A blog by Oleg Shilovitsky
Information & Comments about Engineering and Manufacturing Software

The importance of software BOM for hardware security

The importance of software BOM for hardware security
Oleg
Oleg
27 January, 2015 | 3 min for reading

smart-products-bom

We live in the era of smart products. Modern smartphones is a good confirmation to that. The average person today keeps in his pocket a computer with computational capability equal or even more than computer that aerospace and defense industry used for navigation. In addition to that, you smartphone has communication capability (Wi-Fi and Bluetooth) which makes it even more powerful. If you think about cost and availability of boards like raspberry pi and Arduino, you can understand why and how it revolutionize many products these days. Although, wide spread of these devices has drawbacks.

Smart products are bringing a new level of complexity everywhere. It starts from  engineering and manufacturing where you need to deal with complex multidisciplinary issues related to combination of mechanical, electronic and software pieces. The last one is a critical addition to product information. Bill of materials has to cover not only mechanical and electronic parts, but also software elements.

Another aspect is related to operation of all smart products. Because of connectivity aspects of products, the operation is required to deal with software, data and other elements that can easy turn your manufacturing company into web operational facility with servers, databases, etc.

As soon as devices are exposed to software, the problem of software component traceability is getting critical. Configuration management and updates is a starting point. But, it quickly coming down to security, which is very critical today.

GCN article – How secure are your open-source based systems?  speaks about problem of security in open source software. Here is my favorite passage:

According to Gartner, 95 percent of all mainstream IT organizations will leverage some element of open source software – directly or indirectly – within their mission-critical IT systems in 2015. And in an analysis of more than 5,300 enterprise applications uploaded to its platform in the fall of 2014, Veracode, a security firm that runs a cloud-based vulnerability scanning service, found that third-party components introduce an average of 24 known vulnerabilities into each web application.

To address this escalating risk in the software supply chain, industry groups such as The Open Web Application Security Project, PCI Security Standards Council and Financial Services Information Sharing and Analysis Center now require explicit policies and controls to govern the use of components.

Smart products are also leveraging open source software. The security of connected devices and smart product is a serious problem to handle. Which brings me to think about how hardware manufacturing companies can trace software elements and protect their products from a potential vulnerability.

What is my conclusion? To cover all aspects of product information including software becomes absolutely important. For many manufacturing companies the information about mechanical, electronic and software components is siloed in different data management systems. In my 2015 PLM trends article, I mentioned the importance of new tools capable to manage multidisciplinary product information. Software BOM security is just one example of the trend. The demand to provide systems able to handle all aspect of product BOM is increasing. Just my thoughts…

Best, Oleg

photo credit: JulianBleecker via photopin cc

Recent Posts

Also on BeyondPLM

4 6
7 March, 2011

A couple of weeks ago, I posted PLM Platform Wars: Who is Right or Who is Left? The following short...

25 March, 2013

I want to continue the theme of disruption started in my post last week. I can see two major forces...

11 August, 2011

Finally, my vacation over and Beyond PLM is back to normal. While screening materials, the following title caught my attention:...

30 January, 2012

Cloud is hyping in 2012. Coming Facebook IPO can only supercharge the future of cloud computing. Last year Autodesk announcement...

13 February, 2018

How to build reliable PLM system? For long time, this topic is among the most often demanded requirement in engineering...

31 May, 2022

Manufacturing is changing and it is very important than ever to keep up with the latest trends in technology, software...

13 January, 2022

Has your business fully adopted cloud-based CAD? While the technology has been around for more than a decade, the jury...

25 March, 2014

If you are not familiar with the term “Shadow IT”, you better do. The term is not completely new. Wikipedia...

6 December, 2012

Have you heard about OWA (Open World Assumption)? If you completed your Math 101 and Mathematical Logic time ago, refresh...

Blogroll

To the top