Enterprise Business - Checklist to verify your Software Vendors

 Introduction 

Businesses cannot run without software, So every business in the wild is vulnerable to Cyber Attacks. It is important to know your Vendor, similar to how you are protecting your infrastructure. A Software product supplied by a vendor can expose significant Attack Surfaces to the wild. This is the classic Supply Chain Attack. How can Enterprises make sure the vendors are maintaining their software vendors and products are secured against Hackers. This post can help you check the list and maintain the integrity of your environment. 


Know Your Vendor

"Know Your Vendor" is a right to every customer who are using the Vendor's product. You can ask any number of questions and then decide on a Vendor. I herewith summarize the following points which I have seen customers asking me before installing our products and also from my own experience. 

  • What level of Permission does the Software take to run on the system.
    • root/SYSTEM privileges shouldn't be given unless absolutely required
  • Does the software has access to your Active Directory
  • What Database version is the software using, is it installed in your environment
  • Where are the credentials getting stored. Are they encrypted 
  • Does the software needs credentials of the users. If so why (avoid this step)
  • How many Process will the software start 
  • Will the software open any new port. 
  • If it's a cloud to on-premise communication, the communication should be vice-versa. It should be from Installed product to the cloud environment.
  • How frequently will the software update their software
  • What is the Encryption Standard in use 
  • Are the data encrypted 
  • Get the Pentest Report for the product in last 6 months 
  • Do they run SAST, DAST against the product. (IAST is optional)
  • How the code review happens
  • How the Build Process takes place. 
  • From Code pushing to Build Generation to Static endpoint, every point should be automated and no manual intervention should happen
  • Is Command Execution Supported as a feature 
  • What are the software bundles getting downloaded
  • Don't allow downloading of fat softwares(components which are not used). Check with the Vendor and get a lean version of software (only the bundles which are absolutely necessary). - This will be given as per request 

Conclusion

Enterprise Business software are ruling the world but it's absolutely important to know what is right and wrong for your Enterprise. Have this checklist filled by your vendor. Check for the recent CVEs found on the product. If there are too many, then be doubtful of the product being used. Make sure, the data obtained will not be used for any other purposes. Take "Assume Breach" approach to choosing software vendor. The software can be compromised by Attackers, and if being attacked and compromised, is your environment safe and resilient. Check this and stay safe.

Comments

Popular posts from this blog

Security Score Card using Nuclei Automation

Extracting Dynamic Values from Multiple Requests in a Nuclei Template

How I used Nuclei to Automate Basic Security Checks