Best practices for a secure software supply chain

Open Source is everywhere. It is in many proprietary codebases and community projects. For organizations and individuals, the question today is not whether you are or are not using open-source code, but what open-source code you are using, and how much.

If you're not aware of what is in your software supply chain, an upstream vulnerability in one of your dependencies can be fatal, making you, and your customers, vulnerable to a potential compromise. In this document, we will dive deeper into what the term โ€œsoftware supply chainโ€ means, why it matters, and how you can help secure your projectโ€™s supply chain with best practices.

The State of the Octoverse 2020 - Open Source

Dependencies

The term software supply chain is used to refer to everything that goes into your software and where it comes from. It is the dependencies and properties of your dependencies that your software supply chain depends on. A dependency is what your software needs to run. It can be code, binaries, or other components, and where they come from, such as a repository or package manager.

It includes who wrote the code, when it was contributed, how it was reviewed for security issues, known vulnerabilities, supported versions, license information, and just about anything that touches it at any point of the process.

Your supply chain also encompasses other parts of your stack beyond a single application, such as your build and packaging scripts or the software that runs the infrastructure your application relies on.

Vulnerabilities

Today, software dependencies are pervasive. It is quite common for your projects to use hundreds of open-source dependencies for functionality that you did not have to write yourself. This may mean that most of your application consists of code that you did not author.

The State of the Octoverse 2020 - Dependencies

Possible vulnerabilities in your third-party or open-source dependencies, are presumably dependencies you cannot control as tightly as the code you write, which can create potential security risks in your supply chain.

If one of these dependencies has a vulnerability, the chances are you have a vulnerability as well. This can be scary as one of your dependencies may change without you even knowing. Even if a vulnerability exists in a dependency today, but is not exploitable, it can be exploitable in the future.

Being able to leverage the work of thousands of open-source developers and library authors means that thousands of strangers can effectively contribute directly to your production code. Your product, through your software supply chain, is affected by unpatched vulnerabilities, innocent mistakes, or even malicious attacks against dependencies.

Supply chain compromises

The traditional definition of a supply chain comes from manufacturing; it is the chain of processes required to make and supply something. It includes planning, supply of materials, manufacturing, and retail. A software supply chain is similar, except instead of materials, it is code. Instead of manufacturing, it is development. Instead of digging ore from the ground, code is sourced from suppliers, commercial or open source, and, in general, the open-source code comes from repositories. Adding code from a repository means your product takes a dependency on that code.

One example of a software supply chain attack occurs when malicious code is purposefully added to a dependency, using the supply chain of that dependency to distribute the code to its victims. Supply chain attacks are real. There are many methods to attack a supply chain, from directly inserting malicious code as a new contributor, to taking over a contributorโ€™s account without others noticing, or even compromising a signing key to distribute software that is not officially part of the dependency.

A software supply chain attack is in and of itself rarely the end goal, rather it is the beginning of an opportunity for an attacker to insert malware or provide a backdoor for future access.

The State of the Octoverse 2020 - Vulnerability Lifecycle

Unpatched software

The use of open source today is significant and is not expected to slow down anytime soon. Given that we are not going to stop using open-source software, the threat to supply chain security is unpatched software. Knowing that, how can you address the risk that a dependency of your project has a vulnerability?

  • Knowing what is in your environment. This requires discovering your dependencies and any transitive dependencies to understand the risks of those dependencies such as vulnerabilities or licensing restrictions.
  • Manage your dependencies. When a new security vulnerability is discovered, you must determine whether you are impacted, and if so, update to the latest version and security patch available. This is especially important to review changes that introduce new dependencies or regularly auditing older dependencies.
  • Monitor your supply chain. This is by auditing the controls you have in place to manage your dependencies. This will help you enforce more restrictive conditions to be met for your dependencies.

The State of the Octoverse 2020 - Advisories

We will cover various tools and techniques that NuGet and GitHub provides, which you can use today to address potential risks inside your project.

Knowing what is in your environment

NuGet dependency graph

๐Ÿ“ฆ Package Consumer

You can view your NuGet dependencies in your project by looking directly at the respective project file.

This is typically found in one of two places:

Depending on what method you use to manage your NuGet dependencies, you can also use Visual Studio to view your dependencies directly in Solution Explorer or NuGet Package Manager.

For CLI environments, you can use the dotnet list package command to list out your project or solutionโ€™s dependencies.

For more information on managing NuGet dependencies, see the following documentation.

GitHub dependency graph

๐Ÿ“ฆ Package Consumer | ๐Ÿ“ฆ๐Ÿ–Š Package Author

You can use GitHubโ€™s dependency graph to see the packages your project depends on and the repositories that depend on it. This can help you see any vulnerabilities detected in its dependencies.

For more information on GitHub repository dependencies, see the following documentation.

