Accellion and SolarWinds Attacks: Why You Need To Enforce Security Hygiene in Software Supply Chains

Mar 06, 2021

Accellion's Trust Center page suggests CVE patches for known vulnerabilities and their blog suggests they are 100% compliant and yet 100% owned by adversaries. Why?

On SolarWinds' Trust Center page, they have 100% compliance — and yet were also 100% owned by adversaries. Why?

Joe Newton

Do we really need more examples at this massive scale to finally come to terms that Compliance Security?

The entire economy is built on fragile software products — not just one product, but already lit truth bombs of thousands of products ready to explode everyone's dirty laundry all over the place — yet compliance checkboxes are still chosen for ducking and covering.


Every day, end-customer organizations roll the dice allowing software product risky code and operations to threaten their safety. Supply chain risks, product compromises, insider threats, and unknown risks just sitting in their environments waiting to be discovered. 


It is a 24/7/365 race to see who will find the risks first. Who will it be for you: cyber attackers or your IT professionals? 


It is time we get more sophisticated (like the attackers) in enabling our IT teams with technology, architecture, and automation rather than keeping them flying blind with words, maturity models, frameworks, and certifications.


Because let's be honest, the technology capabilities exist today and hackers do not care about the IT audit remediation plan coming next year.


We must recognize that we need to change our techniques and approaches in proactively putting in the work to fix the right risks for the right systems.

It used to be acceptable for security hygiene weaknesses like…
  • code repos turning from private to public, 
  • not knowing when non-team members are making malicious modifications, 
  • not understanding if third-party software on all your critical processes is running the most recent security updates provided by your software vendor,
  • not ensuring trusted third-party or open-source code components for your developed products,
  • not adding additional security controls to prevent the access from unauthorized sources, and
  • not automating threat pattern recognition by correlating historical tacking of combined scenarios observed over time
…to infect unsuspecting customers. 

The Accellion and SolarWinds software cybersecurity attacks just changed everything.


Brief Introduction


The SolarWinds cyber breach was a pivotal moment for software cybersecurity assurance, raising everyone’s awareness for the need of software supply chain integrity, proving that attackers can breach an organization through their trusted cybersecurity software vendors.


"This incident has historical significance. It is a shift in the tectonic plates of cybersecurity....and warrants a review of our existing policy. Traditional cybersecurity teams and traditional IT teams don't recognize it." 
Jim Routh, CISO, MassMutual (Interos Webinar)



Then, only two months later, the Accellion attack — in which security firm
Accellion suffered a data breach due to adversaries exploiting four unpatched known vulnerabilities — serves as yet another urgent call to action.


FireEye Mandiant has covered the details of Accellion being used as the attack vector to breach several of its customers in the article, Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion, now affecting healthcare insurer Centene as among the latest victims, which also includes security firm Qualys, Kroger, Bombardier, Flagstar Bank, the Jones Day Law Firm, the Reserve Bank of New Zealand, the Australian Securities and Investments Commission (ASIC), and Transport for New South Wales (TfNSW).


The SolarWinds and Accellion software supply chain compromises have exposed the notion that without continuous assurance, “safety” is a fallacy, and everyone should acquire evidence-based trust moving forward.


Traditionally, software supply chains referred to every code component involved in delivering a software product, from development to distribution channels, and everything in between.


Now in our digital world, everything is code and the risks are everywhere—SaaS, IoT, web, mobile, clouds—leaving existing security tools blind. The software supply chain is anything that touches that code from people, processes, and other technologies from build to runtime and maintenance with updates and enhancements (including new versions, exposed breach paths, DevOps tools, and security controls).


Even if the codebase is not touched for years, “Code Rot” naturally occurs over time which weakens software that was once “hardened.” While in parallel, hackers continuously find new ways to exploit the vulnerabilities they find within software and delivery processes.


They are doing this through dependencies. This means that software supply chain risks are inherited in each organization from their software vendors, cloud solutions, and third-party code ecosystems.


