Skip to main content

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

SBOMs & CRA Compliance with Olle Johansson and Anthony Harrison

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
24 MAR • 2026 1 hr 21 min
Share:

What happens when cybersecurity stops being an afterthought and becomes a legal obligation? In this episode of Nerding Out with Viktor, I’m joined by Olle Johansson, CycloneDX member and lead of the Transparency Exchange API, and Anthony Harrison, a UK-based software supply chain security consultant and open source SBOM tooling author, to explore how SBOMs, the Cyber Resilience Act, and the Product Liability Directive are reshaping how secure products are designed, maintained, and brought to market.

Both guests come from hands-on engineering backgrounds. Olle built open source telephony systems that ended up in critical infrastructure - air traffic control, emergency services, elevators - and now works on TC54 standardization and the Transparency Exchange API within CycloneDX. Anthony moved from building complex systems into focusing on software supply chain risk, running his own consultancy and contributing open source SBOM tools. Together they co-founded SBOM Europe, a community effort to improve software transparency practices across the continent. Incidents like Log4j and SolarWinds were turning points - not just because of the vulnerabilities themselves, but because the industry couldn’t quickly answer a basic question: where are we exposed? That gap is what SBOMs are meant to close.

We unpack how CRA differs from NIS2 and DORA, and why that distinction matters. CRA targets products placed on the market, while NIS2 is a directive implemented differently across member states. The new Product Liability Directive now includes software for the first time, meaning manufacturers face real consequences if their products cause harm. Liability follows the integrator - if you ship firmware, hardware, or open source components, you own the whole stack. Unlike traditional CE marking, which is a one-time checklist, CRA demands ongoing process compliance: risk analysis, threat modeling, and maintenance for the entire declared product lifetime. The upcoming EU Omnibus proposal aims to simplify this cross-border regulatory patchwork, but for now, compliance is less about submitting a perfect document and more about building processes that demonstrate due diligence.

The conversation also turns to what this means for engineering teams day to day. SBOM tooling is inconsistent - the practical advice is to never rely on a single tool, since different tools produce different dependency counts for the same codebase. Anthony discusses the UK’s Software Security Code of Practice and its limitation as a voluntary framework without enforcement teeth. Olle raises the looming challenge of post-quantum cryptography, arguing that products need crypto agility - the ability to swap cryptographic engines during a product’s lifetime - which most companies have not considered. AI can improve code quality and auditing, but it risks eroding the deep engineering knowledge needed when automated tools fall short. Security can no longer be a late-stage checkbox - it has to be built into product development from the start.

One principle anchors the discussion: any SBOM is better than no SBOM. Perfection is not the expectation. Demonstrable effort is. For founders, embedded engineers, and product teams navigating the new regulatory landscape, this episode offers a practical look at what CRA compliance actually demands and where to start.

Transcript

Show/Hide Transcript
[00:00] Viktor Petersson
I'm not a fan of legislation in general, but security and supply chain security at large is a market failure, no doubt.
[00:09] Olle Johansson
Right.
[00:09] Viktor Petersson
Because that will not be solved without legal pushbacks from the government bodies right there.
[00:15] Viktor Petersson
No way.
[00:16] Olle Johansson
If I operated a commercial company, I can clearly see that investment in cyber security didn't give me more market share or more Morgans.
[00:25] Olle Johansson
But because customers have no knowledge, they don't require it, but they require new cool features, I focus on new features.
[00:34] Viktor Petersson
Welcome back to another episode of Nerding with Victor.
[00:37] Viktor Petersson
Today I'm joined by Ole and Anthony who are definitely a big names in the European SBOM world.
[00:42] Viktor Petersson
So welcome Ole and Anthony.
[00:45] Anthony Harrison
Thank you, thank you.
[00:48] Viktor Petersson
I mean we've been running in the same circles quite a while right now.
[00:51] Viktor Petersson
Ola, you are leading up the Transparent Exchange API.
[00:54] Viktor Petersson
So I see your face every other week at least on the meetings there.
[00:57] Viktor Petersson
And Anthony, anything that's SBOM related, I tend to see your name as well.
[01:00] Viktor Petersson
So you guys are very much, highly in the S world.
[01:04] Viktor Petersson
But for those not familiar with you guys, I'll let you start off with giving a quick introduction to yourself.
[01:12] Olle Johansson
Well, I'm a gardener living in Solentuna, Sweden, but in my spare time I. I do a lot of stuff related to the Cyber Resilience act and software transparency.
[01:24] Olle Johansson
I'm a member of Cyclone DX.
[01:26] Olle Johansson
As you pointed out, we're working TC54 to standardize software transparency with S BOMs, the Cyclone DX format, the CLE format and many others.
[01:40] Olle Johansson
I'm also engaged in ORC, VG on CRA related issues and OpenSSF.
[01:47] Viktor Petersson
Good stuff.
[01:48] Viktor Petersson
Thanks Ola.
[01:48] Viktor Petersson
Anthony, you want to do a quick pitch about what you're doing and who you are?
[01:52] Anthony Harrison
Yeah.
[01:52] Anthony Harrison
Okay.
[01:52] Anthony Harrison
So I'm Anthony Harrison from the uk.
[01:55] Anthony Harrison
So looking outside the EU and the regulations that are changing weekly as we all got to talk about.
[02:05] Anthony Harrison
So yeah, I've got a background in building complex systems and now I run my own business which is looking at the software supply chain and the software risk about developing software.
[02:20] Anthony Harrison
And I write one or two open source software tools in the SBOM space which seems to get some traction which is always very nice, very cool.
[02:30] Viktor Petersson
So it wasn't clear there's going to be an episode on SBoM.
[02:34] Viktor Petersson
We've done more than we basically had.
[02:36] Viktor Petersson
Anybody who's anything in the SBOM world except, well, I can think of a few names that I still should get on there.
[02:41] Viktor Petersson
But most people that are in the SBOM world have been on the podcast before.
[02:45] Viktor Petersson
But this is essentially a follow up to the episode with Sarah Fluchs on CRA and thesis for this episode and what I want to cover in this episode is really all things in the surrounding universe of CRA.
[02:59] Viktor Petersson
Right.
[02:59] Viktor Petersson
Because CRA is a big thing.
[03:01] Viktor Petersson
But CRA kind of talks about a lot of other things and it's kind of one piece in a bigger puzzle. And.
[03:08] Olle Johansson
Ooh.
[03:09] Viktor Petersson
There are, I mean, just to name a few.
[03:12] Viktor Petersson
Like there is NIST 2, there is Dora.
[03:17] Viktor Petersson
Where do you guys want to start to unpack this whole complex web of acronyms?
[03:23] Olle Johansson
I'm not a lawyer and I have a history and being a consultant.
[03:30] Olle Johansson
So when I started studying this, I realized that there was a few people in the Euro saying that the EU is leading in regulation.
[03:39] Olle Johansson
Yeah.
[03:40] Olle Johansson
Surprised me.
[03:41] Olle Johansson
I didn't know there was a world championship going on and I don't know, I haven't seen that.
[03:49] Olle Johansson
I haven't seen that.
[03:52] Olle Johansson
But it is a complex world and the more years time you spend it on it, both the process within eu, which is confusing when you start.
[04:02] Olle Johansson
I followed the CRA through all the hoops and mistakes until it became an active act to say.
[04:12] Olle Johansson
But as you say, the whole regulation landscape can be confusing.
[04:17] Olle Johansson
There are so much happening and there's an organization called Open Forum Europe that tries to follow this and inform us in the open source world.
[04:27] Olle Johansson
Because we haven't really paid much attention until the CRA.
[04:33] Viktor Petersson
No.
[04:34] Olle Johansson
When the first proposal CRA came, we realized that we had to engage and the commission were a bit surprised because we came late into the game.
[04:46] Olle Johansson
All the other mayor players had lobbyists in Brussels, open source.
[04:52] Olle Johansson
We didn't have the money, we didn't have the people, but we changed that by working together.
[04:59] Olle Johansson
And I think that's amazing.
[05:01] Olle Johansson
But that also means that we're constantly now looking into the regulation landscape.
[05:07] Olle Johansson
And I can't say I follow all the details, but there is a lot of things happening.
[05:14] Viktor Petersson
Yeah.
[05:15] Anthony Harrison
And I think we can sort of see, you know, the US started taking an interest, shall we say back 2021, because of things like solar winds and obviously because of where solar winds hit, then people started realizing software and systems are very complex, it's very intertwined and that transparency wasn't visible.
[05:42] Anthony Harrison
And then when you now start looking at, you know, our critical systems that we have in many countries, you know, our utilities or finance systems, etc, any one of those, any weaknesses in any one of those could have, you know, catastrophic effects on society.
[06:00] Anthony Harrison
So actually having that greater visibility is, is desirable for everybody to manage that Risk?
[06:08] Anthony Harrison
Yeah.
[06:08] Olle Johansson
I mean going back, I would say that much of this work started with log 4J and SolarWinds.
[06:17] Olle Johansson
I, I, when I do trainings, when I do talks, I quite often start with log 4j.
[06:23] Olle Johansson
And the cost for society to find out if we had log 4J in our systems, not mitigation, not cost for the cybercrime caused by this bug, but the cost of finding out.
[06:38] Olle Johansson
I mean, I myself was called into the office on a Sunday to go through systems and check for this.
[06:46] Olle Johansson
A consultant on a Sunday, that's not cheap business.
[06:49] Olle Johansson
And were many consultants and employees in the office and the number of mail we got being engaged as open source developers from users, I mean the cost of that was too high.
[07:04] Olle Johansson
But going back to the starting point for CRA, the commission says the cost for society for all these cybercrimes is way too high and it's time to fix this and the open free market can't fix this by itself.
[07:22] Viktor Petersson
Yeah, I think that's so important to stress because I think to me, and I've said this on previous episodes, right, I'm not a fan of legislation in general, but security and supply chain security at large is a market failure, no doubt.
[07:36] Olle Johansson
Right.
[07:36] Viktor Petersson
Because that will not be solved without legal pushbacks from the government bodies.
[07:41] Viktor Petersson
Right.
[07:42] Viktor Petersson
There's no way.
[07:43] Olle Johansson
If I operate at a commercial company, I can clearly see that investment in cybersecurity didn't give me more market share or more Morgans because customers have no knowledge, they don't require it, but they require new cool features.
[07:58] Olle Johansson
I focus on new features.
[08:00] Olle Johansson
And the commission clearly says in the CRA that for a while now, vendors need to focus on security.
[08:08] Olle Johansson
And I think that goes across all of their legislation that we need to focus on this and lower the cost for society.
[08:18] Olle Johansson
They also say that, well, we acknowledge that prices for products will go up because we're basically changing model for vendors, right, Both with these two and with CRA.
[08:31] Olle Johansson
But long term, the cost for all of us will go down.
[08:35] Olle Johansson
And I think that's important to remember when we look at this, that they realize that the vendors are doing the right thing from their point of view.
[08:46] Olle Johansson
And the only way to change the focus and protect society is legislation.
[08:53] Anthony Harrison
But I think that's interesting because I think everybody assumes engineers, and we're all engineers really, we practice, we know the, we know what we should be doing, so we do it.
[09:04] Anthony Harrison
But clearly we're not doing it well enough and the evidence isn't there.
[09:11] Anthony Harrison
So therefore the regulation comes along to try and sort of, you know, demonstrate your behaviors rather than just saying trust you, trust you're doing the right job.
[09:21] Anthony Harrison
Because I think too many times we just relied on people to do the right thing without telling them what's what that benchmark is.
[09:30] Anthony Harrison
Yeah, and that's okay.
[09:31] Anthony Harrison
That's why this.
[09:33] Anthony Harrison
Let's have a debate.
[09:34] Anthony Harrison
But yeah, it is the issue.
[09:36] Anthony Harrison
I think everybody knows what.
[09:37] Anthony Harrison
And then a good engineer knows how to write good code, good systems.
[09:42] Anthony Harrison
But there's plenty of engineers that don't do that if they can get away with doing it because they don't have to.
[09:47] Viktor Petersson
But this.
[09:48] Viktor Petersson
Yeah, yeah,
[09:53] Olle Johansson
The process that doesn't really work in many projects I've been involved with as a consultant that the developers, they know their stuff, they can do secure software, but the priorities are different.
[10:10] Olle Johansson
So when we do our scrum meetings and set the priorities, the product manager puts everything about security so far down the list.
[10:19] Olle Johansson
Had one product manager found out how to delete tickets in the.
[10:23] Olle Johansson
The ticket system.
[10:24] Olle Johansson
So they didn't show up on the proof.
[10:27] Olle Johansson
So I think this, when I talked with the developers, because I had to go through security for a product they knew very well, but the product marketing and management, they prioritized otherwise.
[10:42] Viktor Petersson
Yeah, I mean, it's funny, I. I was on a podcast yesterday and we talk about security, and to me, security is culture.
[10:49] Viktor Petersson
And culture starts from the top.
[10:51] Viktor Petersson
And essentially security culture is.
[10:54] Viktor Petersson
And I like to use this litmus stuff for security culture, which is security culture is what happens when nobody's looking.
[11:00] Viktor Petersson
Right.
[11:00] Viktor Petersson
That's what your engineers do when nobody's watching over their shoulders.
[11:04] Olle Johansson
Right.
[11:05] Viktor Petersson
A good testament to good security culture is that they write secure code file best practices.
[11:10] Viktor Petersson
And that overhead that you're referring to, Ola, which is very true, is just expected.
[11:16] Viktor Petersson
It's expected that you do not cut those corners.
[11:19] Viktor Petersson
And that is the litmus test for good security culture.
[11:22] Viktor Petersson
Right?
[11:24] Olle Johansson
Yeah.
[11:25] Olle Johansson
The problem now we have legislation coming in December 2027, and there's a lot of things that needs to happen, and it's very short time.
[11:36] Olle Johansson
But that's considering the technology path.
[11:40] Olle Johansson
We have to fix the code, we have to fix the response, we have to fix security issues, we have to add encryption, all that.
[11:46] Olle Johansson
But changing how the company people think and prioritize, that will take much more time.
[11:56] Olle Johansson
And that's going to be the problem with all of this.
[11:59] Viktor Petersson
That culture is a lot slower than code.
[12:04] Anthony Harrison
And if things are not mandated, it doesn't get done.
[12:10] Anthony Harrison
Because, you know, if you can do shortcuts, People will do shortcuts.
[12:16] Anthony Harrison
You know, we all want to get paid and if we can get paid quicker for not doing stuff that's not required, we will, we won't do it.
[12:24] Anthony Harrison
And that's, you know, for us to have the right behavior, which ultimately I think is.
[12:29] Anthony Harrison
The EU is trying to do with CRA and this and Dora, et cetera.
[12:33] Anthony Harrison
It is trying to make sure how people have a consistent behavior.
[12:36] Anthony Harrison
And we saw that with GDPR 10 years ago.
[12:40] Anthony Harrison
Let's look at personal data.
[12:42] Anthony Harrison
So I think everybody knew what they should be doing, but nobody was doing it quite rightly or consistently.
[12:50] Anthony Harrison
So this is probably similar where we are with cyber and we know what we should be doing, we know what the consequences are.
[12:58] Anthony Harrison
But are we doing it correctly?
[13:02] Anthony Harrison
And does everybody understand the consequences of not doing it?
[13:06] Anthony Harrison
Which then brings things like accountability, which brings the organizational culture into that is, you know, you're going to get.
[13:14] Anthony Harrison
Some organizations are going to fast them fast and loose, some are going to be very rigorous.
[13:19] Anthony Harrison
How do we get everything aligned.
[13:22] Olle Johansson
But if we move back from this array, which of course is a favorite topic and look at, there's a whole umbrella and you mentioned Denise 2 directive NISTU is a directive.
[13:38] Olle Johansson
CRA is an act.
[13:39] Olle Johansson
An act is a law in all member countries at the same time.
[13:44] Olle Johansson
Nice2 has to be implemented in each and every member country.
[13:48] Olle Johansson
So they can make variants.
[13:50] Olle Johansson
They're allowed to make variants and change it a little bit since Sweden, we got our variant in January 15 this year were late, very late.
[14:03] Olle Johansson
And the problem is if you're a company that works in multiple, I mean countries, it's hard to say that you're these two compatible because it can be different.
[14:15] Olle Johansson
Now the EU is publishing something called the Omnibus.
[14:19] Olle Johansson
Well, it will try to change that.
[14:21] Olle Johansson
So if you're operating multiple countries, you can operate with an ESA instead of the country level.
[14:27] Olle Johansson
But, but they're making it a bit more easy to handle.
[14:31] Olle Johansson
But Nistu is interesting because that's for critical services in the society.
[14:36] Olle Johansson
You have aerospace, universities and many other sectors, food, everything that's critical in society needs to have resilience.
[14:49] Olle Johansson
They need to have cyber security and they need to control the software supply chain.
[14:55] Olle Johansson
The regulation doesn't say S bond but if you read it's very clear that you need S bonds and you need due diligence.
[15:03] Olle Johansson
You need control of stuff.
[15:06] Olle Johansson
There is also needs to.
[15:07] Olle Johansson
For the IT sector.
[15:09] Olle Johansson
Everyone that delivers services over a certain size is affected.
[15:14] Olle Johansson
So if you're a Software as a service company only you will be affected by these two and how to follow that.
[15:24] Olle Johansson
And the interesting thing with these two is that law points directly to the management.
[15:31] Olle Johansson
The management will be responsible.
[15:33] Olle Johansson
The management has to prove that.
[15:36] Olle Johansson
Cyber security training and in Sweden they even added that if there's a problem, you not only get fines, but.
[15:47] Olle Johansson
But the CEO can be banned from being a CEO for a number of years within the company register.
[15:56] Viktor Petersson
Interesting.
[15:57] Olle Johansson
It's very personal, Denise, to CRA isn't.
[16:03] Anthony Harrison
Yeah.
[16:04] Viktor Petersson
There's a lot to unpack here.
[16:05] Viktor Petersson
So one thing is CRA needs to.
[16:10] Viktor Petersson
Let's do a Venn diagram.
[16:11] Olle Johansson
Right.
[16:12] Viktor Petersson
What's the overlap?
[16:13] Viktor Petersson
If you need to do one, how much do you cover off the other?
[16:16] Viktor Petersson
Because I think that's a lot confusion.
[16:19] Viktor Petersson
I mean, even to myself.
[16:20] Viktor Petersson
Like it's like it's not a do this and you've done.
[16:24] Viktor Petersson
Right.
[16:24] Viktor Petersson
Because you need to wrap your head around a lot of different frameworks that.
[16:28] Viktor Petersson
Yeah, there are Venn diagrams.
[16:30] Viktor Petersson
They're not like the same.
[16:31] Olle Johansson
Right.
[16:31] Viktor Petersson
So talk to me about how you guys see that and like path towards compliance really.
[16:37] Olle Johansson
Well, it's kind of interesting.
[16:39] Olle Johansson
CRAy is a product legislation.
[16:42] Olle Johansson
Primarily it is software or hardware.
[16:46] Olle Johansson
With software, you sell something with a digital connection to a network.
[16:51] Olle Johansson
Doesn't have to be the Internet.
[16:52] Olle Johansson
A network.
[16:53] Olle Johansson
Right.
[16:54] Olle Johansson
And we already have the.
[16:57] Olle Johansson
The radio directive that got a delegated act in August last year that required cyber security.
[17:05] Olle Johansson
And that part will be replaced by the CRA later on.
[17:11] Olle Johansson
But the CRA involves remote data processing.
[17:15] Olle Johansson
So if your product requires some cloud service, that cloud service is affected by the CRA.
[17:23] Olle Johansson
And if you're large enough, that cloud service is also, I would say, regulated by these two.
[17:31] Olle Johansson
And if you're a bank or insurance company, that cloud service, the backend systems, is regulated by DORA all around.
[17:43] Olle Johansson
But many companies, when I've been out talking about this, say, oh, we're a car manufacturer, we're not affected.
[17:50] Olle Johansson
And I look at my phone and say, I have an app from you because I'm renting car when I travel.
[17:55] Olle Johansson
So I have many apps.
[17:57] Olle Johansson
That app is not regulated as a car with four wheels and an engine.
[18:03] Olle Johansson
So.
[18:05] Olle Johansson
And you need to do your homework.
[18:08] Viktor Petersson
Yeah, I guess my angle was more if you follow one of these guidelines, let's say hypothetically, you are CRA compliant, which is not quite a thing because again, like BSI got their implementation of cri, so it's like it's not quite that simple.
[18:26] Olle Johansson
Right.
[18:27] Viktor Petersson
But let's say hypothetically you were to Be compliant with whatever that means.
[18:33] Viktor Petersson
How much is covered, how much of that will make you covered by NIST2 or Dora?
[18:40] Anthony Harrison
I think they're coming from slightly different things because obviously I think dora's coming from a sector perspective, the financial market.
[18:47] Anthony Harrison
This is coming from the criticality of services to society and CRA is coming from product.
[18:54] Anthony Harrison
So they're all very, they're all looking at.
[18:58] Anthony Harrison
There is a common problem which is how, you know, cyber security is one of the, you know, a horizontal thing that goes across all three.
[19:06] Viktor Petersson
Yeah.
[19:06] Anthony Harrison
And organization goes across all of them as well because of who's, you know, who's insuring them for the governance.
[19:13] Viktor Petersson
Yeah.
[19:14] Anthony Harrison
But actually what they're trying to achieve and how they achieve it are very different.
[19:18] Viktor Petersson
No, but if we sandbox just a cyber security component of these compliant compliance networks.
[19:24] Olle Johansson
NIECE is the old kid on the block.
[19:27] Olle Johansson
Right.
[19:28] Olle Johansson
We had knees that still haven't really got implementation guidelines for all sectors.
[19:35] Olle Johansson
In Sweden, the, the legislators didn't.
[19:39] Olle Johansson
The authorities didn't understand it or didn't get resources.
[19:43] Olle Johansson
I don't know really what was problem was and was replaced by niece too.
[19:48] Olle Johansson
They're trying to align all of this.
[19:50] Olle Johansson
On top of it all is an umbrella act.
[19:55] Olle Johansson
And this is getting more and more fun.
[19:57] Olle Johansson
The Cyber Security act which is updated now they're updating things to make it the puzzle fit better.
[20:04] Olle Johansson
Right, right.
[20:06] Olle Johansson
And simplify because needs to hit very small companies doing some IT services like DNS hosting, which I mean would just be stupid.
[20:18] Olle Johansson
But the Cyber Security act is what authorized anisa.
[20:23] Olle Johansson
NISA got the resources of the Cyber Security from the Cyber Security Act.
[20:28] Olle Johansson
It also stipulated the certification for that applies to many of these.
[20:37] Olle Johansson
If you're in an area that needs a certification, you have a high degree of criticality.
[20:45] Olle Johansson
But they're updating the Cybersecurity act as well.
[20:48] Olle Johansson
And an interesting little directive that runs on the side is the Product Liability Directive.
[20:56] Olle Johansson
Have you heard about that?
[20:57] Viktor Petersson
I have not heard about that.
[20:59] Olle Johansson
No.
[21:00] Olle Johansson
They added software and this is when there's a danger to a person, when something happens, really bad happens to a person, the manufacturer is liable.
[21:13] Olle Johansson
Software has been excluded, has never been regulated before and suddenly we get used to CRA and the product liability directed.
[21:26] Anthony Harrison
so that, so that sort of has a big impact on things like open source where you get, you know, no warranty, you know, use it as you think and you know, and as developers.
[21:40] Anthony Harrison
Yes.
[21:40] Anthony Harrison
We can only go through so much.
[21:43] Olle Johansson
You never know.
[21:44] Olle Johansson
As a developer of open source where I mean I started 20 years ago contributing to an open source telephone branch exchange, a pbx.
[21:55] Olle Johansson
Right.
[21:56] Olle Johansson
Many carriers took that up.
[21:58] Olle Johansson
That was the starting point.
[22:00] Olle Johansson
And businesses, of course, we basically killed a lot of PBX vendors by delivering more functionality for a lower price.
[22:09] Olle Johansson
Zero.
[22:10] Olle Johansson
Yeah, Very interesting.
[22:11] Olle Johansson
Bad business idea delivery.
[22:13] Olle Johansson
Anyway, we did later on I found that this was used in air traffic control.
[22:22] Viktor Petersson
Oh wow.
[22:23] Olle Johansson
It was used in 112 systems, elevator systems.
[22:28] Olle Johansson
And if we had liability according to PLD, that would be very dangerous with elevators.
[22:36] Olle Johansson
So open source is actually excluded luckily from this.
[22:40] Olle Johansson
But if a vendor includes open source, they are liable for the life of people.
[22:47] Anthony Harrison
So that takes it into sort of the integration role, doesn't it?
[22:51] Anthony Harrison
And you know, and you look at CRA, the manufacturer is the integrator of components, software, hardware, whatever.
[22:59] Anthony Harrison
And I presume the same is true of things like a financial system that's been sold to the bank, that's been integrated by many products.
[23:07] Anthony Harrison
And this again is, you know, there's an operator of the, you know, the water system, but actually that's a whole load of systems that are contributing to that water system.
[23:20] Anthony Harrison
So it's all these sorts of things coming together and who's responsible.
[23:27] Anthony Harrison
It's about responsibility and who's accountable and how much due diligence do they have to go and how deep do they go?
[23:34] Anthony Harrison
Do they just go to the first level?
[23:36] Anthony Harrison
So the operator talks to who they bought the product from or does he have remit to go all the way down that supply chain?
[23:44] Anthony Harrison
And that I think is, you know, going back to log 4J.
[23:48] Anthony Harrison
That's really what I think recognized to me was how deep the software supply chain has become in terms of how obscure it has become.
[23:58] Anthony Harrison
A lot of people didn't know what was being used by whom.
