Remko and Ralph,

 

               I’m currently providing materials to NIST on updates to the 
draft C-SCRM standard SP 800-161 R2 Appendix F 
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1-draft2.pdf>
  to meet Cybersecurity Executive Order 14028 
<https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity>
 . The final version of SP 800-161 is expected to be published in early 
February 2022 with implementations starting in late Summer 2022. One of the 
requirements of EO 14028 is to provide the US Govt with NTIA compliant SBOM’s 
and vulnerability reports. 

               During discussions within the NTIA SBOM initiative the topic of 
vulnerability reporting was discussed, but was considered out of scope for the 
SBOM charter. The Vulnerability Exchange (VEX) initiative was discussed as a 
possible vulnerability reporting solution and a VEX profile was added to the 
OASIS CSAF initiative. The problem with VEX is that it reports vulnerabilities 
at the product level, i.e. Log4j-core but there is no direct correlation to 
SBOM’s that contain this component. 

That’s when I began to work on an open-source SBOM Vulnerability Disclosure 
Report (VDR) XML schema that lists CVE’s at the component level of a product 
SBOM. This will enable government entities to automate the processing of 
Vulnerability Disclosure Reports based on SBOM component level vulnerabilities 
in order to meet EO 14028 requirements. 

 

The open source SBOM VDR XML schema and an example VDR report are available 
online:

https://www.einpresswire.com/article/559309448/updated-open-source-sbom-vulnerability-disclosure-report-format-for-rapid-risk-assessment-and-response?ref=email
 
<https://www.einpresswire.com/article/559309448/updated-open-source-sbom-vulnerability-disclosure-report-format-for-rapid-risk-assessment-and-response?ref=email&code=Kg7BjRgTJ3VzyWI6&utm_source=NewsletterPR&utm_medium=email&utm_campaign=All+Featured+Press+Releases&utm_content=article>
 
&code=Kg7BjRgTJ3VzyWI6&utm_source=NewsletterPR&utm_medium=email&utm_campaign=All+Featured+Press+Releases&utm_content=article
 

 

NOTE: There is a possibility that NIST will choose another vulnerability 
reporting format in the final release of SP 800-161 in 2/2022, however, the 
SBOM VDR is currently the only open source option available that reports CVE’s 
at the SBOM component level, to my knowledge.

 

Thanks,

 

Dick Brooks



 <https://reliableenergyanalytics.com/products> Never trust software, always 
verify and report! ™

 <http://www.reliableenergyanalytics.com/> 
http://www.reliableenergyanalytics.com

Email:  <mailto:[email protected]> 
[email protected]

Tel: +1 978-696-1788

 

From: Remko Popma <[email protected]> 
Sent: Thursday, December 30, 2021 5:46 PM
To: Apache Logging Developers List <[email protected]>; Dick Brooks 
<[email protected]>
Subject: Re: Forwarding email per Matt Sicker suggestion

 

 

On Tue, Dec 21, 2021 at 2:41 AM Ralph Goers <[email protected] 
<mailto:[email protected]> > wrote:

Thanks Dick,

I am totally unfamiliar with this. Is there somewhere to read about what this 
is all about?

Ralph

 

Resending, including Dick in the recipients.

 


> On Dec 20, 2021, at 7:18 AM, Dick Brooks <[email protected] 
> <mailto:[email protected]> > wrote:
> 
> Hello,
>  
> This sort of suggestion would be better sent to our development mailing list 
> ([email protected] <mailto:[email protected]>  
> <mailto:[email protected] <mailto:[email protected]> >). I’ll note 
> that we use Apache Maven for our build system, and a quick search shows that 
> <https://github.com/CycloneDX/cyclonedx-maven-plugin 
> <https://github.com/CycloneDX/cyclonedx-maven-plugin>> might be a useful 
> plugin to propose for generating the SBOM as part of our standard release 
> process. I do think it’s a good idea, but this topic should be discussed in 
> our public list and not on the private list.
> --
> Matt Sicker 
> 
> 
> On Dec 19, 2021, at 12:48, Dick Brooks <[email protected] 
> <mailto:[email protected]>  
> <mailto:[email protected] 
> <mailto:[email protected]> >> wrote:
>  
> I’ve created an SPDX SBOM for Log4j V 2.17.0-core along with a companion 
> baseline vulnerability disclosure report (VDR), based on NIST NVD search 
> results:
> https://github.com/rjb4standards/REA-Products/tree/master/Log4jUseCase 
> <https://github.com/rjb4standards/REA-Products/tree/master/Log4jUseCase>
>  
> Please read the README.md first to understand the limitations of this info.
>  
> I encourage the Log4j team to consider updating the FixStatus and 
> AnalysisFindings elements for each reported CVE. I’m happy to assist in this 
> effort.
>  
> Thanks,
>  
> Dick Brooks
> <image001.png>
> Never trust software, always verify and report! 
> <https://reliableenergyanalytics.com/products> ™
> http://www.reliableenergyanalytics.com 
> <http://www.reliableenergyanalytics.com/>
> Email: [email protected] 
> <mailto:[email protected]>  
> <mailto:[email protected] 
> <mailto:[email protected]> >
> Tel: +1 978-696-1788
>  
>  
>  
> Thanks,
>  
> Dick Brooks
> 
> Never trust software, always verify and report! 
> <https://reliableenergyanalytics.com/products> ™
> http://www.reliableenergyanalytics.com 
> <http://www.reliableenergyanalytics.com/>
> Email: [email protected] 
> <mailto:[email protected]>  
> <mailto:[email protected] 
> <mailto:[email protected]> >
> Tel: +1 978-696-1788

Reply via email to