Finite StateFinite State
Finite StateFinite State
Software Supply Chain SecurityCompliance & Regulations

Is SSDLC the Secret to Surviving Global Cybersecurity Regulations?

Navigate global cybersecurity regulations with ease. Learn how SSDLCs, SBOMs, and ongoing monitoring can support cross-framework compliance.

Curtis Yanko

Curtis Yanko

April 4, 2025

The last few years have seen a proliferation of cybersecurity regulations around the world. While earlier legislation in this space focused on data protection and network security (like the 1987 Computer Security Act that gave rise to NIST), recent trends have shifted toward securing the software development process itself. 

This evolution began with the U.S. Executive Order 14028 for Improving the Nation's Cybersecurity. It was followed closely by the FDA’s ‘Ensuring Cybersecurity of Medical Devices’ (via the omnibus bill section 3305) amendment to the US Federal Food, Drug, and Cosmetics Act (section 524b). In Europe, the Radio Equipment Directive has been in place since 2014 and was updated with cybersecurity requirements shortly before the CRA was implemented.

At Finite State, we talk to many companies trying to navigate the increasingly complex regulatory landscape. While it’s essential to understand each regulation in detail, we've identified important commonalities across these frameworks that, once addressed, make cross-framework compliance that little bit easier. 

Secure Software Development

The overarching intent of all regulations is to ensure software is developed securely through a Secure Software Development Life Cycle (SSDLC). This approach focuses on building in security upfront, including concepts like “secure by default” — say goodbye to admin/admin default accounts!

Security frameworks provide a catalog of security practices that the organization should be performing. Still, it is up to each organization to determine how to implement the controls to ensure those practices are being adhered to. The Secure Software Development Framework (NIST 800-218) and the ISA/IEC 62443 4-1 are two popular frameworks to achieve this.

Secure Software Supply Chain Security

While not explicitly required by all secure development frameworks, Software Bill of Materials (SBOMs) certainly make satisfying the requirements much easier. 

For example, 62443-4-1 recommends maintaining an inventory of components from third-party suppliers and requires processes to identify and manage security risks from externally provided components (SM-9, SM-10). Having an SBOM makes it very easy to meet this requirement. 

The use of SBOMs extends past just the 4-1 as it works to underpin other standards in the 62443 family. For example, both 3-3 (SR7.8) and 4-2 (CR 7.8) require “… the capability to report the current list of installed components and their associated properties” — a natural fit for SBOM implementation.

Similarly, in the ‘Produce Well-Secured Software’ section, NIST 800-218 (SSDF) encourages teams to ‘Reuse existing well-secured software when feasible instead of duplicating functionality (PW.4)’. Two tasks within this section clearly lend themselves to SBOMs. 

  1. Task 4.1: “Acquire and maintain well-secured software components (e.g., software libraries, modules, middleware, frameworks) from commercial, open-source, and other third-party developers for use by the organization’s software.”
  2. Task 4.4: “Verify that acquired commercial, open-source, and all third-party software components comply with the requirements as defined by the organization throughout their life cycles.”

Ongoing Monitoring

Both the 62443-4-1 and NIST frameworks require teams to identify and manage risk associated with all third-party components throughout the whole lifecycle, which leads to the last area they have in common: ongoing monitoring for new risk. 

While the goal is to build security in from the start, it’s not enough to say, “Well, it was secure when we shipped it, so now you're on your own.” Inventories need to be continuously monitored for emerging risks for their whole lifecycle— which in the world of IoT and OT can be years!

This is where SBOM management tools, like Finite State, come in, providing continuous monitoring for emerging vulnerabilities. 

Incidentally, this same monitoring can play a crucial role in incident response when the emerging risk is particularly severe, like Zero-day announcements. Having a comprehensive inventory of all third-party software will enhance response times (and effectiveness) as it makes it easy to quickly understand which products are affected instead of wasting time on a discovery effort to track this down after the fact.

The Common Thread Between Regulations 

Across regulations like the CRA, UN RED, EO 14028, and FDA requirements, we consistently see an emphasis on implementing a robust SSDLC with verifiable controls ensuring adherence to security practices. These frameworks cover a lot more than just Software Supply Chain Security. Still, in that context, we can see that the expectation is to identify and manage the risk associated with third-party components and provide ongoing monitoring throughout the product lifecycle — including the ability to respond to vulnerabilities. This can be challenging for security teams to achieve, which is where implementing the proper tooling is key. 

At Finite State, we offer comprehensive solutions that help teams of all sizes address these requirements and regulatory challenges. Our platform generates and enriches SBOMs with vulnerability and threat intelligence from 200+ sources while continuously monitoring for emerging risks. Beyond the tooling, we provide services to help implement effective SSDLCs, offer consultation on regulatory implications for your business, and deliver penetration testing - to name just a few. 

For more information on how Finite State can help you achieve cross-framework compliance, get in touch today. 

Tags

#regulation
Curtis Yanko

Curtis Yanko

Curtis is Lead Sales Engineer at Finite State, where he helps organizations understand and apply the company’s platform to secure their connected products.

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions