OEM and Third-Party Sourced Application and Services Risk

  • Chapter
  • First Online:
The CISO’s Next Frontier
  • 1852 Accesses

Abstract

The fact that OEMs and OS vendors often sell devices with applications and services from third-party vendors poses security and privacy risks, whether device consumers are individuals or corporations. This chapter also details recent third party-based vulnerabilities (e.g., SolarWinds), and gives tactical recommendations. CISOs should be given the authority and resources to ensure that all third-party application and infrastructure software updates and patches are thoroughly tested and sandboxed before they are deployed in production. All network and endpoint infrastructure should be under the direct supervision of the CISO.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 73.84
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Symantec Security Response Team (2019) ASUS software updates used for supply chain attacks. Available via Broadcom Symantec Enterprise Blogs/Threat Intelligence. https://www.symantec.com/blogs/threat-intelligence/asus-supply-chain-attack

  2. HP Product Security Response Team (2019) HPSBGN03620 rev. 4 – HP Support Assistant Escalation of Privilege Vulnerability. Support Communication Security Bulletin. https://support.hp.com/us-en/document/c06388027

  3. Hadar P (2019) OEM software puts multiple laptops at risk. Available via SafeBreach blog. https://safebreach.com/Post/OEM-Software-Puts-Multiple-Laptops-At-Risk

Further Reading

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Badhwar, R. (2021). OEM and Third-Party Sourced Application and Services Risk. In: The CISO’s Next Frontier. Springer, Cham. https://doi.org/10.1007/978-3-030-75354-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75354-2_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75353-5

  • Online ISBN: 978-3-030-75354-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation