• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»How Google Cloud is protecting the software supply chain in its increasing complexity
Security

How Google Cloud is protecting the software supply chain in its increasing complexity

October 12, 2022No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How Google Cloud is protecting the software supply chain in its increasing complexity
Share
Facebook Twitter LinkedIn Pinterest Email

Did you miss a session from MetaBeat 2022? Head over to the on-demand library for all of our featured sessions here.


The software supply chain is not linear or simplistic: It is made up of many different components introduced at different times and in different phases. 

And, today’s software supply chains only continue to grow in complexity — a mix of proprietary, open-source and third-party code, configurations, binaries, libraries, plugins and other dependencies.

“Organizations and their software delivery pipelines are continually exposed to growing cyberattack vectors,” said Michael McGrath, VP of engineering, application ecosystem at Google Cloud.

Coupled with the “massive adoption” of open-source software, which now powers nearly all public infrastructure and is highly prevalent throughout proprietary software, “businesses around the world are more vulnerable than ever,” said McGrath. 

Event

Low-Code/No-Code Summit

Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.

Register Here

Thus, it is imperative for development and IT teams to secure supply chains across code, people, systems and processes — all of which contribute to software development and delivery, he said. To help organizations in the ongoing fight against cybercriminals, Google Cloud is today unveiling Software Delivery Shield (SDS). The tech giant will introduce the new end-to-end software supply chain security platform at Google Cloud Next ‘22. 

[Follow VentureBeat’s ongoing Google Cloud Next 2022 coverage »]

Ultimately, “today’s organizations need to be more vigilant in protecting their software development infrastructure and processes,” said McGrath. 

An increasingly complicated challenge to protect the software supply chain

A software supply chain attack occurs when a cyberthreat actor infiltrates a vendor’s network and employs malicious code to compromise software before the vendor sends it to customers, according to the National Institute of Standards and Technology (NIST). This compromised software, in turn, makes the customer’s data vulnerable.

See also  VMware and IBM forge closer ties to build industry-specific hybrid cloud services

In a recent study by Anchore, 62% of organizations surveyed were impacted by software supply chain attacks. Similarly, a study by Argon Security found that software supply chain attacks grew by more than 300% in 2021 compared to 2020. 

Attacks on open-source supply chains are of particular concern, with one report finding that open-source breaches increased by 650% in 2021. Furthermore, an annual survey by the Synopsys Cybersecurity Research Center revealed that 97% of codebases contained open-source components. It also found that 81% of those codebases had at least one known open-source vulnerability and 53% contained license conflicts. 

Undoubtedly one of the most notorious open-source attacks was SolarWinds, which began in 2020 and compromised enterprises and government entities alike — prompting a software bill of materials (SBOM) directive by President Biden. There was also the widespread, crippling Log4Shell vulnerability in the Log4j open-source library, which continues to be pervasive. 

“Software supply chain security is a complicated challenge,” said McGrath. 

He pointed out that attacks can take “many shapes and forms” all along the software supply chain, with common attack vectors being source threats, build threats and dependency threats. 

Five critical areas

To help combat this, the new SDS tool offers a modular set of capabilities to help developers, devops and security teams build secure cloud applications. The tool spans across Google Cloud services, from developer tooling to runtimes like Google Kubernetes Engine (GKE), Cloud Code, Cloud Build, Cloud Deploy, Artifact Registry and Binary Authorization (among others). 

Its capabilities cover five different areas to protect the software supply chain:

  • Application development
  • Software “supply”
  • Continuous integration (CI) and continuous delivery (CD)
  • Production environments
  • Policies

As McGrath explained, SDS allows for an incremental adoption path so that organizations can tailor it and select the tools best suited to their existing environment and security priorities.

Shifting security left

Critical to SDS is Cloud Workstations, a new service that provides fully managed development environments on Google Cloud. It features built-in security measures such as VPC Service Controls (which define security perimeters around Google Cloud resources), no local storage of source code, private ingress/egress, forced image updates and identity access management (IAM) access policies. 

