18.4: Only Use Up-to-Date and Trusted Third-Party Components

Only use up-to-date and trusted third-party components for the software developed by the organization.

Asset Type

Security Function

Implementation Groups

N/A

N/A

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. The list of authorized software

  2. Third-party component inventory (possibly from your automated build systems)

Operations

  1. Enumerate all third-party components in the inventory

  2. For each component, verify:
    1. Latest component is being used

    2. The component is explicitly trusted by the organization

  3. Enumerate compliant components

  4. Enumerate non-compliant components

Measures

  • M1 = List of all third-party components being used

  • M2 = List of all third-party components that are up-to-date and explicitly trusted

  • M3 = List of all third-party components that are not up-to-date or not explicitly trusted

  • M4 = Count of third-party components being used (count of M1)

  • M5 = Count of third-party components that are up-to-date and explicitly trusted (count of M2)

  • M6 = Count of third-party components that are not up-to-date or not explicitly trusted (count of M3)

Metrics

Coverage

Metric

The ratio of compliant third-party components to the total number of third-party components
in use

Calculation

M5 / M4