Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Strength training options: Free weights, machines, resistance bands and bodyweight

July 5, 2025

Joyful Parisians take a historic plunge into the Seine after 100 years

July 5, 2025

What to know about Fourth of July holiday origins and traditions

July 4, 2025
Facebook X (Twitter) Instagram
Trending
  • Strength training options: Free weights, machines, resistance bands and bodyweight
  • Joyful Parisians take a historic plunge into the Seine after 100 years
  • What to know about Fourth of July holiday origins and traditions
  • Want to take a dip in Paris? River Seine reopens to public swimming for first time in a century
  • American Legion Post 82 in Nashville blends veterans’ support with live music
  • NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum
  • Denny’s and Waffle House remove egg surcharges as prices fall
  • One Tech Tip: Get the most out of ChatGPT and other AI chatbots with better prompts
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Saturday, July 5
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » UK Government Report Calls for Stronger Open Source Supply Chain Security Practices
Cybersecurity

UK Government Report Calls for Stronger Open Source Supply Chain Security Practices

adminBy adminMarch 11, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 58


A UK government analysis of current best practices for OSS and supply chain risk management finds weaknesses in current standards and makes five recommendations to improve matters.

The Department for Science, Innovation & Technology (DSIT) has published a report (PDF) titled Open source software best practice and supply chain risk management. It finds weaknesses in current practices and makes recommendations on how to improve things.

The weaknesses include a lack of industry-specific practices (affecting both sector and company size), no consensus on managing OSS components, no formal process for judging OSS component trustworthiness, and the outsized influence of large tech companies on the OSS ecosphere.

The first is both horizontal and vertical. Horizontally, “Outside highly regulated industries, there is a lack of guidance on how to manage OSS components in specific industries, such as education.” Vertically, current best practices do not adequately reflect the limited resources of smaller companies.

This leads naturally to the second problem. “Although best practices are broad, we found there was a lack of consensus on the best approach to managing OSS components,” says the report.

The third issue is the lack of a formal process for judging trustworthiness. “We found that each developer uses their own trust model and that there is no documented process for evaluating the trustworthiness of OSS components within an organization.”

The fourth is a problem that affects all areas of business – the influence and actions of large companies can have a detrimental effect on smaller companies. The OSS ecosphere is no longer solely occupied by small companies and independent coders. Big tech companies are increasingly involved.

“Due to these companies’ financial backing and resources, they have been able to exert a significant influence on the open-source community.” The result is that OSS influenced by big company impositions does not always reflect the real world use of OSS. It can also sideline smaller OSS contributors and dampen innovation.

Advertisement. Scroll to continue reading.

Working from its analysis, the report then makes four recommendations on how to develop in-house best practices, plus another recommendation on how to make the process actionable. These recommendations are to establish an internal OSS policy; to develop an SBOM; to implement continuous monitoring; to engage with the OSS community; and to use tooling to make it all easier.

Policy. “We recommend that all organizations establish an internal OSS policy that details the criteria for evaluating the trustworthiness and maturity of OSS components,” declares the report. It notes that this should not be overly proscriptive, which could stifle innovation and the use of OSS, and it should be sufficiently nuanced to handle the different levels of scrutiny required by different projects.

It specifically suggests the policy should include a list of acceptable licenses, an approved open source list, the criteria for evaluating the trustworthiness and maturity of OSS components, the security level of the project to guide the necessary stringency of applying the policy, and an approval process that must be met before an OSS component can be used.

SBOM. Companies should develop an SBOM for their own software products. ‘This will provide a clear understanding of the software supply chain and help in enforcing an internal OSS policy.”

Continuous monitoring. “It is important to continuously monitor the software supply chain for vulnerabilities, licensing issues, and new versions of OSS components.” The Equifax breach via a known vulnerability in Apache Struts is an example of not adequately doing so – but also highlights the necessity of monitoring where the OSS is used.

Community engagement. The report suggests it is important to engage with the OSS community. “Fostering a culture of community engagement can be achieved through various activities, including contributing to OSS projects, participating in community events, or providing financial support to OSS projects.” 

The result can raise the quality of a company’s own internal developers and attract new hires and can increase the quality of the OSS components.

Use tooling. The final recommendation is in recognition of how difficult and time consuming all this can be. “Tooling can be used to automate the process of managing OSS components, can be used to enforce an internal OSS policy, perform automated and continuous monitors, and generate and maintain an SBOM. This will significantly reduce the burden on developers and ensure that the SBOM is always up-to-date, and the organization complies with the internal OSS policy.”

This DSIT report analyzes the current approach to OSS best practices, highlights the weaknesses, and then proposes how they can be overcome. “We strongly agree with DSIT,” comments Glenn Weinstein, CEO at Cloudsmith. “This write-up zeroes in on the real issues facing enterprises when they consume open-source software. 

The recommended best practices are spot-on… I particularly appreciate how the authors describe OSS security as a shared responsibility between security teams, who create and curate trusted repositories with quality-oriented policies, and individual developers, who shouldn’t have to make judgment calls on whether a particular package is okay to use.”

Related: Cyber Insights 2025: Open Source and Software Supply Chain Security

Related: OpenSSF Releases Security Baseline for Open Source Projects

Related: Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST

Related: NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum

July 3, 2025

A volunteer helping a client collect their grocery bag at the Holy Apostles Soup Kitchen…

Jeff Bezos Ties The Knot—And Sells $737 Million In Stock

July 2, 2025

Here’s How Much The Bezos-Sánchez Wedding Extravaganza Really Cost

June 29, 2025

Wedding Protesters Say Bezos Should Pay More Tax. Here’s How Much He Likely Did Pay

June 28, 2025
Our Picks

Strength training options: Free weights, machines, resistance bands and bodyweight

July 5, 2025

Joyful Parisians take a historic plunge into the Seine after 100 years

July 5, 2025

What to know about Fourth of July holiday origins and traditions

July 4, 2025

Want to take a dip in Paris? River Seine reopens to public swimming for first time in a century

July 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.