Submitted:
19 July 2023
Posted:
19 July 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Data Sources
1.2. Methods for Analysis
2. Brief Literature Rreview of Cybersecurity Reports on VEX and SBOM
2.1. What is Software Supply Chain Cyber Risk
2.2. What Is the Software Bill of Materials (SBOM) and How Does It Help with Cyber Risk Assessment
2.3. Background to the Vulnerability Management Problems
2.4. What Is the Vulnerability Exploitability eXchange (VEX) and How Is It Different from SBOM and CVE
3. Survey of Secondary Data on Rethinking VEX and SBOM
Utilisation Problem
4. Conclusions
Areas for Further Research
Declarations:
Funding
Acknowledgements
References
- Wiesner, Jens, “CSAF, Not SBOM, Is The Solution,” S4x22 - BSI, 2022. [Online]. Available: https://www.youtube.com/watch?v=fKlW9vOs7X4&t=504s. [Accessed: 03-Jan-2023], URL: https://www.youtube.com/watch?v=fKlW9vOs7X4&t=504s.
- NIST, “NVD - CVSS v3 Calculator,” CVSS Version 3.1, 2022. [Online]. Available: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator. [Accessed: 03-Jan-2023], URL: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator.
- Manion, Art, “SSVC: Stakeholder-Specific Vulnerability Categorization,” Carnegie Mellon University, 2020. [Online]. Available: https://bit.ly/3ambIP4. [Accessed: 02-Jan-2023], URL: https://bit.ly/3ambIP4.
- Carmody, Seth., Coravos, Andrea., Fahs, Ginny., Hatch, Audra., Medina, Janine., Woods, Beau., and Corman, Joshua, “Building resilient medical technology supply chains with a software bill of materials,” npj Digital Medicine 2021 4:1, vol. 4, no. 1, pp. 1–6, Feb. 2021. [CrossRef]
- Foster, Rita., Priest, Zach., and Cutshaw, Michael, “Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability,” 2021 Resilience Week, RWS 2021 - Proceedings, 2021. [CrossRef]
- Eggers, Shannon Leigh., Christensen, Drew., Simon, Tori Brooke., Morgan, Baleigh Rae., and Bauer, Ethan S, “Towards Software Bill of Materials in the Nuclear Industry,” Sep. 2022. [CrossRef]
- Moore, Marina., Sirish, Aditya., Yelgundhalli, A., Kuppusamy, Trishank Karthik., Torres-Arias, Santiago., Delong, Lois Anne., and Cappos, Justin, “Scudo: A Proposal for Resolving Software Supply Chain Insecurities in Vehicles The second in a series of whitepapers on emerging and critical issues in automotive cybersecurity.”.
- Schmidt, Leon., Hammer, Daniel., Biß, Klaus., and Schmidt, Thomas, “Media Faculty in cooperation with the Development of an API to request security advisories for CSAF 2.0 by Enterprise and IT Security Supervision.”.
- Jackson, Wayne, “Code, Cars, and Congress: A Time for Cyber Supply Chain Management (1 of 3),” Sonatype, 2014. [Online]. Available: https://blog.sonatype.com/2014/12/cyber-supply-chain-management-part1/. [Accessed: 03-Jan-2023], URL: https://blog.sonatype.com/2014/12/cyber-supply-chain-management-part1/.
- Royce, Edward R., “H.R.5793 - 113th Congress (2013-2014): Cyber Supply Chain Management and Transparency Act of 2014,” Congress.Gov, 2014. [Online]. Available: http://www.congress.gov/. [Accessed: 03-Jan-2023], URL: http://www.congress.gov/.
- Howard, Matt, “Cybersecurity Improvement Act of 2017: The Ghost of Congress Past - DevOps.com,” devops.com, 2017. [Online]. Available: https://devops.com/cybersecurity-improvement-act-2017-ghost-congress-past/. [Accessed: 03-Jan-2023], URL: https://devops.com/cybersecurity-improvement-act-2017-ghost-congress-past/.