If unchecked, dependencies leave organizations open to product compromises, insider threats, and exposed weaknesses. With organizations relying on thousands of software vendor suppliers, software supply chain security includes protecting all internally and externally sourced code, tools, and software products. This starts with gaining visibility and control over your entire organization and upholding your software vendor partners to new safety requirements.



Managing products is getting harder. And the way we work constantly changes with regulations and the adoption of new capabilities. But, we’re still spending time trying to answer questions with traditional approaches when security functions have moved to engineering.


Questions like: what threats and vulnerabilities do we have, who owns them, and are they putting customers at risk? 



The Software Cybersecurity Assurance Challenge


Tauruseer solves one of the biggest and most fundamental problems DevOps, Security, and Compliance teams face today: software assurance for cybersecurity. Time is the enemy in product security, as the time with — new business requirements, manual code reviews, fixing bugs, tracking code and open source components in spreadsheets, smashing buttons on traditional AppSec tools to wait for days, and providing IT audit reports to constantly evolving regulations — when that time could be spent on innovating for, and protecting, their customers.


The Solution


Tauruseer solves the problem with a paradigm shift: by connecting to existing tools our customers already use that supports each DevSecOps product team (software, systems, and personnel), Tauruseer incorporates contextual controls within NIST 800-53 to automate the correlation and analysis of risky scenarios to help customers with 3 things:


1.      An always up-to-date, comprehensive Product Inventory

2.     Enforcing a Culture of Safety

3.     Automating Audit Ready All The Time


Once that is accomplished, Tauruseer can help customers build trust with their enterprise customers through evidence-based risk management and actionable insight into their affected systems.



REAL Third-Party Risk Management: How Tauruseer Protects the Software Supply Chain


Security products claiming they can protect against third-party software supply chain compromise with network threat detection will have a hard time proving to be the silver bullet. Admittedly, every tool will have a hard time dealing with this problem. It is not a one and done approach and requires a comprehensive program with platforms. Not just point solutions.


People still need to be directed to do the right work.
Executives and Senior Management still need the actionable context and insights to set the appropriate direction and monitor for improvements.

With Tauruseer, customers can lead their teams to put in the prioritized, proactive work that the
US's Cybersecurity & Infrastructure Security Agency (CISA) recommends so you can prevent your organization from becoming the source of a supply chain compromise. By providing visibility and control, Tauruseer helps everyone—not just at the security engineer or developer-level—to see and keep track of risk management performance.


Both the software vendor and their customers are required to do work to protect the overall software supply chain ecosystem.


Let's look through the Tauruseer Solution's two perspectives:

  • Accellion (vendor)
  • Centene (customer)



Securing Critical Software Supply Chains


Modern software supply chains leverage DevSecOps environments and practices to accelerate the development and deployment of new capabilities. Tauruseer is the first platform to align and offer these new approaches out-of-the-box while applying additional security measures as recommended in NIST SP 800-53, validated by MITRE's report: "Deliver Uncompromised: Securing Critical Software Supply Chains."


Tauruseer identifies known breach paths, risky changes, and anomalies in software supply chains, including products and their supporting delivery processes leveraging DevOps and security management tools.


With a growing supply chain and more frequent software updates introduces new vulnerabilities to organizations, rapidly allowing attackers increased access to target networks. Tauruseer reveals any anomalous behavior or suspicious activity and identifies malicious intent or disengagement regarding code and security policies between DevSecOps teams.


Additionally, Tauruseer prevents unknown risks by helping organizations stay on top of all their code, including open source and third-party libraries, tied with their custom code, capturing details such as author and timestamp. Once mapped to a product centric context, Tauruseer automatically creates a trusted baseline, scans and updates automatically as trusted team members do their work.


Every time code changes by team members, Tauruseer creates a trusted software bill of materials (SBOM) baseline, including dependencies, contextual to every product. With automatic dependency vulnerability mapping and new code checks against code authors and trusted baselines (before the build system consumes it), Tauruseer provides investigation alerting of potential compromises, insecure fixes, or an assurance certification back to stakeholder dashboards.


Combined with code signing and container security tools, Tauruseer’s Cognition Engine™ provides complete proactive risk intelligence coverage, offering correlations through the build and run processes so malicious activities or lack of risk performance will not go undetected.


