The U.S. National Institute of Standards and Technology (NIST) released the first version of its Cybersecurity Framework (PDF) in 2014. It was originally designed for use by the U.S.'s critical infrastructure sectors to help them better manage cybersecurity threats. As for the enterprises and small businesses that make up the bulk of the U.S. economy? NIST's CSF had less to say about their needs.
That’s why NIST has been hard at work in recent years revamping the framework to serve the vast majority of organizations that operate outside of the critical infrastructure sector. Now, a full decade later, that effort has borne fruit. In February, NIST released CSF 2.0, which addresses its shortcomings in previous versions — and adds significant new guidance on software supply chain security (SSCS).
RL recently hosted a webinar with subject matter experts that include a former Fortune 10 CISO, a seasoned threat hunter — and a representative from NIST to discuss why CSF 2.0 is essential, how it can better serve software supply chain security efforts, and how it can be used practically. Here are key takeaways from the panel discussion.
[ Get White Paper: How to Assess & Manage Commercial Software Risk ]
Governance: A new function for a new era of SSCS
Nakia Grayson, IT Security Specialist at NIST, gave an overview of CSF 2.0. during the RL webinar, and stressed that there are several factors that make this version of the document different from its predecessors. This includes the framework's attention to how enterprises can best manage cybersecurity risk.
This difference can be seen when comparing the core functions of CSF 1.1 (released in 2018) vs. 2.0. NIST believes that these core functions are meant to be used by entities to “organize cybersecurity outcomes at their highest level.” Prior to CSF 2.0, the core functions of CSF were Identify, Protect, Detect, Respond, and Recover.
Each of these functions covers vital components of cybersecurity that all companies should be thinking about. But in the context of the modern threat landscape, CSF 1.1 did not offer companies a roadmap for how these functions can be managed collectively to handle all kinds of risk.
This is where CSF 2.0 comes in. While the original five core functions remain in this latest version of the framework, a sixth core function, “Govern,” was added to the list. Grayson said Govern supports “a view for managing cybersecurity risk” that embodies cybersecurity supply chain risk management (C-SCRM), a NIST program also supported by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
Grayson said the Govern function was added to manage modern cyber risk.
“C-SCRM is major for a number of companies. [It’s] important to see risk throughout the supply chain.”
—Nakia Grayson
The CISO’s POV
Saša Zdjelar, Chief Trust Officer at ReversingLabs and former CISO for ExxonMobile, applauded NIST’s inclusion of the Govern function in CSF 2.0, noting that it brings the concept of governance front and center for organizations. Zdjelar stressed that for many companies, getting to a robust level of governance can be hard. NIST CSF 2.0 bolsters the importance of software supply chain security and makes getting to this level easier for organizations.
The rollout of CSF 2.0 comes at a time where the most consequential software supply chain attacks are targeting more than just open source software. This is why Zdjelar believes that companies should look to CSF 2.0 to better prioritize a recurring target.
“All of the most major software supply chain attacks have one thing in common: commercial software was targeted.”
—Saša Zdjelar
Zdjelar said major software supply chain incidents from the past few years, including Kaseya, MoveIT, and SolarWinds, make the case for why organizations should begin taking governance seriously. He said they need to manage risk coming from the all software in use in their organization — proprietary, open source and commercial.
Putting the framework into action
As an overarching framework for C-SCRM generally, CSF 2.0 is a step in the right direction. However, it’s important to remember that while the threats posed to today’s software supply chains are real, it can be hard for companies to prioritize them when worrying about the short term needs of their business.
John Bambenek, President of Bambenek Labs, who has spent much of his career as a threat hunter and working amongst security practitioners, stressed that while they would find the concept of governance “interesting,” there are still obstacles in the way of the new function's practical adoption.
“There is a general reluctance to implement anything that slows down business.”
—John Bambenek
Despite this reluctance among businesses, Bambenek said he believes that CSF 2.0 as a framework has great potential in helping businesses understand that addressing software supply chain threats is pertinent to their overall needs.
"[Software supply chain risk is] not just an IT problem, but a business problem.”
—John Bambenek
To make CSF 2.0 practical and beneficial for all kinds of organizations, Bambenek said practitioners need to commodify the framework in a format similar to a SOC 2 report, for example. He believes that this will present the CSF’s core functions in a way that can be audited, so that all kinds of companies – whether small or large; a software producer or a buyer – can make sense of these C-SCRM standards in a practical way.
Learn more in our Webinar panel discussion: Breaking Down NIST CSF 2.0. Plus: See our special report: NIST CSF 2.0 and C-SCRM for Software Risk Management.
Keep learning
- Learn how you can go beyond the SBOM with deep visibility and new controls for the software you build or buy. Learn more in our Special Report — and take a deep dive with our white paper.
- Upgrade your software security posture with RL's new guide, Software Supply Chain Security for Dummies.
- Commercial software risk is under-addressed. Get key insights with our Special Report, download the related white paper — and see our related Webinar for more insights.
Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.