual property rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the goal of predictable execution (integrity) is achieved?

A

When software meets the goal of conformance,

trustworthiness, and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The most potential and predominant threat in the

software supply chain is

A

Tampering of software to introduce malicious software (malware) in code, during or after the development
of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the supply chain software, there are threats that are possible against the product (software or service).

A

Tampering of the code to circumvent existing security controls; Unauthorized disclosure, alteration, corruption, and/or deletion/ destruction of data; Diversion and/or re-routing of data causing disruptions and delays; Code sabotage by intentionally implanting vulnerabilities and malicious logic; Counterfeiting by substitution of legitimate products and/or data
with similar but bogus ones; Piracy and theft of intellectual property rights by reverse engineering
executable code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the supply chain software, there are threats that are possible against the processes and flows.

A

Bypass of legitimate flows and surreptitious diversion of legitimate channels to pirated ones; Insecure code transfer that does not maintain chain of custody; Violation of export control requirements; Improper configuration of software allowing undocumented
modifications and operational misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the supply chain software, there are threats that are possible against the people.

A

Undetected placement of a malicious threat agent (hacker, criminal, adversary) inside the company (e.g. insider); Social engineering insiders to commit fraud or perjury (i.e., subornation); Concerns related to Foreign Ownership and Control or Influence (FOCI). These concerns range from nation-state sponsored hackers
to individuals who are willing to do nefarious acts because of their affinity to hostile countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCRM

A

Software Supply Chain Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Managing risks in the software supply chain includes

A

The management of the risk arising from the supplier itself and their software development and delivery
processes.

18
Q

Software Supply chain risk management begins with rigorous processes performed initially to identify and analyze software assurance risks, followed by

A

Validation and verification of contractual and technical controls prior to acquisition. It is extended after acquisition by continuous assessment of software risks until the ultimate decommissioning of the software code and related components, and the disposal of associated data.

19
Q

Software supply chain controls must at the bare minimum demonstrate the following security principles

A

Least Privilege; Separation of Duties; Location Agnostic Protection (persistent protection); Code Inspection; Tamper Resistance and Evidence; Chain of Custody.

20
Q

Separation of Duties address the security concerns of

A

Tampering, unilateral control, collusion and fraud.

21
Q

What is the ‘Subcontracting workfor-hire’ relationship?

A

Subcontract the development of the software from other suppliers, the acquirer owns the software delivered.

22
Q

What is the ‘staff augmentation work-for-hire’ relationship?

A

Acquirers can work collaboratively with staff from other suppliers augmenting their own.

23
Q

What is the ‘arm’s length licensing’ relationship?

A

Acquirers can license software from another supplier or obtain the software from open source software (OSS) repositories.

24
Q

Supplier risk management begins with

A

The sourcing of suppliers and takes into account the intellectual property ownership and responsibilities involved, when acquiring software and services from a supplier.

25
Q

Several common SLA metrics categories

A

Performance; Disaster Recovery and Business Continuity; Issues Management; Incident Response; Vulnerability Management (Patch and Release Cycle).

26
Q

Collect input on vulnerabilities from varied sources such as

A

Vulnerabilities databases (e.g., OWASP Top 10, NVDB, OSVDB etc.), bug tracking lists, researchers and customers.

27
Q

A supplier’s organization shall be evaluated the following aspects

A

Past Performance in Supporting Other Customers; Personnel Security Knowledge, Experience and Training; Security Development Lifecycle Processes; Security Track Record (Vulnerability/Patch Management Processes); Response Evaluation (RFP, RFI).

28
Q

What is a state of security of the system?

A

An installation of your software in a client system may require a certain configuration of the host operating system. Such configuration settings has been known to put the client system in a state of compromise.

29
Q

Disclaimers

A

It provide software companies legal protection from liability claims or lawsuits that are unforeseen.

30
Q

WIPO

A

The World Intellection Property Organization (WIPO) defines IP as the creations of the mind.

31
Q

Why do we need to protect IP?

A

Protection of the IP is necessary to ensure that the owner of the software does not lose their creative works and/or competitive advantage.

32
Q

How is organized the Software Related Intellectual Property?

A

Industrial Property (Innovative and Fair Competition) and Copyright (Literary & Artistic).

33
Q

Industrial property can be categorized into

A

Innovation, design and creation of technology (e.g., inventions and trade secrets) and fair competition and protect consumers by giving them the ability to distinguish one product or service from another, and make informed decisions (e.g., trademarks).

34
Q

Copyright is used to

A

To protect authors of literary and artistic works and software programs and services are classified under this category.

35
Q

Patents

A

Protect an invention by exclusively granting rights to the owner of a novel, useful, and non-obvious idea that offers a new way of doing something or solving a problem.

36
Q

Trade secret

A

It is inclusive of any confidential business information that provides a company with a competitive advantage. E.g. design, formula, instrument, method, pattern, practice, ..

37
Q

Trademarks

A

Distinctive signs that can be used to identify the manufacturer uniquely from others who produce a similar product. When this is for a service, it is referred to as a service mark.

38
Q

Copyright

A

It protects the expression of an idea. It gives rights to the creator of literary and artistic works. It includes
the protection of technical drawings, such as software design and architecture specifications, that expresses the solution concept.

39
Q

Software license

A

A legal instrument that governs the use and/or redistribution of software.

40
Q

Byte patching attack

A

Changing instruction sets of the program at the byte level and repacking of the software program can be used to invalidate and bypass license and expiration
date checks easily.

41
Q

Software licenses can be primary grouped into

A

Closed source (source code is not available) and open source.

42
Q

EULA

A

End user licensing agreement.