Conclusions


Traditional cybersecurity strategies and procurement practices are showing their age by allowing static questionnaires and snapshots to create a false sense of safety in software vendors, and now, cybersecurity vendors. 


As we have shown, no organization is immune to software supply chain compromise but putting in the proactive security hygiene work will certainly lower adversaries’ chances for success. While implementing network threat detection and DevSecOps is necessary, they are both still not sufficient approaches alone. 


With Tauruseer, establish and implement an enterprise platform for software supply chain integrity as part of your comprehensive security program while reducing risks, costs, and complexity. 


Tauruseer’s secure platform combines innovative big data analytics with proactive risk intelligence that gives software vendors a comprehensive product inventory, enabling leadership to enforce a culture of safety and turn regulatory compliance into a living thing that automates “audit-ready all the time.” 


Through a single SaaS platform, software vendors access "one API" to connect the existing tools they already use. Once they do that, Tauruseer can give actionable context and insights from code-to-cloud into their rapidly-changing product operations, software supply chains, and associated indicators of risks to prevent product compromises, insider threats, and unknown risks from infecting their customers—like seen in the Accellion and SolarWinds supply chain breaches.


By protecting software vendors, their enterprise customers can now gain seamless, real-time, and continuous risk quantification metrics for each vendor in their ecosystem. This provides efficiencies and cost savings while meeting expectations of The Board and Regulators. It is essential to provide complete assurance for both the software vendor and their enterprise customers. Now everyone can focus their energy, people, and budgets on areas with the biggest returns.


We are now open for new business and way less scary than the alternative = crisis management, damaged reputations, operational disruptions, and lost business. 

Let us help your organization rethink how to secure critical software supply chains. Contact us and see how Tauruseer enables teams to proactively prevent code, products, and dependencies from constantly evolving software security hygiene risks.

SHARE!