- Biden, Joseph, “Executive Order on Improving the Nation’s Cybersecurity | The White House,” The White House, 12-May-2021. [Online]. Available: https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/. [Accessed: 03-Jan-2023], URL: https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/.
- CISA, “Software Bill of Materials,” Cybersecurity & Infrastructure Security Agency, 2018. [Online]. Available: https://www.cisa.gov/sbom. [Accessed: 24-Dec-2022], URL: https://www.cisa.gov/sbom.
- NTIA, National Telecommunications and Information Administration, Software Bill of Materials (SBOM) | National Telecommunications and Information Administration. 2021.
- NTIA, “SBOM at a Glance,” NTIA Multistakeholder Process on Software Component Transparency | ntia.gov/sbom, 2021. [Online]. Available: https://tiny.cc/SPDX. [Accessed: 03-Jan-2023], URL: https://tiny.cc/SPDX.
- MITRE, “CVE - Common Vulnerabilities and Exposures,” The MITRE Corporation, 2022. [Online]. Available: https://cve.mitre.org/. [Accessed: 03-Jan-2023], URL: https://cve.mitre.org/.
- CVE, “CVE security vulnerability database. Security vulnerabilities, exploits, references and more,” 2022. [Online]. Available: https://www.cvedetails.com/. [Accessed: 03-Jan-2023], URL: https://www.cvedetails.com/.
- Shustin, Ronen, “Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part II) – Check Point Research,” Check Point Research, 2020. [Online]. Available: https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/. [Accessed: 03-Jan-2023], URL: https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/.
- CheckPoint, “Cyber Security Report,” Check Point, 2021.
- Postitive Techologies, “Vulnerabilities on the corporate network perimeter,” 2020. [Online]. Available: https://www.ptsecurity.com/ww-en/analytics/vulnerabilities-corporate-networks-2020/. [Accessed: 03-Jan-2023], URL: https://www.ptsecurity.com/ww-en/analytics/vulnerabilities-corporate-networks-2020/.
- O’Driscoll, Aimee, “25+ Cyber Security Vulnerability Statistics and Facts of 2023,” Comparitech, 2022. [Online]. Available: https://www.comparitech.com/blog/information-security/cybersecurity-vulnerability-statistics/. [Accessed: 03-Jan-2023], URL: https://www.comparitech.com/blog/information-security/cybersecurity-vulnerability-statistics/.
- NTIA, the U.S. National Telecommunications and Information Administration, “Vulnerability-Exploitability eXchange (VEX),” 2021, URL: https://ntia.gov/files/ntia/publications/vex_one-page_summary.pdf.
- OASIS, “OASIS Common Security Advisory Framework (CSAF) TC | OASIS,” OASIS OPEN, 2022. [Online]. Available: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=csaf. [Accessed: 03-Jan-2023], URL: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=csaf.
- Springett, Steve, “Vulnerability and Exploitability Transparency - VDR & VEX | OWASP Foundation,” OWASP, Feb-2023. [Online]. Available: https://owasp.org/blog/2023/02/07/vdr-vex-comparison. [Accessed: 24-Apr-2023], URL: https://owasp.org/blog/2023/02/07/vdr-vex-comparison.
- CISA, “Minimum Requirements for Vulnerability Exploitability eXchange (VEX),” U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency, 2023, URL: http://www.cisa.gov/tlp/.
- Alrich, Tom, “‘Minimum elements’, Bigfoot, and other myths,” Blog, 2022. [Online]. Available: https://tomalrichblog.blogspot.com/2022/. [Accessed: 03-Jan-2023], URL: https://tomalrichblog.blogspot.com/2022/.
- Dependency-Track, “Software Bill of Materials (SBOM) Analysis | OWASP,” Dependency-Track, 2022. [Online]. Available: https://dependencytrack.org/. [Accessed: 03-Jan-2023], URL: https://dependencytrack.org/.
- OSS, “Sonatype OSS Index,” 2022. [Online]. Available: https://ossindex.sonatype.org/. [Accessed: 03-Jan-2023], URL: https://ossindex.sonatype.org/.