[24:02] Anthony Harrison
So I think, you know, this is what all these regulations are, sort of bringing these to the surface.
[24:08] Anthony Harrison
I don't know whether we have a.
[24:10] Anthony Harrison
The right way forward.
[24:12] Anthony Harrison
We've got different approaches, you know, like for, you know, assessments, self assessments, etc.
[24:19] Anthony Harrison
But it's actually trying to make sure that people do say some responsibility.
[24:25] Olle Johansson
Yeah.
[24:26] Olle Johansson
How long ago was log 4J?
[24:29] Anthony Harrison
August December 11th.
[24:31] Anthony Harrison
There's one thing.
[24:32] Anthony Harrison
20, 20, 21.
[24:35] Olle Johansson
Okay.
[24:37] Olle Johansson
Have we come much further since then?
[24:40] Olle Johansson
If I operate an IT system, I mean, I usually in my trainings and talk start with I'm lactose intolerant.
[24:46] Olle Johansson
So when I buy food I need to have that list of ingredients.
[24:50] Olle Johansson
That doesn't mean I can cook the same food or bake the same bread, but I need the ingredient list.
[24:57] Olle Johansson
We need that kind of transparency for products and services.
[25:01] Olle Johansson
We say, I usually try to joke and say I'm allergic to curl.
[25:06] Olle Johansson
Curl.
[25:07] Olle Johansson
Don Steenberg's a really good product.
[25:10] Olle Johansson
Right.
[25:11] Olle Johansson
So when I buy stuff in my electronics favorite shop, how do I know if there's curl inside?
[25:18] Olle Johansson
I need to know, right?
[25:20] Viktor Petersson
Yeah, I mean I think that's a good analogy for S pumps in general.
[25:23] Olle Johansson
Yeah.
[25:23] Olle Johansson
But we the IT systems in out in the industry, in society, they need transparency.
[25:30] Olle Johansson
We need to prepare for the next log for and we're still far away.
[25:37] Olle Johansson
But these two actually indirectly points to this.
[25:40] Olle Johansson
They need to have control over the software supply.
[25:43] Anthony Harrison
But ultimately what they're trying to do and I think for all three of them trying to pull it together.
[25:48] Anthony Harrison
Back to your visual question from about 5 minutes ago Victor is all of them want to assess impact, right.
[25:57] Anthony Harrison
If there is a problem, they want to know who's affected and then how do I then remediate that quickly, et cetera, how do we stop the problem?
[26:07] Anthony Harrison
And without that sort of understanding of all those dependencies, you're not going to be able to understand that the full extent of that impact because otherwise it's a bit like playing whack a mole.
[26:17] Anthony Harrison
You think you've stopped it and then it pops up somewhere else.
[26:20] Anthony Harrison
So you need to just think about all those impact assessments and it's you know, classic change management, classic risk management.
[26:28] Anthony Harrison
Ultimately the fact it's software is interesting for us but ultimately this is just understanding if something happens, how do I control it.
[26:40] Olle Johansson
Yeah, yeah.
[26:41] Olle Johansson
I mean there are interesting hidden things that people when you start digging into this like when you buy a server that there's a server management software which is today a full operating system, basically Linux operating system running on a server.
[27:00] Olle Johansson
How much do we know about these?
[27:02] Viktor Petersson
Oh, very little.
[27:03] Viktor Petersson
I mean I, I've had episodes with the core boot guys for instance.
[27:07] Viktor Petersson
Right.
[27:08] Viktor Petersson
Who have wealth of experience.
[27:09] Olle Johansson
This is the IPMI software, right?
[27:12] Viktor Petersson
Yeah.
[27:12] Viktor Petersson
The IP is just a separate subset like even but even bias which even.
[27:16] Olle Johansson
smaller connected to the network port.
[27:19] Olle Johansson
Sometimes it shares network ports with the Internet board.
[27:22] Olle Johansson
Yeah, yeah.
[27:25] Olle Johansson
All kinds of hidden things are scary and especially if you're in the Easter world all the ot.
[27:34] Olle Johansson
How many times have you gotten a team viewer over a email, unencrypted email and say log in here and check and someone connected a laptop somewhere to an OT system and you need to check something.
[27:50] Olle Johansson
We need to change culture, we need to change behavior and these two points to that many people are afraid that our bugs will be illegal or Incidents will be legal.
[28:01] Olle Johansson
No, it's not about that.
[28:03] Olle Johansson
It's about your process and your transparency.
[28:06] Olle Johansson
If hits the fan, you're gonna talk with your customers and you're gonna in many cases talk with authorities so they can talk with other While you fix your stuff, they will help you fix the rest and protect society.
[28:21] Olle Johansson
But that will take some time to change the culture.
[28:24] Olle Johansson
And I think that's why these two points, both to the management, but they also in many cases, when you start reading the implementation guide, they point to the organization and roles you must have in your organization.
[28:40] Viktor Petersson
Yeah, I mean ultimately these frameworks will live or die by how enforceable they are in the real world.
[28:50] Viktor Petersson
We can draft the best legislation in the world.
[28:52] Viktor Petersson
But let's just go back to gdpr, which is the obvious comparison, right.
[28:58] Viktor Petersson
How much has actually happened there method.
[29:01] Viktor Petersson
Those guys are stuck in court for another 10, 15 years before we actually get some outcomes from that.
[29:07] Viktor Petersson
If TRA is the same story, then have we actually raised the bar?
[29:13] Olle Johansson
I think every little step that CRA changes, I don't believe for a minute that all products with a CE mark by 2027 will be secure.
[29:23] Olle Johansson
Won't will follow all the requirements and have a release analysis, have an.
[29:30] Olle Johansson
But every little step is for the better.
[29:32] Olle Johansson
Every discussion where developers meet product managers and win the security discussion saying we need encryption here, we need authentication here, we need to protect the user data, we need secure by default.
[29:47] Olle Johansson
Every little win is a is for the better for all of us.
[29:53] Olle Johansson
But since it's about people, I realize this will take more time than we expect,
[30:00] Anthony Harrison
I think.
[30:01] Anthony Harrison
Yeah, I mean the fines are there as a sort of a inverted common threat, aren't they?
[30:08] Anthony Harrison
To try and say okay, comply if you don't come.
[30:11] Anthony Harrison
If you don't comply, then you know, we'll confine you.
[30:16] Anthony Harrison
And I know certainly the GDPR, you know, small businesses SMEs that I work with, GDPR is very much front and center of their thought process because they don't want to be taken to court and fined because that's out of business.
[30:31] Anthony Harrison
Whether larger businesses have a slightly different view, I don't know whether CRA will be similar, whether CRA will actually hit the smaller businesses harder than the larger businesses.
