This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

§4.3.2 Security Assurance

    1. Clause Overview

    §4.3.2 is the core clause of ISO/IEC 18974 and is a new clause exclusive to 18974 that does not exist in ISO/IEC 5230. It requires establishing a procedure covering the entire process — vulnerability detection → risk assessment → remediation decision → customer consent (where applicable) → remediation → post-deployment newly disclosed vulnerability response → continuous monitoring — for each open source component in the SBOM, and maintaining implementation records. If §4.1.5 requires the existence of vulnerability handling methods, §4.3.2 requires that those methods have actually been applied to each component with records retained.

    2. What to Do

    • Detect the existence of known vulnerabilities in each open source component in the SBOM.
    • Assign a risk/impact score (CVSS) to each detected vulnerability.
    • Determine and document the necessary remediation or mitigation steps for each vulnerability.
    • Obtain customer consent above a pre-determined threshold, where applicable.
    • Perform appropriate actions based on the risk/impact score and record them.
    • Perform appropriate actions for newly disclosed vulnerabilities in already-deployed software.
    • Monitor and respond to vulnerability disclosures for the supplied software after its release.
    • Maintain detection and remediation results per vulnerability as component records.

    3. Requirements and Verification Materials

    ClauseRequirementVerification Material(s)
    §4.3.2A process shall exist to apply security assurance activities to each open source software component in the SBOM: known vulnerability detection / risk/impact score assignment / determination and documentation of remediation or mitigation steps / obtaining customer consent where applicable / performing actions based on risk score / addressing newly disclosed vulnerabilities / post-release monitoring and vulnerability disclosure response4.3.2.1 A documented procedure for handling detection and resolution of known vulnerabilities for the open source software components of the supplied software
    4.3.2.2 For each open source software component, a record is maintained of the identified known vulnerabilities and action taken (including a determination that no action was required)

    §4.3.2 Security Assurance There shall exist a process to apply security assurance activities to each open source software component that is to be included in the bill of materials (SBOM):

    • Applying a method to detect the existence of known vulnerabilities;
    • Assign a risk/impact score to each identified known vulnerability;
    • Determine and document the necessary remediation or mitigation steps for each detected and scored known vulnerability;
    • Obtain customer approval above a pre-determined threshold, where applicable;
    • Perform appropriate action based on risk/impact score;
    • Perform appropriate action for newly disclosed known vulnerabilities in previously released supplied software;
    • Ability to monitor and respond to vulnerability disclosures for the supplied software after its release.

    Verification Material(s): 4.3.2.1 A documented procedure for handling detection and resolution of known vulnerabilities for the open source software components of the supplied software. 4.3.2.2 For each open source software component, a record is maintained of the identified known vulnerabilities and action taken (including a determination that no action was required).

    4. How to Comply and Samples per Verification Material

    4.3.2.1 Vulnerability Detection and Resolution Procedure

    How to Comply

    A documented procedure covering the entire process from vulnerability detection to resolution for each open source component in the SBOM is Verification Material 4.3.2.1. This procedure is a concrete operational flow that integrates the individual methods defined in §4.1.5.

    The flowchart below illustrates the entire flow from CVE detection to remediation completion.

    flowchart TD
        A([SBOM Component]) --> B[Vulnerability Scan\nSCA Tool]
        B --> C{CVE Detected?}
        C -- No --> D[Record: No Detection\nAwait Periodic Rescan]
        C -- Yes --> E[Calculate CVSS Score\nRisk/Impact Assessment]
        E --> F{Severity Classification}
        F -- Critical/High --> G[Immediate Response\n7–30 day deadline]
        F -- Medium --> H[Planned Response\n90 day deadline]
        F -- Low --> I[Address at Next Release]
        G --> J{Customer Impact?}
        H --> J
        J -- Yes --> K[Customer Notification\n§4.1.5 Method 4]
        J -- No --> L[Remediation Decision]
        K --> L
        L --> M{Patch Available?}
        M -- Yes --> N[Apply Patch\nRescan Verification]
        M -- No --> O[Mitigation Measures\nor Risk Acceptance]
        N --> P[Record Remediation Result\n§4.3.2.2]
        O --> P
        P --> Q([Continuous Monitoring\n§4.1.5 Method 5])

    Detailed Steps

    The following is a sample describing each step of the flowchart in procedure document form.

