2022
DOI: 10.1007/978-3-030-92317-4_4
|View full text |Cite
|
Sign up to set email alerts
|

SolarWinds Software Supply Chain Security: Better Protection with Enforced Policies and Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…While the existence of malicious packages in different ecosystems is well-known [31], popular packages from reliable sources can also be compromised, such as through: (1) hijacking of a maintainer's account; (2) a maintainer going rogue; (3) account handover through social engineering; and (4) build system compromise. [31,40] Therefore, practitioners are now recommended to review dependency updates before merging them into the codebase [3,39], as the responsibility of security lies on the consumer when using free open-source code [38]. However, manually reviewing all the code changes in each update may not be a practical solution, as projects may have hundreds of direct and transitive dependencies [24,34].…”
Section: Introductionmentioning
confidence: 99%
“…While the existence of malicious packages in different ecosystems is well-known [31], popular packages from reliable sources can also be compromised, such as through: (1) hijacking of a maintainer's account; (2) a maintainer going rogue; (3) account handover through social engineering; and (4) build system compromise. [31,40] Therefore, practitioners are now recommended to review dependency updates before merging them into the codebase [3,39], as the responsibility of security lies on the consumer when using free open-source code [38]. However, manually reviewing all the code changes in each update may not be a practical solution, as projects may have hundreds of direct and transitive dependencies [24,34].…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, second factors can also be bypassed, for example, by phishing [11] and push notifications [20]. Consequently, authentication attempts and all other steps within the authentication lifecycle have to be monitored [31] to identify attacks, such as what happened at FireEye in the case of SolarWinds' Orion attack [29,45]. In addition, users might try to avoid 2FA or apply less secure user behavior, such as sharing 2FA tokens due to usability issues, resulting in reduced security [7].…”
mentioning
confidence: 99%