[30:43] Anthony Harrison
Who knows, It'd be interesting.
[30:45] Anthony Harrison
Nissan Dora probably it is only generally large business, large enterprises that are really in scope.
[30:51] Anthony Harrison
I mean the supply chain might be, but ultimately it's the operators that are going to see it.
[30:58] Olle Johansson
But, but the thing with CRA and fines, I think the funds will come if you lie and cheat and you don't follow the authorities.
[31:07] Olle Johansson
One thing people miss, they look at the fines and they look that, well, if you're a small business, the fine has to be adjusted to fit your business and so on.
[31:17] Olle Johansson
But the worst weapon the authorities have is actually forbid your distribution of your product.
[31:25] Olle Johansson
Stop it in all change all your distributors, resellers, not allowed to sell a single item.
[31:33] Olle Johansson
That's going to hurt small businesses really bad.
[31:38] Olle Johansson
The fines, that's an insurance issue, right?
[31:41] Olle Johansson
Live or die, but that's someone else.
[31:44] Olle Johansson
But if your product is forbidden on the market, that's going to be really hard to explain to stock owners.
[31:53] Olle Johansson
Yeah, you're bored.
[31:57] Viktor Petersson
This is true.
[31:57] Viktor Petersson
This is true.
[31:58] Olle Johansson
I mean.
[32:00] Viktor Petersson
it's looking at the consumer landscape in Europe today where so much of the stuff that you buy on Amazon or even if you go direct AliExpress and Alibaba and all these sources, right.
[32:13] Viktor Petersson
You'll be lucky if you find android device that is not end of life when you buy it from China.
[32:19] Viktor Petersson
Right.
[32:21] Viktor Petersson
Most of it is already end of life by the time you buy it.
[32:23] Viktor Petersson
So good luck with CRA on that one.
[32:25] Viktor Petersson
But I guess the point, the reason why I'm raising it is because the change to all these resellers is going to be massive because so many vendors, I mean I can't speak to myself or myself in the digital signage world with screenly, right.
[32:43] Viktor Petersson
So many vendors out there just white label from China and put some software.
[32:51] Olle Johansson
Then you're basically a manufacturer in the eyes of them.
[32:55] Viktor Petersson
Yeah, but I guess this combined, I spoke with Sarah about this as well.
[33:01] Viktor Petersson
But when you speak into the real world out there, outside of our little bubble in the SBoM world, when you go and ask them about CRA, they'd be like, CR what?
[33:13] Olle Johansson
They have no idea.
[33:15] Olle Johansson
I met lawyers, I met business people and they're aware of me too, because large, I would say legal companies, legal advisors, financial advisors have been talking about that for a year or two.
[33:30] Olle Johansson
But CRA is totally under the radar.
[33:33] Anthony Harrison
Yeah, I think it's sort of percolating from the bigger organizations downwards.
[33:40] Anthony Harrison
And I think, you know, I don't think it's meeting the sort of the, you know, the small SMEs, you know, 50 to 100 employee type businesses who have probably got quite a little niche market.
[33:54] Olle Johansson
I think one problem is the fact that we're talking about the CMRC and the C mark for the radio directive and hardware has to be.
[34:05] Olle Johansson
Has been about electricity and radio leaking and other things.
[34:09] Olle Johansson
It's a test you do once before you launch a new product or when you upgrade, you do it once more.
[34:15] Olle Johansson
But it's a checklist and you're done, right?
[34:18] Olle Johansson
Yeah.
[34:18] Viktor Petersson
Well, it's also outsourced fully.
[34:20] Olle Johansson
Yeah.
[34:21] Olle Johansson
And people believe that the CRA and the C mark is the same, but the CRA points much more to your process.
[34:28] Olle Johansson
You have to do risk analysis and you have to do mitigations.
[34:31] Olle Johansson
There's no checklist according that fulfills your risk analysis and your threat model.
[34:38] Olle Johansson
And then you have to maintain the product during the whole lifetime.
[34:42] Olle Johansson
And you can't define the lifetime all by yourself.
[34:45] Olle Johansson
The market authorities will have a say in that.
[34:49] Olle Johansson
So if you're in a market where you sold products that exist out there in otis system for 15 years, you can't say three years.
[34:57] Olle Johansson
You have to have at least 10 or 15 years of free software upgrades and security maintenance for that.
[35:04] Anthony Harrison
So do you think the CRA, some of the things that the CRA is pushing because the CRA is the latest thing on the, you know, the newest idea.
[35:14] Anthony Harrison
Do you think some of the stuff will actually have an impact on things like NIST2 and Dora to try and bring some of the things together?
[35:22] Anthony Harrison
Because if you're an organization who is serving in multiple markets, really you want to have something that's common.
[35:28] Anthony Harrison
And one of the challenges I see is software and digital is generally a global thing rather than just an EU issue or US or UK issue.
[35:39] Anthony Harrison
So really what we want is we want single, I have to say benchmark, but choose that as a starting word which we all have to achieve and demonstrate.
[35:51] Anthony Harrison
So we'll get to that.
[35:52] Anthony Harrison
Or do you think we're, you know, is that 10 years off?
[35:55] Olle Johansson
There's only two things in that question.
[35:58] Olle Johansson
One needs to points specifically to CRA.
[36:03] Olle Johansson
The purchases even before CRA is active, needs to points to CRA and CRA compatibility.
[36:11] Olle Johansson
And they also changed a law for medical journal systems, I believe to point to CRA after the CRA was published.
[36:19] Olle Johansson
So they already changed the CRA a little bit.
[36:22] Olle Johansson
So they're going to use CRA for products in other regulations.
[36:27] Anthony Harrison
Interesting.
[36:31] Olle Johansson
Now I've forgotten about the second part.
[36:33] Anthony Harrison
So the thing was.
[36:34] Anthony Harrison
So the question is more about the global impact.
[36:36] Olle Johansson
Oh yeah.
[36:37] Anthony Harrison
In terms of, you know, that part.
[36:40] Olle Johansson
That, that's interesting in fact that the CRA, you, you know that they're working on horizontal and vertical standards.
[36:48] Olle Johansson
Horizontal are for all products, vertical are for special product niches, especially those that are in the classes this area talk about as important or critical products.
[37:03] Olle Johansson
But many people who earn money from these standards because you have to buy them like standards claim that you have to certify according to these.
[37:14] Olle Johansson
That's not the case.
[37:15] Olle Johansson
You can certify you self certified 99% of the products and you can certify according to the CRA law text.
[37:23] Olle Johansson
But the law also says that there will be agreements, multi or what they say, bilateral agreements.
