The report sheds light on what companies like Adobe, Juniper, EMC and Microsoft are doing to bake security into their code. Given Adobe's troubles, the process remains a challenge. A new report from the Software Assurance Forum for Excellence in Code (SAFECode) sheds new light on how vendors are trying to work more secure coding into the product development process.The vendors contributing to the report are SAFECode members who have enjoyed some success in reducing the frequency of attacks against its technology, including EMC Corp., Juniper Networks, SAP and Microsoft. But the organization also includes companies that continue to have an uphill climb, most notably Adobe Systems.Also see “Code security: A survival guide”Despite its efforts to write more ironclad software, Adobe has taken heavy criticism for the number of vulnerabilities attackers have been able to exploit. In a recent interview with CSO, Adobe security chief Brad Arkin admitted the company has a lot of work to do, but that part of the problem is the wide attack surface that comes with a technology almost everyone uses. In an interview with CSO last week, SAFECode Executive Director Paul Kurtz acknowledged that 100 percent secure code may be impossible to achieve, and that companies will always deal with some level of vulnerability. But, he said, the new report at least offers a roadmap of examples other companies can use to make their own development procedures better than they are now.“Software assurance is most commonly discussed in terms of security engineering, or in other words, building security into the software as it is being developed,” he said. “But another important aspect of assurance is securing the supply chain processes for software sourcing, development and distribution to protect the integrity of delivered software.” SAFECode’s latest paper deals specifically with this area and represents the first industry-led effort to identify and analyze the software integrity controls used by software vendors to protect software from the insertion of vulnerabilities as it moves along the global supply chain, he added.Among the actions worth pursuing to improve security in the supply chain, SAFECode members recommend:Vendor contracts that include stronger language on the responsibilities and expectations of vendors and suppliers. “The written agreement must explicitly state the expectations as well as the consequences of any non-compliance with the terms of the agreement,” the report said.Vendor technical integrity controls for suppliers that address everything from secure transfer of code, sharing of system and network resources, malware scanning and secure storage.More rigorous security testing with static code analysis tools, network and web application vulnerability scanners, binary code analysis tools, malware detection tools that can discover such problems as backdoor holes; and security compliance validation tools.The report reflects a growing trend in the infosec community that relies less on bolt-on defenses and more on well-written software code. The code security trend is reflected inthe Rugged software movement;BSIMM, the Building Security In Maturity Model;Microsoft’s Security Development Lifecycle (SDL);the growth of OWASP, the Open Web Application Security Project;and the emergence of new secure application development certifications such as the CSSLP from ISC2. Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe