Software Integrity

 

Synopsys supports Presidential Policy Directive 41

New presidential directive outlines threat response and asset response activities and could be enhanced with use of the Synopsys Software Integrity Platform that includes Coverity, Defensics, Protecode, and Seeker.

On Tuesday, the White House published the Presidential Policy Directive-41 (PPD-41) on United States Cyber Incident Coordination. Essentially it establishes a Cyber Incident Threat Level for better coordination among government agencies.

PPD-41 establishes a unified federal government response to potential cyber incidents; it sets forth principles that will govern the federal government’s response to any cyber incident, and it develops architecture for how different agencies will coordinate and interact. PPD-41 directs a unified federal government strategy for cyber incident response which incorporates several key principles: utilization of the unique skills, authorities, and resources of each agency; assessment of the risks posed to U.S. security, safety, and prosperity; and a focus on enabling the restoration and recovery of the affected entity. PPD-41 also recognizes the importance of protecting privacy and civil liberties and sensitive private sector information. The PPD directs that during federal response to a cyber incident, details of the incident and sensitive private sector information be safeguarded through coordination with affected entities. Significantly, PPD-41 also acknowledges that prevention and management of cyber incidents is a shared responsibility among the government, private sector, and individuals.

PPD-41, Section IV “Concurrent Lines of Effort” outlines threat response and asset response activities that could be enhanced with use of the Synopsys Software Integrity Platform that includes Coverity, Defensics, Protecode, and Seeker, said Joe Jarzombek, CSSLP and Global Manager, Software Supply Chain Management for Synopsys.

Threat and asset responders will share some responsibilities and activities, which may include communicating with affected entities to understand the nature of the cyber incident; providing guidance to affected entities on available Federal resources and capabilities; promptly disseminating through appropriate channels intelligence and information learned in the course of the response; and facilitating information sharing and operational coordination with other Federal Government entities.