More news and blogs

27 Jun, 2023
Gula Tech Adventures, Lytical Ventures, and Dasein Capital lead Seed investment in Start Left™ Security, supported by other strong investors: DeepWork Capital, Florida Opportunity Fund, and Bootleg Advisors. JACKSONVILLE, FL, June 27, 2023—Start Left™ Security, powered by the patented Tauruseer Application Security Posture Management (ASPM) Platform and SPACE™ Behavioral Analytics, today announced that it has oversubscribed and closed $3.0 million Seed financing led by notable cybersecurity, data analytics, and artificial intelligence (AI) venture capitalists and industry experts. This demonstrates the market’s confidence in Start Left™ Security's vision and its ability to deliver innovative solutions that address evolving security threats.
20 Jun, 2023
Introducing Start Left™ Security: Embracing a New Name, a New Perspective in Security
23 Feb, 2023
Achieve SOC 2 Compliance and Security Posture Management Maturity with Minimal Spend Leveraging Tauruseer's differentiated Cloud-Native Application Protection Platform (CNAPP): Security Posture Analytics + Cognition Engine (SPACE ™ ), Purpose-Built for Growth SaaS Startups and Small to Midsize Businesses.
06 Feb, 2023
Designed to enable cloud-native innovators to quickly scale, become enterprise-ready, and transact on the Azure marketplace.
15 Dec, 2022
“ Cloud security posture (CSPM) incumbents launched traditional approaches leaving huge gaps, as they don’t understand the needs of modern DevOps pipelines or developers.
01 Dec, 2022
Business Leaders: Is your DinoCISOaur holding your company back, slowing innovation, upsetting developers, and placing business at risk?
01 Dec, 2022
JACKSONVILLE, FL, June 9, 2020 – Tauruseer is the proud official presenting partner for SAE International's 2020 Government and Industry virtual conference! This conference is an opportunity to explore how technology, regulations, and legislation will affect the design of aerospace and defense solutions in terms of software, hardware, and product integrity. Tauruseer co-founders have been invited to present at the SAE G-33 to the entire Configuration Management Committee on how a model-based enterprise, adopting concepts such as " Shift Left ", the Product Centric Risk Model ™ , Inventory of Intelligence ™ , Centralizing Monitoring , and Continuous Assurance drives the way DevOps is supposed to be. Tauruseer will demonstrate what true DevOps looks like and how Tauruseer's platform can provide demonstrable evidence of DevOps done right. Furthermore, they will walk through how Continuous Assurance enables organizations to fully embrace DevOps through holistic change, resulting in quantifiable benefits: Enhanced Situational Awareness across product portfolio Enterprise Visibility (human, product, and process threats) Efficiency gains (productivity on the right things) Decreasing costs (intentionally designed controls) Reduced complexity (robust decision support) VERIFIED Governance, Risk, and Compliance "GRC" (Continuous Assurance) Tauruseer will highlight real-world examples that shine a light on how technology that we depend on everyday can make a difference between life and death. While DevOps seeks to balance throughput, stability, quality, and speed, Tauruseer assures organizations there is not compromise in security, performance, and compliance while doing so- especially when lives are at stake. Sharing stories enables better collaboration when standards, regulations, and legislation needs updating to align with continuously evolving product development practices. JOIN THE CONFERENCE! TAURUSEER PRESENTATIONS TIME: 1:55pm EDT TOPIC: Software SecDevOps and Configuration Management (CM) – Understanding the Challenges Speakers: Larry Gurule, Jeremy Vaughan & Alex Borhani TIME: 3:10pm EDT – 4:00 pm EDT TOPIC: Software SecDevOps and Continuous Assurance (CA) – Achieving Management’s Goals and Continuous Improvement through appropriate Configuration Management (CM) Speakers: Larry Gurule, Jeremy Vaughan & Alex Borhani Virtual Details: WebEx G33 Meeting Meeting number: 622 476 853 Meeting password: June2020 Call-in number: 1-866-469-3239 INFO: SAE International's G33 standards are adopted and enforced by NATO, NASA, FAA, DOE, DOD, aspects of the European Union, and the European Space Agency for large federal suppliers contracted to provide tamper-proofed audit trails, traceability, and trusted reporting of managed compliance as it relates to Software Configuration Management and Continuous Assurance. Visit Tauruseer's website and ask for a demo to showcase a variety of GRC for DevOps use cases: Proactive Security Continuous Compliance Conduct & Culture Insider Threat Reporting
28 Oct, 2021
Part 1 in this series: “ Risk Enabled Growth: Business Strategies to Leveraging Risk & Capitalizing on Digital Growth Opportunities " included the perspectives of cybersecurity and integrated risk management expert Jeff Sauntry of Risk Neutral, privacy, risk, and compliance experts Rob Harvey and Greg Kraft of Online Business Systems, and business strategy, product innovation, and product security expert Jeremy Vaughan from Tauruseer Inc. Watch if your role involves: - Maximizing value creation achieved at the synergy of talent, tangible, and intangible assets - Enabling trusted digital experiences for employees, partners, and customers - Oversight for Strategic, Operational, Financial, Compliance or Reputation Risk as part of your organization's 3-Lines of Defense (3LoD) - Mitigating the potential disruptive impact of events and unlocking the economic potential of your organization's resources and assets
04 Oct, 2021
