- Title Building Trust in Ecosystem and Ecosystem Components
- Consortium UNINOVA (UNI), Fraunhofer Institute for Experimental Software Engineering (IESE), Consiglio Nazionale delle Ricerche (CNR), Technical University of Cluj-Napoca (UTC), Universidad Murcia (UMU), RESILTECH (RES), HOLISUN SRL (HS), TTTECH (TT), 7Bulls S.A. (7B), Interactive Fully Electrical Vehicles (IFEVS)
- Funding H2020
- Opening / Ending September 2020 / August 2022
Nowadays most of the ICT solutions developed by companies require the integration or collaboration with other ICT components, which are typically developed by third parties. Even though this kind of procedures are key in order to maintain productivity and competitiveness, the fragmentation of the supply chain can pose a high risk regarding security, as in most of the cases there is no way to verify if these other solutions have vulnerabilities or if they have been built taking into account the best security practices. In order to deal with these issues, it is important that companies make a change on their mindset, assuming an “untrusted by default” position. According to a recent study only 29% of IT business know that their ecosystem partners are compliant and resilient with regard to security. However, cybersecurity attacks have a high economic impact and it is not enough to rely only on trust. ICT components need to be able to provide verificable guarantees regarding their security and privacy properties. It is also imperative to detect more accurately vulnerabilities from ICT components and understand how they can propagate over the supply chain and impact on ICT ecosystems. However, it is well known that most of the vulnerabilities can remain undetected for years, so it is necessary to provide advanced tools for guaranteeing resilience and also better mitigation strategies, as cybersecurity incidents will happen. Finally, it is necessary to expand the horizons of the current risk assessment and auditing processes, taking into account a much wider threat landscape. BIECO is a holistic framework that will provide these mechanisms in order to help companies to understand and manage the cybersecurity risks and threats they are subject to when they become part of the ICT supply chain. The framework, composed by a set of tools and methodologies, will address the challenges related to vulnerability management, resilience, and auditing of complex systems. In the project, Gradiant leads the work package “WP3 Vulnerabilities Management”, and will develop tools for the detection and forecasting of vulnerabilities in source code, as well as the analysis of the vulnerability propagation across the software supply chain.