This article is a guest post by Wendy Nather, Research Director of the Enterprise Security Practice, 451 Research. Veracode is a client of 451 Research.

When the revolution comes, the first up against the firewall will be your business partners – along with every other third-party that provides you with software.

It used to be that you could call for more secure software from individual vendors – and Microsoft heeded that call, for example with its push for trustworthy computing, starting in 2002 – but today we’re more dependent on software than ever, and more interconnected than ever; we rise and fall by the security of our associates. The sheer number and variety of third-party applications have exploded: with on-premise software, mobile devices, and cloud-based services, a large organization can have tens of thousands of applications in use.

So organizations can’t focus on one or two providers, or address software security only within their own development efforts; they need to do it across the board. Initiatives such as Build Security In are taking acquisition into account, and supply chain security is being discussed at all levels in both the public and private sectors.

Now, it’s not too practical to take some commercial software off the shelf at Best Buy and tell the cashier that you’re not going to buy it unless it’s secure. But you can certainly start fomenting revolution by including security requirements in every RFP, statement of work and other contracts that you sign with third parties. This means that you need to start out by deciding how secure you want your software to be, and how you’ll measure that security. Here are some things you’ll want to include in the contract language:

  • How you will measure the level of security you expect from the software you receive
  • Who will provide those measurements – in other words, who will do the testing, and how often
  • Who is responsible for fixing anything that doesn’t measure up to your requirements
  • Who will bear the cost of those fixes, and how quickly they’ll be done
  • What will happen if something isn’t fixed – whether you can reject a deliverable, terminate the contract, or choose to sign off on the risk

I am not a lawyer, so I’m not about to give you legal language to use. But I can tell you that organizations have successfully included these issues in contracts – and as noted in Veracode’s latest State of Software Security Report, those that had a formal process for requiring software testing across the board had nearly ten times the participation from their vendors than in organizations that just requested it piecemeal.

Chris Wysopal and I will be talking more about this in our webinar on Thursday, November 29th, so join us, and bring your questions and ideas – so that you’ll be able to start your own revolution.

Click to Register for the Webinar Here!

About Wendy Nather

Wendy Nather is Research Director, Security, within 451 Research's Enterprise Security Program, providing analysis on the current state of security from the perspective of a veteran CISO. Wendy's primary areas of coverage are application security, identity and access management, threat intelligence, and security services. Follow Wendy on Twitter here.

Comments (0)

Please Post Your Comments & Reviews

Your email address will not be published. Required fields are marked *

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.