- Alrich, Tom, “Hmm…It seems SBOMs might become big one of these days…,” Blog, 2022. [Online]. Available: https://tomalrichblog.blogspot.com/2022/04/hmmit-seems-sboms-might-become-big-one.html. [Accessed: 03-Jan-2023], URL: https://tomalrichblog.blogspot.com/2022/04/hmmit-seems-sboms-might-become-big-one.html.
- NTIA, Multistakeholder Process on Software Component Transparency - Standards and Formats Working Group, “Survey of Existing SBOM Formats and Standards-Version 2021 Survey of Existing SBOM Formats and Standards Credit: Photo by Patrick Tomasso on Unsplash NTIA Multistakeholder Process on Software Component Transparency Standards and Formats Working Group,” 2021, URL: https://www.ntia.gov/files/ntia/publications/sbom_formats_survey-version-2021.pdf.
- VEX, “Vulnerability Exploitability eXchange (VEX) – Use Cases,” 2022. [Online]. Available: https://www.cisa.gov/sbom. [Accessed: 03-Jan-2023], URL: https://www.cisa.gov/sbom.
- Alrich, Tom., and Brudo, Barak, “Secrets Of The Vulnerability Exploitability eXchange (VEX) Webinar,” Scribe Securely, 2022. [Online]. Available: https://www.youtube.com/watch?v=dyvuNqX_wJ8. [Accessed: 03-Jan-2023], URL: https://www.youtube.com/watch?v=dyvuNqX_wJ8.
- Wilkinson, Mark D., Dumontier, Michel., Sansone, Susanna Assunta., Bonino da Silva Santos, Luiz Olavo., Prieto, Mario., Batista, Dominique., McQuilton, Peter., … Schultes, Erik, “Evaluating FAIR maturity through a scalable, automated, community-governed framework,” Scientific Data 2019 6:1, vol. 6, no. 1, pp. 1–12, Sep. 2019. [CrossRef]
- Groll, Elias.,., and Hewitt-Jones, John, “Software bills of materials face long road to adoption,” CyberScoop, 2022. [Online]. Available: https://www.cyberscoop.com/dhs-sbom-adoption/. [Accessed: 03-Jan-2023], URL: https://www.cyberscoop.com/dhs-sbom-adoption/.
- Meyers, John Speed, “Are SBOMs Any Good? Preliminary Measurement of the Quality of Open Source Project SBOMs,” Chainguard, 2022. [Online]. Available: https://www.chainguard.dev/unchained/are-sboms-any-good-preliminary-measurement-of-the-quality-of-open-source-project-sboms. [Accessed: 03-Jan-2023], URL: https://www.chainguard.dev/unchained/are-sboms-any-good-preliminary-measurement-of-the-quality-of-open-source-project-sboms.
- Alrich, Tom, “Real-time VEX,” Blog, 07-Sep-2022. [Online]. Available: https://tomalrichblog.blogspot.com/2022/09/real-time-vex.html. [Accessed: 03-Jan-2023], URL: https://tomalrichblog.blogspot.com/2022/09/real-time-vex.html.
- CISA, “CISA Stakeholder-Specific Vulnerability Categorization Guide,” Cybersecurity and Infrastructure Security Agency, Nov-2022.
- OASIS, “Using CSAF to Respond to Supply Chain Vulnerabilities at Large Scale,” OASIS Open, 2022. [Online]. Available: https://us06web.zoom.us/webinar/register/WN_KqD-a1t5SpuMI7w9cI7ZDg. [Accessed: 03-Jan-2023], URL: https://us06web.zoom.us/webinar/register/WN_KqD-a1t5SpuMI7w9cI7ZDg.
- Wilkinson, Mark D., Dumontier, Michel., Aalbersberg, IJsbrand Jan., Appleton, Gabrielle., Axton, Myles., Baak, Arie., Blomberg, Niklas., … Mons, Barend, “The FAIR Guiding Principles for scientific data management and stewardship,” Scientific Data 2016 3:1, vol. 3, no. 1, pp. 1–9, Mar, 2016. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).