JACKSONVILLE, FLORIDA; ATLANTA, GEORGIA; TAMPA, FLORIDA; PORTLAND, OREGON; MINNEAPOLIS, MINNESOTA; CALGARY, ALBERTA; TORONTO, ONTARIO, WINNIPEG, MANITOBA; LONDON, ENGLAND ( PRWEB ) - OCTOBER 4, 2021 Online Business Systems (Online) and Tauruseer announce a partnership to deliver compliance sustainability through a robust SaaS solution that enables DevSecOps and CI/CD engineering, along with essential cybersecurity, cloud, and compliance services. With recent high-profile attacks driving U.S. Executive Orders for Critical Infrastructure Cybersecurity Performance and Software Bill of Materials (SBOM)-powered software supply chain security , this partnership comes at a pivotal moment in time as organizations and boards look to understand software risk and compliance on a portfolio basis. “ We are focused on helping our clients quickly discover, manage, and reduce the threats that pose some of the largest risks to their business ,” said Rob Harvey, Managing Director, Risk Security & Privacy, Online . “ By partnering with Tauruseer, our clients have access to a single platform for understanding and addressing security, governance, and compliance goals. Separating signal-from-noise across silos with the use of their cognitive engines — especially when a product team may require 20 to 50 tools — is something no point tool can do. We haven’t seen these capabilities before .” Solving Security and Compliance Sustainability Together DevSecOps is a combination of tools and workflows making software development and deployment faster, more reliable, and more secure. Tauruseer unifies all the risk data from all the tools, connecting people, processes, technologies, and behaviors. The platform allows end-users, operators, and analysts to configure product-centric software and infrastructure in a no-code manner that helps monitor and troubleshoot systems. The solution provides complete visibility across the DevSecOps infrastructure and allows users to analyze every layer of their operation. Online wraps their proven, robust risk, security, and privacy domain knowledge around the tooling, and its findings, to address the operational process needs and attestation tasks. Their portfolio of services is designed to solve cybersecurity and risk challenges the right way, the first time. This partnership solves critical challenges for clients. Whether it’s reducing the cost of compliance reporting, monitoring, measuring and analyzing every step of CI/CD pipelines, supporting security audits or developing custom dashboards and KPIs/KRIs for customers—the partnership provides an out-of-the-box solution. Organizations in various vertical markets such as financial services, payments, digital commerce, healthcare, energy, and government contractors will benefit from: Faster, more agile delivery and reduced time to market Improved security posture and reduced risk Reduced operational and development costs Improved customer experiences and satisfaction Environment-agnostic builds to avoid vendor lock-in Maintained audit ready compliance for less operational disruption “ Everyone wants to “shift left,” yet the reality is the tools and processes are built for developers, leaving cybersecurity out of the conversation. Online is a very exciting opportunity, already proving incredible expertise in solving cybersecurity problems and staying ahead with innovation. With our ‘no-code’ approach, security leaders are able to ramp up Product Security programs quickly without having to be a developer. Online’s ability to seek out solutions like this prove they go above and beyond to ensure customer success makes this a tremendous partnership ,” said Jeremy Vaughan, CEO Tauruseer . Using a shared support model, Online and Tauruseer provide value long after initial deployment through a service level agreement (SLA), defined professional services, and a commitment to future product innovation. The pricing is simple for end users wishing to purchase a single bundle with the option to include a SaaS subscription. The partnered offerings are available today. To discuss, please contact rsp@obsglobal.com or sales@tauruseer.com . About Online Business Systems Online Business Systems (Online) is a digital transformation and cybersecurity consultancy. Since 1986 Online has been using technology to deliver dramatic business results for companies throughout Canada, USA and EMEA. Their unsurpassed delivery, people, and the Online culture of loyalty, trust and commitment to mutual success set them apart. Today Online has over 350 business and technical consultants throughout Canada, US and EMEA. Online has been recognized on the “Best Workplaces in Canada” list for 15 consecutive years. For more information about Online or their services please visit https://www.obsglobal.com/ About Tauruseer Tauruseer is the Security Posture Analytics + Cognition Engine (SPACE) Platform. Powered by the patented Cognition Engine and PIRATE™ risk model, the platform was purpose-built to optimize DevSecOps performance, security, and compliance – enabling Security and IT professionals to intelligently adapt software delivery in real-time based on proactive insights across products, infrastructure, and development. Tauruseer helps product-led businesses establish and scale risk-based Application Security Posture Management , Software Supply Chain Security and Cloud-Native Application Protection Programs automatically and continuously—company-wide. The result is significantly reduced costs and risks — speeding up the business without sacrificing compliance needs or compromising security. Tauruseer was built by enterprise CTOs, CISOs, and a former Unit Chief for FBI Cyberterrorism. For more information, please visit https://www.tauruseer.com/ Media Contacts: Online Business Systems media@obsglobal.com Tauruseer Inc. media@tauruseer.com Links - Jacksonville Business Journal: Jax-based Tauruseer announces Canadian partnership
Show more
Share by: