You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
lehors
changed the title
TODO: Needs mitigation description for "Software producer intentionally submits bad code" threat
TODO: Need mitigation description for "Software producer intentionally submits bad code" threat
Oct 9, 2024
Mitigating against this threat and more generally across major organizational trust boundaries is not a well solved problem.
Question: is this a case of the "software producer intentionally submits bad code" or "someone inside the software producer organization intentionally submits bad code."
The most formal approach is to trest all externally produced software as source code that is being imported into your internal source tree.
All changes should be reviewed by two internal parties
Always build from source
In practice this is not always possible. Organizations can and do rely on 3rd party auditors. Organizations can and should also ask for evidence of secure practices.
At the end of the day, if an organization cannot be trusted but its software is essential then sandboxing and runtime auditing woudl be required.
No description provided.
The text was updated successfully, but these errors were encountered: