[ad_1]

Government
,
Industry Specific
,
Software Bill of Materials (SBOM)

Federal Agencies Lack Comprehensive Guidelines For Developing SBOMs, Experts Say

Experts Urge Congress to Establish Clear SBOM Guidance
A congressional panel heard Wednesday that SBOM guidance for federal contractors is ambigious. (Image: Shutterstock)

Procurement experts warned in congressional testimony Wednesday that government agencies still lack a clear, comprehensive framework to develop software bills of material and use their information to bolster cybersecurity.

See Also: Live Webinar | Generative AI: Myths, Realities and Practical Use Cases


The White House issued an executive order in 2021 on improving the nation’s cybersecurity that required agencies to implement SBOMs when developing or procuring software. Often compared to ingredient lists for food products, SBOMs provide comprehensive information about a software product’s components, dependencies and third-party libraries, and have been increasingly seen as critical cybersecurity tools in securing federal software supply chains.


While the National Telecommunications and Information Administration published guidance on the minimum elements required for SBOMs, “current and proposed government requirements leave too many unanswered questions and ambiguities,” according to Roger Waldron, president of the Coalition for Government Procurement.


“Current proposals would require an SBOM and attestation for major updates to existing software,” Waldron said when testifying before the House subcommittee on cybersecurity, information technology and government innovation. “What is a major update? What about frequent, but small, updates? What is the role of open source and third-party software?”


Waldron recommended the government continue to seek feedback from industry on best practices around SBOM development and utilization, and further establish the Cybersecurity and Infrastructure Security Agency and the Federal Acquisition Security Council as leaders in managing cybersecurity and supply chain requirements for federal contractors.


Congress has barred federal agencies from procuring software and equipment developed by certain Chinese technology companies in recent years, including Huawei, ZTE, Hikivision, Dahua and Hytera. But reports have indicated that products, software components and services from those companies are still finding their way into the networks of critical infrastructure systems nationwide.


James Lewis, director of the strategic technologies program for the Center for Strategic and International Studies, told lawmakers that SBOMs “can let the United States identify software with Chinese elements and decide on the risks and benefits of its use.”


“For U.S. government software and technology acquisitions, the risk of hostile Chinese action is almost certain,” he added, noting: “Any use by federal agencies of Chinese software on devices or applications connected to the internet can provide an opportunity for access by Chinese intelligence agencies.”


Agencies require clear guidelines on what should be included in their SBOMs, but they also need direction as to what information and potential vulnerabilities can be used for destructive attacks against federal networks, witnesses said.


Jamil Jaffer, executive director of the National Security Institute at George Mason University, said SBOMs can play a critical role in preventing and mitigating cybersecurity threats – but only when in the right hands.


“Once you know what’s in the software, people have to do something about it,” he said. “By exposing what’s in a software bill of materials, it also gives our adversaries information about what to go after.”



[ad_2]

Source link