2022
DOI: 10.2172/1901825
|View full text |Cite
|
Sign up to set email alerts
|

Towards Software Bill of Materials in the Nuclear Industry

Abstract: Large, modern industrial facilities often incorporate thousands of digital assets in their operational technology. Regulated facilities, such as nuclear power plants (NPPs), maintain robust cybersecurity and configuration management programs that often use bills of materials (BOMs) for these assets, including make, model, and version of hardware, firmware, and software. However, these BOMs typically capture only first-or second-tier information provided by the original equipment manufacturer (OEM). Unfortunate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
0
0
Order By: Relevance
“…Cyber risk is a combination of threats, exploits, and vulnerabilities regarding cyber risk management. Adopting the Software Bill of Materials (SBOM) (CISA, 2022;Elias and Hewitt-Jones, 2023;CycloneDX, 2023;Dependency-Track, 2023;Eggers et al, 2022;NIST, 2023b;NTIA, 2023;Carmody et al, 2021) in the United States marks a watershed milestone in this field. Nonetheless, the sheer volume of possible vulnerabilities revealed by SBOMs highlights the critical need for risk management automation.…”
Section: Cybersecurity Assurancementioning
confidence: 99%
“…Cyber risk is a combination of threats, exploits, and vulnerabilities regarding cyber risk management. Adopting the Software Bill of Materials (SBOM) (CISA, 2022;Elias and Hewitt-Jones, 2023;CycloneDX, 2023;Dependency-Track, 2023;Eggers et al, 2022;NIST, 2023b;NTIA, 2023;Carmody et al, 2021) in the United States marks a watershed milestone in this field. Nonetheless, the sheer volume of possible vulnerabilities revealed by SBOMs highlights the critical need for risk management automation.…”
Section: Cybersecurity Assurancementioning
confidence: 99%
“…Although the number of records was very limited, the results were extremely interesting. We discovered that VEX has been considered for use in the US Nuclear Industry [6], for resolving software supply chain insecurities in vehicles [7], and the most interesting document was a Bachelors thesis on the 'Development of an API to request security advisories for CSAF 2.0' [8]. The document is surprisingly detailed, and given more time, this effort could have solved the CBOM/VEX integration and automation problem.…”
Section: Data Sourcesmentioning
confidence: 99%