RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyOctober 3, 2024

Get Ahead of CISA's New Software Security Acquisition Requirements

How Spectra Assure helps accelerate compliance with new requirements.

Charlie Jones black and white headshot
Charlie JonesCharlie Jones
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
closeup of the word acquire in a dictionary

On August 1 2024, the CISA-led ICT Supply Chain Risk Management Task Force published a Software Acquisition Guide. This document outlines key questions that an enterprise buyer of software can ask to better govern security risk of their vendors. Despite being targeted at government agencies, the guide can be leveraged by any organization that is looking to procure software in a safe manner.

What is the goal of the new guide?

Through this guide, CISA aims to define a list of controls enterprise software buyers can use to understand the security risk presented by a prospective suppliers’ product or service. By clarifying the residual risk exposure accompanied by a new software package, acquiring organizations can make more informed contractual amendments or service-level agreements (SLAs) to ensure their software vendors uphold strong security practices throughout the lifecycle of the product/service provisioning.

The controls can be found in the published PDF guide, as well as within the accompanying Excel file for more convenient vendor distribution and completion.

Introducing ‘Secure by Demand’

Another new security concept the guide introduces is Secure by Demand. This builds on existing software development practices of Secure by Design and Secure by Default with a consumer twist. This emerging principle captures the increasing enterprise demand for transparency into the make-up and security of third party software they rely on to run their business. More details about Secure by Demand, including the complementary guide published by CISA, can be found in RL’s recent blog, Secure by Demand: Key takeaways for enterprise software buyers.

How Can ReversingLabs Help?

ReversingLabs is uniquely suited to help software vendors and buyers get ahead of the US government's security requirements spelled out in CISA’s new Software Acquisition Guide. ReversingLabs Spectra Assure™ generates shareable audit artifacts that demonstrate the vendor's software product was evaluated in its final state prior to distribution or deployment. The Spectra Assure SAFE report delivers a comprehensive software bill of materials (SBOM), describes any known risks or threats that were uncovered during analysis (such as malware, tampering, malicious behaviors, exposed secrets, vulnerabilities and more), and proposes mitigation strategies to address them.

Below we explore the control categories from CISA’s Software Acquisition Guide, which Spectra Assure can help contribute to achieving, in an effort to help both software vendors and buyers accelerate compliance.

Governance: In the context of software supply chain security, vendor governance controls are vital to reduce any software assurance knowledge gaps that may exist between a supplier of a software-based product and those in the acquisition and procurement process.

governance guide of spectra assure software

Supply Chain: Software is composed of, or reliant upon, open source, custom-developed, or third-party libraries. As these libraries get packaged into commercial off-the-shelf (COTS) software, downstream consumers lose visibility into the building blocks of applications that often support critical business processes. Reduced visibility into your software means less control, leading to difficulties managing the inevitable security risks that will emerge and maintaining business agility in resulting crisis scenarios (e.g. Log4j). Enforcing such supply chain requirements can help organizations regain visibility and control over the components which make up their software ecosystem.

supply chain spectra assure

Secure Deployment: Post acquisition, organizations are tasked with the deployment of procured software solutions within their existing on-premise or cloud based infrastructure. Controls within this section represent the operational activities which are required to successfully integrate a third-party software solution to enable safe business use.

secure deployment on spectra assure

Secure Development: Development organizations have an obligation to ensure the software they publish is safe to use prior to release. Secure development controls represent a set of security stage gates required to successfully detect and subsequently mitigate the likelihood and impact of a software supply chain attack to build trust with downstream enterprise customers.

secure development spectra assure

Vulnerability Management: Vulnerabilities in software are a constant threat to organizations and individuals, often due to an outdated software component, a bug or some other flaw in the software. Depending on their severity, they may present significant gaps or opportunities for malicious actors to access your systems and sensitive information, as well as cause harm to your organization. People, processes, and technology must be adopted to effectively detect and manage vulnerabilities identified in custom developed and third party software.

vulnerability management spectra assure

When push comes to shove

We have encountered an age where security questionnaires have now transitioned into security demands. Although these new guidelines can be daunting for both software publishers and enterprise buyers, automated supply chain security solutions like Spectra Assure can serve as the primary control to ensure safe software is procured in an efficient and scalable manner.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses
Polyglot File Examination with Spectra Analyze

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top