To overcome the growing risk of software system supply chains being infiltrated, a new technology enables system providers to be assured of the security, integrity, and provenance of their software components, even when sourced from a wide range of suppliers.

Protect from malware infiltrating software development supply chains. Image description: blue light digital folders moving information between them.

Background

As software systems are becoming increasingly more complex – involving hundreds or even thousands of components from multiple different suppliers – there is likewise an ever-growing challenge in protecting the supply chain from being infiltrated, with a corresponding significant increase in risk and cost. 

The cost of these infiltrations by adversaries is predicted to reach nearly $138bn by 2031 (2023 Software Supply Chain Attack Report). These infiltrations are already happening – in one example (SolarWinds 2020), a supply chain infiltration resulted in over 18,000 customers installing malicious code as part of an automatic update, which enabled the attackers to access the customers’ systems.  

It was essential to find an effective solution to protect customers, cost, and business reputation. 

The solution

Developed by Dstl, a new technology provides continuous assurance of the provenance of the software components within a system, and assurance that the supply chain integrity has not been compromised.

The technology has been built following and expanding the scope of the Zero Trust Principles, so that the integrity of all artefacts (e.g. software and documentation) is validated every time it is used. This technology also utilises the Data Centric Security (DCS) approach, which ensures that each artifact’s provenance is cryptographically secured (encrypted).

By combining these two principles, this technology ensures that compromised software is detected and both the point of entry (e.g. a software vulnerability) and its provenance can be traced to an individual supplier. This system is modular, and provides an unprecedented level of visibility and assurance, even across the most complex supply chains.

To date, a minimum viable product of this technology has been built.

Key benefits

  • This technology provides assurance of the confidentiality, integrity, availability, provenance of artifacts at every level in the software supply chain.
  • The modular system provides greater flexibility and supports straightforward expansion as the supply chain grows.
  • A decentralised approach reduces management overhead and complexity when deployed across a large set of suppliers.
  • The approach leverages the latest advanced techniques in Zero Trust and Data Centric Security.
  • There is potential to save significant costs (reducing from a global total risk of $138bn by 2031).
Be continually assured of the provenance of the software components within a system. Image description: Three computer screens with blue light security imagery.

Potential applications

This technology has broad applicability across multiple market sectors and user groups.  

Defence applications. Image description: a graphic of digital security.

Defence applications

For MOD – where systems can be made up of hundreds or even thousands of artefacts, and consequently requires a large number of suppliers – this technology can provide a secure development environment providing assurance of the overall system and building trust between suppliers. The modular nature of the technology supports its deployment across large-scale environments.  

Software systems developers

For software system developers managing their own development environments, this approach gives assurance of the many artefacts across the system, and a level of confidence that they have not been compromised by an attacker. This enables them to give their customers some assurance about the security and resilience of the software supply chain, and that it has not been compromised.

Software systems developers application. Image description: software coding.
System integrators application. Image description: a digital graphic with multiple digital and security icons over a bird's eye view of an environment.

System integrators

For systems integrators, who are bringing together software components from multiple suppliers, this approach provides assurance of the integrity of a supply chain, which they may have little or no visibility into. This also enables that assurance of supply chain integrity to be passed on to their customers.

Speak to us about licensing

If you would like to discuss this technology or collaboration opportunities with our team, please get in touch below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.