2024软件供应链安全风险现状报告组织的应对措施调查 英文版 .docxVIP

  • 0
  • 0
  • 约5.15万字
  • 约 44页
  • 2026-02-10 发布于浙江
  • 举报

2024软件供应链安全风险现状报告组织的应对措施调查 英文版 .docx

TheStateofSoftwareSupplyChainSecurityRisks

SponsoredbyBlackDuckIndependentlyconductedbyPonemonInstituteLLCPublicationDate:May2024

PonemonInstitute?ResearchReport

TheStateofSoftwareSupplyChainSecurityRisksPreparedbyPonemonInstituteMay2024

Part1.Introduction

Thepurposeofthisresearchistounderstandhowpreparedorganizationsareinreducingsoftwaresecurityrisksinthesupplychain.SponsoredbyBlackDuck,PonemonInstitutesurveyed1,278ITandITsecuritypractitionerswhoareinorganizationsthatarecommittedtoachievingasecuresoftwaresupplychainandhavesomelevelofresponsibilityfortheirorganizations’softwaresupplychainsecuritystrategy.TheregionsandcountryinthisresearchareNorthAmerica(613respondents),EMEA(362respondents)andJapan(303respondents).

AccordingtotheNationalInstituteofStandardsandTechnology(NIST),asoftwaresupplychainattackcanbeassophisticatedasmalwareinjectionorassimpleasanopportunisticexploitationofanunpatchedvulnerability.Themaliciouscodethenendsupinanorganization’ssystemandmayallowthehackertogainaccesstosensitivedataorcompromiseitscodetogainaccesstocustomers.Thismayresultinaransomwareattackorothermaliciousincidents.Typically,attackersfindaweaklinkinthesupplychainanduseittomoveuporacrossthesupplychaintotheirrealtargets.

Vulnerabilitiesaretherootcauseofattacksagainstmanyofthesoftwaresupplychainsinthisresearch.Fifty-ninepercentoforganizationsinthisresearchhavebeenimpactedbyasoftwaresupplychainattackorexploitand54percentoftheserespondentssaytheattackshappenedinthepastyear.

AsshowninFigure1,28percentofrespondentssaytherootcauseoftheattackorexploitwasanunpatchedopensourcevulnerabilitypreviouslydetectedand23percentofrespondentssayitwastheresultofazerodayvulnerability.Fiftypercentoftheseo

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档