Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • UK Government Report Calls for Stronger Open Source Supply Chain Security Practices
  • Security Week

UK Government Report Calls for Stronger Open Source Supply Chain Security Practices

Kevin Townsend March 11, 2025
0

A UK government analysis of current best practices for OSS and supply chain risk management finds weaknesses in current standards and makes five recommendations to improve matters.

The Department for Science, Innovation & Technology (DSIT) has published a report (PDF) titled Open source software best practice and supply chain risk management. It finds weaknesses in current practices and makes recommendations on how to improve things.

The weaknesses include a lack of industry-specific practices (affecting both sector and company size), no consensus on managing OSS components, no formal process for judging OSS component trustworthiness, and the outsized influence of large tech companies on the OSS ecosphere.

The first is both horizontal and vertical. Horizontally, “Outside highly regulated industries, there is a lack of guidance on how to manage OSS components in specific industries, such as education.” Vertically, current best practices do not adequately reflect the limited resources of smaller companies.

This leads naturally to the second problem. “Although best practices are broad, we found there was a lack of consensus on the best approach to managing OSS components,” says the report.

The third issue is the lack of a formal process for judging trustworthiness. “We found that each developer uses their own trust model and that there is no documented process for evaluating the trustworthiness of OSS components within an organization.”

The fourth is a problem that affects all areas of business – the influence and actions of large companies can have a detrimental effect on smaller companies. The OSS ecosphere is no longer solely occupied by small companies and independent coders. Big tech companies are increasingly involved.

“Due to these companies’ financial backing and resources, they have been able to exert a significant influence on the open-source community.” The result is that OSS influenced by big company impositions does not always reflect the real world use of OSS. It can also sideline smaller OSS contributors and dampen innovation.

Advertisement. Scroll to continue reading.

Working from its analysis, the report then makes four recommendations on how to develop in-house best practices, plus another recommendation on how to make the process actionable. These recommendations are to establish an internal OSS policy; to develop an SBOM; to implement continuous monitoring; to engage with the OSS community; and to use tooling to make it all easier.

Policy. “We recommend that all organizations establish an internal OSS policy that details the criteria for evaluating the trustworthiness and maturity of OSS components,” declares the report. It notes that this should not be overly proscriptive, which could stifle innovation and the use of OSS, and it should be sufficiently nuanced to handle the different levels of scrutiny required by different projects.

It specifically suggests the policy should include a list of acceptable licenses, an approved open source list, the criteria for evaluating the trustworthiness and maturity of OSS components, the security level of the project to guide the necessary stringency of applying the policy, and an approval process that must be met before an OSS component can be used.

SBOM. Companies should develop an SBOM for their own software products. ‘This will provide a clear understanding of the software supply chain and help in enforcing an internal OSS policy.”

Continuous monitoring. “It is important to continuously monitor the software supply chain for vulnerabilities, licensing issues, and new versions of OSS components.” The Equifax breach via a known vulnerability in Apache Struts is an example of not adequately doing so – but also highlights the necessity of monitoring where the OSS is used.

Community engagement. The report suggests it is important to engage with the OSS community. “Fostering a culture of community engagement can be achieved through various activities, including contributing to OSS projects, participating in community events, or providing financial support to OSS projects.” 

The result can raise the quality of a company’s own internal developers and attract new hires and can increase the quality of the OSS components.

Use tooling. The final recommendation is in recognition of how difficult and time consuming all this can be. “Tooling can be used to automate the process of managing OSS components, can be used to enforce an internal OSS policy, perform automated and continuous monitors, and generate and maintain an SBOM. This will significantly reduce the burden on developers and ensure that the SBOM is always up-to-date, and the organization complies with the internal OSS policy.”

This DSIT report analyzes the current approach to OSS best practices, highlights the weaknesses, and then proposes how they can be overcome. “We strongly agree with DSIT,” comments Glenn Weinstein, CEO at Cloudsmith. “This write-up zeroes in on the real issues facing enterprises when they consume open-source software. 

The recommended best practices are spot-on… I particularly appreciate how the authors describe OSS security as a shared responsibility between security teams, who create and curate trusted repositories with quality-oriented policies, and individual developers, who shouldn’t have to make judgment calls on whether a particular package is okay to use.”

Related: Cyber Insights 2025: Open Source and Software Supply Chain Security

Related: OpenSSF Releases Security Baseline for Open Source Projects

Related: Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST

Related: NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity

About The Author

Kevin Townsend

See author's posts

Original post here

Continue Reading

Previous: New Ballista IoT Botnet Linked to Italian Threat Actor
Next: Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

Trending Now

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 1

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 2

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 3

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 4

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 5

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025
Identity Security Has an Automation Problem—And It’s Bigger Than You Think main.jpg 6

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 1
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 2
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 3
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 4
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 5
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025
Identity Security Has an Automation Problem—And It’s Bigger Than You Think main.jpg 6
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections lumma-stealer.jpg 7
  • The Hacker News

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

May 22, 2025

You may have missed

chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
cyber-program.jpg
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.