Dependency versions

๐Ÿ“ฆ Package Consumer | ๐Ÿ“ฆ๐Ÿ–Š Package Author

To ensure a secure supply chain of dependencies, you will want to ensure that all of your dependencies & tooling are regularly updated to the latest stable version as they will often include the latest functionality and security patches to known vulnerabilities. Your dependencies can include code you depend on, binaries you consume, tooling you use, and other components. This may include:

Manage your dependencies

NuGet deprecated and vulnerable dependencies

๐Ÿ“ฆ Package Consumer | ๐Ÿ“ฆ๐Ÿ–Š Package Author

You can use the dotnet CLI to list any known deprecated or vulnerable dependencies you may have inside your project or solution. You can use the command dotnet list package --deprecated or dotnet list package --vulnerable to provide you a list of any known deprecations or vulnerabilities.

GitHub vulnerable dependencies

๐Ÿ“ฆ Package Consumer | ๐Ÿ“ฆ๐Ÿ–Š Package Author

If your project is hosted on GitHub, you can leverage GitHub Security to find security vulnerabilities and errors in your project and Dependabot will fix them by opening up a pull request against your codebase.

Catching vulnerable dependencies before they are introduced is one goal of the โ€œShift Leftโ€ movement. Being able to have information about your dependencies such as their license, transitive dependencies, and the age of dependencies helps you do just that.

For more information about Dependabot alerts & security updates, see the following documentation.

NuGet feeds

๐Ÿ“ฆ Package Consumer

When using multiple public & private NuGet source feeds, a package can be downloaded from any of the feeds. To ensure your build is predictable and secure from known attacks such as Dependency Confusion, knowing what specific feed(s) your packages are coming from is a best practice. You can use a single feed or private feed with upstreaming capabilities for protection.

For more information to secure your package feeds, see 3 Ways to Mitigate Risk When Using Private Package Feeds.

Client trust policies

๐Ÿ“ฆ Package Consumer

There are policies that you can opt-into in which you require the packages you use to be signed. This allows you to trust a package author, as long as it is author signed, or trust a package if it is owned by a specific user or account that is repository signed by NuGet.org.

To configure client trust policies, see the following documentation.

Lock files

๐Ÿ“ฆ Package Consumer

Lock files store the hash of your packageโ€™s content. If the content hash of a package you want to install matches with the lock file, it will ensure package repeatability.

To enable lock files, see the following documentation.

Package Source mapping

๐Ÿ“ฆ Package Consumer

Package Source Mapping allows you to centrally declare which source each package in your solution should restore from in your nuget.config file.

To enable package source mapping, see the following documentation.

Monitor your supply chain

GitHub secret scanning

๐Ÿ“ฆ๐Ÿ–Š Package Author

GitHub scans repositories for NuGet API keys to prevent fraudulent uses of secrets that were accidentally committed.

To learn more about secret scanning, see About secret scanning.

Author Package Signing

๐Ÿ“ฆ๐Ÿ–Š Package Author

Author signing allows a package author to stamp their identity on a package and for a consumer to verify it came from you. This protects you against content tampering and serves as a single source of truth about the origin of the package and the package authenticity. When combined with client trust policies, you can verify a package came from a specific author.

To author sign a package, see Sign a package.

Reproducible Builds

๐Ÿ“ฆ๐Ÿ–Š Package Author

Reproducible builds creates binaries that are byte-for-byte identical each time you build it, and contain source code links and compiler metadata that enable a package consumer to recreate the binary directly and validate that the build environment has not been compromised.

To learn more about reproducible builds, see Producing Packages with Source Link and the Reproducible Build Validation spec.

Two-Factor Authentication (2FA)

๐Ÿ“ฆ๐Ÿ–Š Package Author

Every account on nuget.org has 2FA enabled. This adds an extra layer of security when logging into your GitHub account or your NuGet.org account.

Package ID prefix reservation

๐Ÿ“ฆ๐Ÿ–Š Package Author

To protect the identity of your packages, you can reserve a package ID prefix with your respective namespace to associate a matching owner if your package ID prefix properly falls under the specified criteria.

To learn about reserving ID prefixes, see Package ID prefix reservation.

Deprecating and unlisting a vulnerable package

๐Ÿ“ฆ๐Ÿ–Š Package Author

To protect the .NET package ecosystem when you are aware of a vulnerability in a package you have authored, do your best to deprecate and unlist the package so it is hidden from users searching for packages. If you are consuming a package that is deprecated and unlisted, you should avoid using the package.

To learn how to deprecate and unlist a package, see the following documentation on deprecating and unlisting packages.

Summary

Your software supply chain is anything that goes into or affects your code. Even though supply chain compromises are real and growing in popularity, they are still rare; so the most important thing you can do is protect your supply chain by being aware of your dependencies, managing your dependencies and monitoring your supply chain.

You learned about various methods that NuGet and GitHub provide that are available to you today to be more effective in viewing, managing, and monitoring your supply chain.

For more information about securing the world's software, see The State of the Octoverse 2020 Security Report.