The software supply chain has become one of the most critical and vulnerable aspects of modern product development—especially for IoT and embedded device manufacturers. From open-source libraries to third-party firmware, every component added to a device introduces potential risks. When vulnerabilities are discovered in these components, identifying affected components and coordinating patches becomes tremendously difficult.
As supply chain attacks become increasingly sophisticated, end-to-end software supply chain security is no longer optional; it's essential for protecting customers, ensuring compliance, and safeguarding brand reputation. But to build a resilient defense, it’s important to first understand where the risks lie—and how attackers are exploiting them.
In recent years, the software supply chain has emerged as a popular target for attackers. Threat actors are increasingly targeting weak points across the development lifecycle—from compromised build systems to vulnerable open-source packages. For IoT manufacturers, the stakes are especially high.
Attacks like SolarWinds, Codecov, and the recent XZ Utils backdoor have underscored just how damaging and far-reaching these compromises can be.
IoT devices often have long lifespans, limited update mechanisms, and deep integration into critical infrastructure, making them uniquely vulnerable.
A Software Bill of Materials (SBOM) is a foundational element of modern software supply chain security. It’s a detailed inventory of all the components—open-source, third-party, and first-party proprietary—that make up a software product. Think of it as the ingredient list for your codebase: without it, you’re flying blind when it comes to risk.
Too often, firmware and embedded software are overlooked in this process, leaving blind spots that attackers can exploit.
A detailed map of your software composition enables you to evaluate risk, identify outdated or unmaintained components, and track the origin and integrity of your code.
To be effective, SBOMs must be:
Regulatory bodies are increasingly mandating SBOMs as part of secure development practices. Both the U.S. Executive Order 14028 and the EU Cyber Resilience Act require device manufacturers to provide transparent and traceable component records, making SBOMs not only a best practice—but a legal obligation.
By integrating SBOM generation into your development pipelines, you can gain visibility into hidden risks, streamline vulnerability management, and demonstrate compliance with evolving cybersecurity regulations.
Create and maintain SBOMs with Finite State. Take a look at our SBOM Management data sheet to learn more.
Open-source software is a cornerstone of modern development, but it’s not without risk. According to Synopsys' 2023 Open Source Security and Risk Analysis report, 96% of scanned codebases contained open source, and 84% had at least one known vulnerability. For IoT manufacturers, the implications are serious: a single vulnerable library could expose thousands of devices.
To reduce this risk, product security teams should adopt a proactive approach:
Finite State’s SCA capabilities go beyond surface-level analysis by inspecting even opaque, binary components—providing deep visibility, even when source code is unavailable. Book a demo to learn more.
Securing the software supply chain doesn’t end at deployment. Continuous monitoring is essential for maintaining visibility into the evolving security posture of your products—especially in IoT environments where vulnerabilities may emerge long after release. Your chosen tool should be capable of:
Talk to the team to learn more about Finite State’s continuous monitoring capabilities.
Security is most effective when it’s embedded early—not bolted on at the end. “Shifting left” means integrating security practices throughout the development lifecycle, starting from the design and coding phases. For IoT manufacturers, this proactive approach is key to reducing vulnerabilities, minimizing rework, and delivering more secure products.
Here’s how to make the shift:
By shifting security left, organizations create a culture of shared responsibility—where developers, engineers, and security teams work together to build security in from the ground up. The result? Stronger software, faster releases, and reduced risk across the board.
Implementing secure development practices is crucial for maintaining the integrity of the software supply chain. By embedding secure coding principles and review processes into your development workflow, you can reduce vulnerabilities before they ever reach production.
Here’s how to improve your development practices for end-to-end software supply chain security:
Product security industry experts at Finite State can help stand up an industry standard-aligned security program for your organization. Learn more about our security services here.
CI/CD pipelines are a prime target for attackers because they’re the beating heart of your development process. A compromise in the build environment can silently inject malicious code into firmware or software releases, potentially affecting every device that ships and poisoning the entire software supply chain.
To protect these critical systems, teams should:
Frameworks like SLSA (Supply-chain Levels for Software Artifacts) can help guide maturity in this area—bringing structure, consistency, and greater trust to your build processes.
Even with strong controls in place, continuous validation is essential. Regular risk assessments help teams understand evolving threats and identify high-risk areas in their software supply chain. These should be conducted:
Penetration testing—especially on firmware and embedded components—can reveal vulnerabilities that static scans might miss, making them an essential complementary test.
Outsource your pen-testing to the experts at Finite State and reduce the burden on your security team. Learn more today.
Securing the supply chain doesn’t stop at deployment. Devices in the field must be monitored for abnormal behavior that could indicate exploitation of a supply chain vulnerability. This includes runtime monitoring and anomaly detection systems tailored for IoT environments.
Equally important is having an incident response plan that specifically addresses supply chain attacks so your team can act quickly. Your IR plan should include the following:
For IoT, in particular, your software supply chain is only as strong as the vendors and third parties your devices rely on. Without visibility into their security practices, you could inadvertently introduce unknown risks to your products. Robust procurement and vendor management processes are key to minimizing those risks.
Here’s how to strengthen your vendor ecosystem:
By treating your vendor relationships as extensions of your security program, you can reduce blind spots, improve trust, and protect your software supply chain from end to end.
If this list feels overwhelming, it’s important to remember that there’s no need to reinvent the wheel. Industry frameworks provide a solid foundation for building secure software supply chains, and aligning your practices with these standards helps you meet regulatory obligations and demonstrate your commitment to security.
Key frameworks and regulations to consider include:
Aligning your practices with these standards improves security posture, helps meet regulatory obligations, and builds trust with customers and partners.
End-to-end software supply chain security is a journey, not a checkbox. For IoT and embedded device manufacturers, securing every stage of the lifecycle—from component selection and SBOM management to CI/CD pipelines and production monitoring—is critical for reducing risk, maintaining compliance, and protecting the people who use your products.
By adopting strong SBOM practices, continuously vetting third-party components, securing CI/CD pipelines, and aligning with industry frameworks, you can build a software supply chain that’s not just resilient—but trustworthy.
If you’re looking to strengthen your software supply chain security, Finite State can help. Our platform provides the visibility, automation, and insights you need to secure your devices and meet the demands of a rapidly evolving threat landscape. Book a demo to learn more.