Acquired Software Security Impact
The Software You Did Not Build Still Has Your Name On It
Consider this: your organization runs 150 applications. Your development team built 20 of them. The other 130 are commercial products, open-source tools, SaaS platforms, and managed services. When any one of those 130 applications suffers a breach, your customers do not blame the vendor. They blame you.
Acquiring software transfers functionality to your organization. It does not transfer accountability. Every piece of software that touches your data is your security responsibility, whether you wrote it or not.
This module covers CISSP exam objective 8.4: assess the security impact of acquired software. The exam expects you to understand the governance frameworks for evaluating, selecting, and managing software that the organization acquires rather than builds — and the distinct risks each acquisition model introduces.
Commercial Off-the-Shelf (COTS) Software Risks
COTS software is commercially licensed, pre-built software that the organization purchases and deploys. It includes enterprise applications, database management systems, operating systems, and productivity suites.
- Limited visibility — You cannot review the source code. Security assessment depends on vendor documentation, third-party evaluations, and your own testing of the deployed product.
- Patch dependency — When vulnerabilities are discovered, you depend on the vendor’s patch timeline. You cannot fix the software yourself. Your governance must include tracking vendor security advisories and having a process for rapid deployment of critical patches.
- Configuration risk — COTS products ship with default configurations that prioritize functionality over security. Hardening guides from the vendor or CIS Benchmarks should be applied before production deployment.
- Integration risk — COTS products integrated into your environment inherit your security context. A COTS application connected to your directory service, databases, and networks extends the attack surface in ways the vendor did not design for.
Open-Source Software Risks and Governance
Open-source software provides source code transparency and community-driven development, but it introduces governance challenges that commercial software handles through contractual relationships.
- Maintenance uncertainty — Open-source projects can be abandoned by maintainers without notice. A project that was actively maintained when you adopted it may become dormant, leaving known vulnerabilities unpatched.
- Supply chain attacks — Attackers target popular open-source packages by compromising maintainer accounts, submitting malicious contributions, or creating typosquatting packages with similar names.
- License compliance — Open-source licenses carry legal obligations. Copyleft licenses (GPL) require derivative works to be distributed under the same license. Permissive licenses (MIT, Apache) allow broader usage but still require attribution.
- Governance framework — Organizations should maintain an approved open-source registry, establish contribution policies, require SBOM tracking for all open-source components, and assign responsibility for monitoring vulnerability disclosures.
Cloud Service Security Assessment
Cloud services shift operational responsibility to the provider but retain security accountability with the customer. The shared responsibility model defines the boundary, but the exam expects you to understand that the boundary shifts depending on the service model.
SaaS (Software as a Service)
- The provider manages everything: application, runtime, OS, infrastructure
- Your responsibility: data classification, access controls, user provisioning, and configuration of the application’s security settings
- Assessment focus: data residency, encryption (at rest and in transit), access control mechanisms, audit logging, and data export capability
PaaS (Platform as a Service)
- The provider manages the platform, runtime, and infrastructure
- Your responsibility: application code security, identity management, and data protection
- Assessment focus: platform security controls, deployment pipeline security, runtime environment isolation, and data segregation
IaaS (Infrastructure as a Service)
- The provider manages physical infrastructure and virtualization
- Your responsibility: operating system, middleware, applications, and data
- Assessment focus: network security controls, virtual machine hardening, storage encryption, and identity federation
The exam often tests this by presenting a scenario where a security failure occurs in the cloud and asking who is responsible. The answer depends on the service model and what layer the failure occurred in.
Vendor Security Assessment
Vendor assessment is the governance process for evaluating a software provider’s security practices before acquisition and continuously during the relationship.
Pre-Acquisition Assessment
- Security questionnaires — Standardized questionnaires (SIG, CAIQ) document the vendor’s security controls, policies, and practices.
- Third-party attestations — SOC 2 Type II reports, ISO 27001 certification, and FedRAMP authorization provide independent verification of security practices.
- Penetration test results — Request recent penetration test summaries or conduct your own assessment of the vendor’s product.
- Contractual requirements — Right-to-audit clauses, breach notification timelines, data handling requirements, and SLAs for security patching should be negotiated before signing.
Ongoing Assessment
- Continuous monitoring — Vendor security posture changes over time. Reassessment should occur periodically and after significant changes (acquisitions, data breaches, leadership changes).
- Security scorecard services — External rating services provide ongoing visibility into vendor security posture based on publicly observable data.
- Incident coordination — Establish protocols for how the vendor communicates security incidents that affect your data or services.
Software Supply Chain Risk
Supply chain risk in software extends beyond individual vendors to the entire chain of dependencies: the vendor’s own suppliers, their development practices, their infrastructure providers, and the open-source components embedded in their products.
- Transitive trust — When you trust a vendor, you implicitly trust everyone in their supply chain. A compromised component three levels deep in the supply chain can affect your organization.
- SBOM requirements — Requiring vendors to provide a Software Bill of Materials enables visibility into their components and dependencies.
- Provenance verification — Verify that software came from the claimed source and was not tampered with during distribution. Code signing and secure distribution channels address this risk.
- Diversification — Relying on a single vendor for a critical function creates concentration risk. Contingency planning should address the possibility that a key vendor is compromised or unavailable.
End-of-Life Software Management
Software reaches end of life (EOL) when the vendor stops providing updates, patches, and support. End-of-support (EOS) may precede EOL, removing security patch availability while the software remains functional.
- Risk — EOL software accumulates known, unpatched vulnerabilities over time. Every new CVE that affects the product adds to the exposure with no remediation path from the vendor.
- Governance — Organizations must track vendor support timelines for all acquired software, plan migrations before EOL dates, and establish policies for exceptions when migration is delayed.
- Compensating controls — When EOL software cannot be immediately replaced, compensating controls (network isolation, enhanced monitoring, virtual patching through WAF or IPS) reduce risk while migration is underway.
- Risk acceptance — Continuing to operate EOL software requires formal risk acceptance by management, with documented compensating controls and a migration timeline.
Integration Security
Acquired software rarely operates in isolation. Integration with existing systems creates new attack surfaces and data flows that must be governed.
- API security — Integrations typically connect through APIs. Authentication, authorization, encryption, and input validation requirements apply to every integration point.
- Data flow mapping — Document what data moves between the acquired software and other systems, including direction, sensitivity, and transformation. This mapping informs classification, access control, and compliance requirements.
- Privilege minimization — Service accounts used for integration should have the minimum permissions required. Overprivileged integration accounts are a common finding in security assessments.
Managed Services Security
Managed services (managed detection and response, managed database services, managed Kubernetes) add a layer of operational dependency where the provider makes security-relevant decisions on your behalf.
- Shared responsibility clarity — Define exactly what the managed service provider is responsible for and what remains your responsibility. Ambiguity in managed service agreements is a common source of security gaps.
- Access governance — Managed service providers may require privileged access to your environment. This access must be governed through access controls, session monitoring, and periodic review.
- Exit strategy — Plan for how to transition away from a managed service if the provider is compromised, fails to meet SLAs, or ceases operations.
Pattern Recognition
Acquired software questions on the CISSP tend to follow these structures:
- Cloud responsibility question — A security failure occurs in a cloud service. The answer depends on the service model (SaaS/PaaS/IaaS) and which layer the failure occurred in.
- Vendor goes silent — The vendor stops releasing patches or is acquired by another company. The answer addresses contingency planning and EOL governance.
- Supply chain compromise — A trusted vendor delivers compromised software. The answer addresses provenance verification, SBOM, and the limitations of transitive trust.
- Open-source governance gap — A developer adopts an open-source library without review. The answer addresses the need for an approved component registry and governance process.
Trap Patterns
Watch for these wrong answers:
- “The cloud provider is responsible for our data security” — Cloud providers are responsible for security of the cloud. You are responsible for security in the cloud. Data protection is always the customer’s responsibility.
- “COTS software is secure because the vendor tested it” — The vendor’s testing addresses their quality standards, not your security requirements. You must validate COTS software against your own threat model and configuration standards.
- “Open source is more secure because anyone can review the code” — Code availability does not guarantee that anyone actually reviews it. Many widely used open-source packages have had critical vulnerabilities that persisted for years.
- “Continue using EOL software until it breaks” — EOL software does not wait to break. It accumulates exploitable vulnerabilities. The risk increases every day without patches.
Scenario Practice
Question 1
An organization uses a SaaS CRM platform that stores customer personal data. The SaaS provider experiences a data breach that exposes customer records. The provider claims the breach was caused by a misconfigured firewall in their infrastructure.
Who bears primary responsibility for the exposure of customer data?
A. The SaaS provider, because the infrastructure misconfiguration was entirely their responsibility
B. The organization, because data protection responsibility cannot be transferred to a service provider
C. Both parties share equal responsibility regardless of the cause
D. Neither party, because the breach was caused by a configuration error rather than a deliberate attack
Answer & reasoning
Correct: B
While the SaaS provider is operationally responsible for their infrastructure, the organization remains accountable for protecting customer data. Accountability for data protection does not transfer when you outsource to a cloud provider. The organization should have assessed the provider’s security controls, established contractual requirements, and maintained compensating controls. Customers hold the organization responsible, not the provider they never chose.
Question 2
A development team wants to adopt a popular open-source message queue system. The project has 3 active maintainers, no commercial support option, and the last security advisory was addressed 8 months after disclosure.
What should the security team recommend?
A. Approve the adoption — open-source software with active maintainers is acceptable
B. Reject the adoption — open-source software should never be used in production
C. Approve with conditions: document the risk of limited maintainer support, establish a monitoring plan for vulnerabilities, identify a migration path if the project becomes abandoned, and plan for self-patching if needed
D. Delay the decision until the project reaches a more mature state
Answer & reasoning
Correct: C
The risk is not that the software is open source — it is that the project has limited maintainer support and slow vulnerability response. Conditional approval with documented risk, a monitoring plan, and a migration contingency is the governance approach. Blanket rejection of open source is impractical. Waiting indefinitely does not address the business need.
Question 3
An organization discovers that a critical COTS application reached end of support six months ago. The vendor stopped releasing security patches. The application processes financial transaction data and cannot be replaced for at least 12 months.
What is the MOST appropriate governance response?
A. Accept the risk informally and continue operating the application as-is
B. Immediately shut down the application to eliminate the risk
C. Obtain formal risk acceptance from management, implement compensating controls (network isolation, enhanced monitoring, virtual patching), and establish a firm migration timeline
D. Contact the vendor and demand continued support
Answer & reasoning
Correct: C
Operating EOL software that processes financial data is a significant risk that requires formal governance. Informal acceptance provides no accountability. Shutting down a critical application causes business disruption. The correct response is formal risk acceptance with compensating controls to reduce the exposure and a committed migration plan. Demanding vendor support for an EOL product is unlikely to succeed.
Key Takeaway
Most of the software in your environment was written by someone else. That does not make it someone else’s problem. Acquired software governance requires the same rigor as internal development: risk assessment before adoption, continuous monitoring during operation, and planned transitions at end of life. The exam tests your ability to recognize that accountability for data and systems never transfers, even when the operational workload does.