• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, Network Security, News

SolarWinds Announces New Secure Software Development Process

SolarWinds’ new build process includes new development practices and technology designed to strengthen the security of build environments.

June 22, 2022 Zachary Comeau Leave a Comment

SolarWinds Virtual Agent AI

IT management company SolarWinds, more than a year and-a-half after it was discovered that popular software was compromised via a malicious update, has unveiled a new secure software development process in a move to make the company a model for enterprise software security.

SolarWinds’ “Next-Generation Build System” includes both new software development practices and technology designed to strengthen the integrity of the build environment, including a parallel build process in which development of software takes place through multiple secure duplicate paths to establish a basis for integrity checks.

According to the company, the software development and build process improvements were made over the past year in response to the SUNBURST attack, a compromise of the company’s software build environment in which alleged Russian state-sponsored hackers inserted malicious code into a spring 2020 update to the SolarWinds Orion platform.

The malicious entity used that malicious update as a backdoor into the networks of several highly sensitive government and private sector networks, resulting in one of the most sophisticated cyberattacks on the U.S. in history.

To help the rest of the IT industry adapt, the company is releasing components of its new build system as open-source software, as the build process SolarWinds used at the time of the supply chain attack is “common throughout the technology industry.” The hope is that other organizations benefit from SolarWinds’ learnings and help establish a new secure software development standard, the company says in a press release.

According to SolarWinds, its new secure software development process includes four key tenants of its “Secure by Design” strategy, including building only short-term software build environments that self-destruct after completing a specific task.

In addition, the company is ensuring that its build products can be made deterministically so any newly created byproducts will always shave identical, secure components.

The process also includes creating software development byproducts such as data models, in parallel, to establish a basis for detecting unexpected modifications to the software.

SolarWinds will also leverage detailed records and track every software build step for compete traceability and permanent proof of record, per the company’s announcement.

The company’s new software development strategy comes as cybersecurity experts anticipate more attempts to compromise the software supply chain and leverage widely used tools to move laterally and compromise downstream organizations.

To combat those threats, SolarWinds CEO Sudhakar Ramakrishna says technology companies need to communicate transparently and collaborate to protect the industry’s shared cyber infrastructure from advanced threats.

“Our Secure by Design initiative is intended to set a new standard in software supply chain security via innovations in build systems and build processes,” Ramakrishna says in a statement. “We believe our customers, peers, and the broader industry can also benefit from our practices.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: IT management, SolarWinds

Related Content:

  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…
  • Rearview shot of two young designers giving each other a fist bump in an office, on display is Crestron desk scheduling device Crestron Introduces Desk Q and Desk Touch Scheduling…
  • CI SSI cover Commercial Integrator and Security Sales & Integration Magazines…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Advertise with Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSDO NOT SELL MY PERSONAL INFORMATIONTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.