broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

Top 10 Things You Should Know About Using SBOM to Secure Industrial IoT Devices

· Industry Applications and Use Cases,Technical and Security Deep Dives

Software bills of materials (SBOMs) are used to secure industrial IoT devices by enabling better cybersecurity and maintenance. The normal use case for SBOMs is for user-managed software. However, SBOMs can also be used as a tool to describe software pre-installed on a device. Because device users don’t have a direct relationship with the software supplier, they must rely on the device manufacturer to track and manage device vulnerabilities. Here are the top 10 things you should know about using SBOM in securing industrial IoT devices:

1- Risk Mitigation and Decision Making

SBOMs help software developers mitigate risks posed by vulnerable components, allowing them to make decisions such as replacing high-risk components or providing a patch for a vulnerability.

2 - Software vs. Firmware

There are two types of SBOMs that are regularly developed; one is for user-managed software products, and the other is for the software and firmware installed in an IoT or IIoT device. The difference between the two is that user-managed software products already have software pre-installed, while the software updates for an IoT device are applied by the supplier remotely. Therefore, the owner of the device would need to receive an SBOM for every user-managed software product.

3 - Component Cybersecurity vs. Licensing Risks

There are two primary types of risk that SBOMs manage: component cybersecurity risks and component licensing risks. Component licensing risks mostly concern software developers, while component cybersecurity risks impact the organizational goals of the company.

4 - Common Format

CycloneDX and SPDX are two full-featured SBOM formats that can be represented in multiple forms. While those forms include spreadsheets, the most widely used representations are XML and JSON.

5 - VEX

Vulnerability Exploitability eXchange (VEX) is a document type that was developed to solve software vulnerabilities and is commonly referred to as a “companion artifact” to an SBOM. Both existing VEX formats are machine-readable.

6 - Visibility

Vulnerabilities found in software components are not all exploitable and most of them cannot be utilized by an attacker with common capabilities to compromise the product. However, a software user won’t know if the vulnerability that was disclosed is serious or exploitable in the context of intended use.

7 - Monitoring

Companies managing component vulnerabilities in user-managed software products would contract the supplier to provide a new SBOM whenever there is a change in the software, which may involve an automated tool that can ingest SBOMs and VEX documents. When the compilation of vulnerabilities is performed regularly, the organization will always have an up-to-date list of exploitable component vulnerabilities that it can feed into its vulnerability management tools. It can also use the list to coordinate with the product supplier and determine when to patch serious exploitable vulnerabilities.

8 - Manufacturer's Obligations

Because of the device manufacturer’s obligation to the customer, they must be able to provide a complete SBOM to the customer, which is updated whenever there is a software update.

9 - Manufacturer vs. Supplier Liability

The manufacturer of the device becomes responsible for patching serious vulnerabilities if the supplier fails to do so for whatever reason. This is because the device manufacturer is the one with the direct relationship with the end-user and can make the request to the supplier.

10 - Proper Tracking

To properly track and address device vulnerabilities, manufacturers should register the device in the National Vulnerability Database and report software and firmware vulnerabilities installed in the device.

Finally, if you're interested to learn more about how to use SBOMs to secure IoT devices we'd strongly recommend you to read further the following study published by the IIC or reach out to specialized experts.

 

 

 

 

 

 

 

 

 

Subscribe
Previous
What You Should Know About Procurement Cybersecurity
Next
NIST’s new guidance for IoT and IIoT cybersecurity
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save