See also  Google iOS power user tricks from the company's iPhone lead

This all helps address common local development security pain points like code exfiltration, privacy risks and inconsistent configurations, McGrath explained. 

With Cloud Workstations, developers can ultimately access “secure, fast, and customizable development environments via a browser anytime and anywhere, with consistent configurations and customizable tooling,” said McGrath. 

At the same time, IT and security administrators can provision, scale, manage and secure development environments on Google Cloud’s infrastructure. 

This “plays a key role in shifting security to the left by enhancing the security posture of the application development environment,” said McGrath. 

SDS further allows devops teams to store, manage and secure build artifacts in Artifact Registry and detect vulnerabilities with integrated scanning provided by Container Analysis. This scans base images and now performs on-push vulnerability scanning of Maven and Go containers and for non-containerized Maven packages.

Open-source accountability

Another critical step in improving software supply chain security: Securing build artifacts and application dependencies. 

“The pervasive use of open-source software makes this problem particularly challenging,” said McGrath. 

To help address this, earlier this year Google introduced its Assured Open Source Software (AOSS) service, its first “curated” open-source service that aims to add a layer of accountability to today’s free or “as-is” open source. This is a key part of SDS, providing access to more than 250 curated and vetted open-source software packages across Java and Python, McGrath explained. 

These packages are built into Google Cloud’s secured pipelines and are “regularly scanned, analyzed and fuzz-tested for vulnerabilities,” he said. 

AOSS also automatically generates SBOMs, which inventory all components and dependencies involved in app development and delivery and identify potential risks.

See also  Cloud security should be data-centric, says data protection provider Theom

Enforcing software supply chain validation

Another way that bad actors can attack software supply chains is by compromising CI/CD pipelines. 

To address this, SDS is integrated with Cloud Build, Google Cloud’s fully managed CI platform, and Cloud Deploy, its fully managed CD platform. These platforms come with built-in security features including granular IAM controls, isolated and ephemeral environments, approval gates and VPC service controls. These tools allow devops teams to better govern the build and deployment process, explained McGrath. 

Strengthening the security posture of the runtime environment is another crucial element in protecting the software supply chain. GKE protects applications while they are running; the tool features new built-in security management capabilities to help identify security concerns in GKE clusters and workloads, said McGrath.

These include detailed assessments, assignment of severity ratings and advice on the security posture of clusters and workloads, he explained. The GKE dashboard now points out which workloads are affected by a security concern and provides actionable guidance to address them. These concerns are logged and security event information can be routed to ticketing systems or a security information and event management (SIEM) system.

Meanwhile, Binary Authorization requires images to be signed by trusted authorities during the development process, and signature validation can be enforced during deployment. 

By enforcing validation, teams can gain tighter control over the container environment by ensuring that only verified images are integrated into the build-and-release process, explained McGrath. 

Google Cloud’s new offering is in response to widespread cries across industry, he said. “Development and IT teams are all asking for a better way to secure the software supply chain across the code, people, systems, and processes that contribute to development and delivery of the software,” he said.

Source link

chain Cloud complexity Google increasing Protecting software Supply
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Google Pixel 7 vs Asus Zenfone 10: Which is the better buy?

November 9, 2023

Google Pixel Fold vs Samsung Galaxy Z Fold 5: Which is the better buy?

November 8, 2023

Google Pixel 7a vs Nothing Phone (2): Which is better?

November 6, 2023

Samsung Galaxy A34 vs Google Pixel 6a review

October 30, 2023
Add A Comment

Comments are closed.

Editors Picks

Google and the US government partner to make open source chips

September 16, 2022

Turn ChatGPT Into Your Personal AI Business Coach With This Powerful Prompt

June 27, 2023

iOS 15 beta hands-on: 300+ changes and features [Video]

July 5, 2022

Teslagrad 2 is coming out in Spring 2023

August 27, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.