[37:33] Olle Johansson
So if you're certified according to a law that is compatible with the CRA, requirement wise you'll be also certified for the CRA.
[37:42] Olle Johansson
And there was a meeting a few years ago between EU and us.
[37:49] Olle Johansson
I believe maybe it was cisa.
[37:52] Olle Johansson
I don't think that discussion have continued because since I've lost so much employees they don't have time for that.
[38:00] Olle Johansson
But the US government worked with something called the cyber trust mark for IoT and I believe they try to align the processes a bit.
[38:11] Olle Johansson
So if you that I think the vision was if you had the cyber Trust mark, you would also have the CE mark.
[38:19] Viktor Petersson
But it was, I mean that was one of the big EU talking points coming out Davos this year was about Fed like making the European market more compatible, for lack of a better word, where it is extremely fragmented today.
[38:33] Viktor Petersson
Like if you work in the German market and you're trying to work with like northern Europe, like it's a completely different framework to operate.
[38:40] Viktor Petersson
So that was a of part both from a financial perspective but also from like a legal framework perspective.
[38:45] Viktor Petersson
Right.
[38:45] Viktor Petersson
So there are some talking heads at the top that is trying to at least drive that narrative.
[38:53] Olle Johansson
Yeah, I mean that's why they're changing a little bit on these two.
[38:57] Olle Johansson
They're taking things back.
[39:00] Olle Johansson
I think they've seen that each country is making changes that makes it really hard to work cross border.
[39:07] Olle Johansson
Yeah, they're gonna take in the omnibus now.
[39:10] Olle Johansson
They're gonna take things back.
[39:12] Olle Johansson
So these two will be more of the same and very small variants.
[39:18] Olle Johansson
Yeah, that's gonna take some time.
[39:20] Olle Johansson
If it took us multiple years to get these two into the switch law.
[39:27] Anthony Harrison
And then if you look at countries outside the eu, uk.
[39:31] Anthony Harrison
Yes, yes.
[39:35] Anthony Harrison
You know, there's no equivalent to the CRA other than the CRA in Europe.
[39:41] Anthony Harrison
It doesn't exist in the other 200 countries or how many countries we've got in this world these days.
[39:47] Anthony Harrison
So if you are a manufacturer who wants to sell globally, are you then having.
[39:53] Anthony Harrison
Is CRA providing a huge overhead, additional overhead on selling to the us, selling to Asia or wherever.
[40:01] Anthony Harrison
What we need to really think about is well, is a CRA the best everybody should adapt to, or is it the one that people will make a decision?
[40:10] Anthony Harrison
I don't want to go to Europe because it's too onerous, it's too hard.
[40:15] Anthony Harrison
So I'll go outside Europe and the European Community has less options.
[40:21] Viktor Petersson
I mean, we used to have a polarized world even before CRA.
[40:24] Olle Johansson
Right.
[40:25] Viktor Petersson
So if you look at security compliance companies selling into the US market, they tend to do SoC2.
[40:31] Viktor Petersson
People selling into the European market, they do ISO2701.
[40:34] Viktor Petersson
Right.
[40:36] Viktor Petersson
Companies that play on both sides tend to do both.
[40:38] Olle Johansson
Right.
[40:39] Viktor Petersson
But CRA then becomes, does that become the North Star?
[40:44] Viktor Petersson
That kind of supersedes.
[40:45] Viktor Petersson
Because honestly, like I call a lot of the ISO sock 2 stuff because it's just paperworking nonsense.
[40:51] Viktor Petersson
But I'm curious about how.
[40:54] Anthony Harrison
It's a bit like gdpr, isn't it?
[40:56] Anthony Harrison
You've got the gdpr which has sort of things, but I know the US has got different, similar things.
[41:03] Anthony Harrison
The states have different things.
[41:05] Anthony Harrison
California.
[41:09] Olle Johansson
guys, Europe is in the lead here.
[41:12] Olle Johansson
Hello.
[41:13] Viktor Petersson
Yeah, right.
[41:14] Viktor Petersson
All righty.
[41:14] Viktor Petersson
Laws.
[41:15] Viktor Petersson
Yeah, absolutely, yeah.
[41:16] Olle Johansson
But jokingly aside, I have a friend who works worldwide with this kind of certification and he makes it very clear if you want to avoid being regulated when you sell products, there's not many countries you can go to.
[41:30] Olle Johansson
Even China is working on regulation.
[41:35] Olle Johansson
Not exactly the same, but regulation for cyber security and products you sell.
[41:40] Olle Johansson
So there are very few places you can escape to.
[41:44] Olle Johansson
Maybe CRA is going far because other countries start with IoT or other vertical sectors.
[41:53] Olle Johansson
The medical industry has been regulated for a long time.
[41:56] Olle Johansson
Even in Europe, automotive has been regulated for a long time.
[42:01] Olle Johansson
But we believe when they started talking about this array that they were going to regulate iot, then they expanded and suddenly the regulated mobile app and everything, toys, other things.
[42:16] Olle Johansson
So.
[42:16] Viktor Petersson
But yeah, it's an interesting narrative though because like you look at countries like South Korea is extremely progressive when it comes to like S bomb work, for instance.
[42:24] Olle Johansson
Right.
[42:26] Viktor Petersson
And.
[42:26] Viktor Petersson
But are we ending up with a very fragmented world now where it becomes like almost impossible to operate in this, all this many markets because everyone has their own implementation and nuances to this stuff.
[42:39] Viktor Petersson
Like I say love it or hate sock 2 and ISO, at least it's a new global standard.
[42:43] Viktor Petersson
Right.
[42:45] Anthony Harrison
I think we've got to be careful about.
[42:47] Anthony Harrison
And I've been a great one for standards because I think standards are great for interoperability and great, you know, for market access, but I'm not.
[42:56] Anthony Harrison
I want things that are freely available as well that are also that everybody sees.
[43:02] Anthony Harrison
So there's a little bit of a, if standards go behind paywalls, then the adoption I think can becomes a tariff ultimately and people will try and short circuit it, you know and we look at things like the RFCs and the web, all those standards are freely available and I think we've seen the great success that how standards come together because people collaborate and make them better friends.
[43:28] Olle Johansson
You, you have to understand, I mean I, I really admire the business idea of sense and elect.
[43:33] Olle Johansson
In the standard bodies you pay to get in, you contribute with time with it getting paid, but you're not even getting the documents you're writing for free.
[43:43] Olle Johansson
Then you have to pay to get the document.
[43:45] Olle Johansson
You get paid in both ends.
[43:48] Olle Johansson
It's a brilliant business idea, but it doesn't really help the world.