    [Vulnerability Detection and Resolution Procedure]
    
    Step 1 — Vulnerability Detection
    - At CI/CD pipeline build, SCA tools (Dependency-Track, OSV-SCALIBR, etc.)
      automatically scan for vulnerabilities based on the SBOM.
    - Reference multiple vulnerability DBs such as NVD, OSV, and GitHub Advisory Database.
    - Even after deployment, automatically cross-reference against archived SBOMs
      when new CVEs are published.
    
    Step 2 — Risk/Impact Score Assessment
    - Calculate the CVSS v3.1 base score for each detected CVE.
    - Adjust the Environmental Score by considering the actual usage context of the
      company's product (network exposure, privilege requirements, etc.).
    - Severity classification: Critical (9.0+) / High (7.0-8.9) / Medium (4.0-6.9) / Low (0.1-3.9)
    
    Step 3 — Remediation Decision and Documentation
    - Determine the remediation method based on severity and customer impact scope:
      · Patch application: Upgrade to a newer version or apply a patch
      · Mitigation: Network isolation, disabling functionality, etc. when no patch is available
      · Risk acceptance: When the actual exploitability is low and mitigation is also unnecessary
        (joint approval from security team + open source PM required)
    - Record the basis for the remediation decision in the vulnerability tracking system.
    
    Step 4 — Customer Consent (where applicable)
    - For Critical/High vulnerabilities affecting customer-distributed products:
      · Proactively notify the customer's security contact of vulnerability information
        and the response plan.
      · Share the patch deployment schedule and mitigation methods.
    
    Step 5 — Remediation
    - Perform the determined remediation within the remediation deadline.
    - Run a rescan after patch application to confirm the vulnerability is eliminated.
    - Update the remediation completion result in the §4.3.2.2 record.
    
    Step 6 — Continuous Monitoring
    - Continuously monitor the vulnerability status of deployed software using tools
      such as Dependency-Track.
    - When new CVEs are published, automatically or immediately re-execute steps 1–3.
    

    4.3.2.2 Vulnerability and Action Records

    How to Comply

    For each open source component in the SBOM, records of identified vulnerabilities and actions taken (including a determination that no action was required) must be maintained. These records are Verification Material 4.3.2.2. The phrase “including a determination that no action was required” is important — components where no vulnerability was detected must also record the fact that a scan was performed and the detection result.

    Records can be managed using various tools such as Dependency-Track, a Jira security issue tracker, or spreadsheets, and must be maintained in a form that can be produced immediately during an audit.

    Considerations

    • Record per component: Maintain individual records for each component in the SBOM.
    • Record “no detection” as well: Record the scan date and result even for components where no vulnerability was detected.
    • Track remediation history: Manage the history of vulnerability occurrence, remediation, and rescan for the same component in chronological order.
    • Retention period: Retain for the support period of the relevant software plus a minimum of 3 years.

    Sample

    The following is a sample per-component vulnerability and action record.

    | Software | Version | Component | Component Version | CVE ID | CVSS | Severity | Action | Action Date | Assignee | Notes |
    |----------|---------|-----------|-------------------|--------|------|----------|--------|-------------|----------|-------|
    | MyProduct | v1.2.0 | openssl | 3.0.7 | CVE-2023-0286 | 7.4 | High | Upgraded to 3.0.8 | 2023-02-10 | Chul-su Kim | Rescan confirmed |
    | MyProduct | v1.2.0 | zlib | 1.2.11 | CVE-2022-37434 | 9.8 | Critical | Upgraded to 1.2.13 | 2022-10-15 | Chul-su Kim | Customer notified |
    | MyProduct | v1.2.0 | libpng | 1.6.37 | None | - | - | No action required | 2023-03-01 | Chul-su Kim | Periodic scan result |
    | FirmwareX | v2.3.0 | busybox | 1.35.0 | CVE-2022-28391 | 9.8 | Critical | Risk acceptance (network isolation mitigation) | 2022-11-20 | Chul-su Kim | No patch available, PM approval obtained |
    

    5. References