[43:52] Anthony Harrison
No.
[43:52] Olle Johansson
IPF publish open standards, ECMA International, the Cycle DX specification, the Pearl, the cle, all freely available.
[44:02] Olle Johansson
And I believe that helps implementations from very small companies, open source project up, large corporations.
[44:11] Olle Johansson
I think that's really important and I think that the other business idea will hopefully go away.
[44:17] Olle Johansson
But one thing, unless I steal that idea, such a new Johansson Standard Institute.
[44:25] Viktor Petersson
No, but one thing that's important to talk about when you talk about compliance standards is really the concept of self certification versus a certification body that in turn outsources their work to some kind of compliance organization.
[44:41] Olle Johansson
Right?
[44:41] Viktor Petersson
CRA is a self certified standard.
[44:47] Viktor Petersson
Yeah, yeah.
[44:49] Viktor Petersson
But there are other standards that are similar.
[44:51] Viktor Petersson
Whereas this is not true for ISO or SoC2 for instance.
[44:54] Viktor Petersson
It's not.
[44:55] Viktor Petersson
You cannot self certify and say hi, I'm compliant, you can do it.
[45:00] Viktor Petersson
Soc 2 Type 1 I think is self certified.
[45:02] Viktor Petersson
Type 2 is not if I'm not if I got my lingo right.
[45:06] Viktor Petersson
But Anthony, you kind of brought the UK into the question.
[45:12] Viktor Petersson
But let's take the turns a little bit and turn into the UK market.
[45:16] Viktor Petersson
It is a bit of an oddball because it's kind of, it is Europe but not Europe.
[45:20] Viktor Petersson
So let's unpack.
[45:21] Anthony Harrison
The good thing that you said it,
[45:24] Olle Johansson
Victor, I would be a very bad spot if I said something.
[45:27] Viktor Petersson
Yeah, I mean I hey, I'm belly in from the uk so like hey, I can take the battle but my point is there've been a lot of stuff work like GCHQ and so on, they didn't put out a lot of stuff.
[45:39] Viktor Petersson
And good documentation, good recommendations around, secure by default, secure design, but it doesn't quite have any teeth.
[45:49] Viktor Petersson
Let's pick up on that.
[45:50] Viktor Petersson
Where's your head at that.
[45:53] Anthony Harrison
How long have we got?
[45:56] Anthony Harrison
I think you're right that basically.
[46:00] Viktor Petersson
the.
[46:00] Anthony Harrison
UK works very globally with, you know, the US etc.
[46:04] Anthony Harrison
And we all, you know the problems the UK has in France and US has in terms of cyber security.
[46:10] Anthony Harrison
Yeah.
[46:11] Anthony Harrison
We all suffer and they are doing things to keep, to protect the nations safe and secure.
[46:17] Anthony Harrison
Fine.
[46:18] Anthony Harrison
When I have an issue with things like the CRA, which is now.
[46:22] Anthony Harrison
The CRA has now gone down to digital products, you know, consumer devices, quite small devices, you know, your baby monitors, your light bulbs.
[46:30] Anthony Harrison
We don't have anything equivalent in the uk.
[46:32] Anthony Harrison
Now the UK issued last year the Software Security Code of Practice.
[46:38] Viktor Petersson
Yeah.
[46:39] Anthony Harrison
And they claim it aligns with the CRA and it comes out with 14 principles and it says you need to have knowledge of your supply chain, you need to do, you know, get governance control, etc.
[46:54] Anthony Harrison
Understand vulnerability management, etc.
[46:57] Anthony Harrison
But it's voluntary.
[46:59] Anthony Harrison
There is no compulsion for anybody to demonstrate they are compliant with that.
[47:06] Anthony Harrison
I was involved in the, when it came out in draft and we gave them comments about.
[47:13] Anthony Harrison
Because they called it the Software Code of practice and it was aimed at software, what we call software vendors.
[47:18] Anthony Harrison
I said it's going to miss the target audience because the target audience means the people who are using software, not just a software vendor like a Microsoft just use a vendor as just creating a software product is.
[47:32] Anthony Harrison
The integrated product was missing out.
[47:35] Anthony Harrison
So I've raised it.
[47:36] Anthony Harrison
I said that the voluntary, if it's voluntary, you will not get the behavior changes that you require to deliver secure projects.
[47:43] Anthony Harrison
And this is exactly the same way the US went with the medical device market in terms of they promoting secure by design, exactly the same way the UK has.
[47:52] Anthony Harrison
But the manufacturers were not complying until the regulation came along and then they got the required evidence.
[48:01] Anthony Harrison
So when I've been talking to people about secure by design, there's some companies starting to think about secure by design, but there's no benchmark and it's not a case of, well, do you go to a consultant to say, do I get a tick in the box?
[48:14] Anthony Harrison
Nobody knows what good looks like yet.
[48:17] Anthony Harrison
And that's the challenge I think we have.
[48:19] Anthony Harrison
We know what we should be doing, but there's no exam to pass yet.
[48:24] Anthony Harrison
And people love a checklist ultimately.
[48:27] Anthony Harrison
And I don't like checklists because it's evidence based, but people want that checklist so they can stick in the box and say, I am now, you know, CRA UK compliant.
[48:39] Anthony Harrison
And that's what people tend to look for.
[48:41] Anthony Harrison
It's the Easy A.
[48:43] Anthony Harrison
So I wish the UK would align with the, with what's happening globally, but I know there are challenges getting the industry aligned.
[48:58] Anthony Harrison
And I think the big challenge probably is the public sector getting the public sector to align with the requirements of such things like that, because it's really difficult to get them to move.
[49:09] Viktor Petersson
That's the big irony.
[49:10] Viktor Petersson
I forgot which piece of legislation it was.
[49:12] Viktor Petersson
I think it was Sweden or was it somewhere else.
[49:15] Viktor Petersson
But they basically put that mandate that everybody needs to do is secure by the side except the government.
[49:20] Viktor Petersson
And she's like, wait, shouldn't you lead by example?
[49:24] Anthony Harrison
And I personally, I agree, Victor, is that when I've presented S bombs and things like that, and I said we need somebody like the government.
[49:33] Viktor Petersson
Yeah.
[49:33] Anthony Harrison
To take, to take the example.
[49:35] Anthony Harrison
And then in the same way that US has done is people contracting to the Fed, they get it, then it becomes part of the, you know, the ecosystem because the government is the, you know, is the biggest customer of anything.
[49:51] Viktor Petersson
I mean, just to use kind of analogy here, like UI UX for instance, I mean, for those not in the UK are probably not familiar with this, but the UK government got a UI UX guideline that every single UK government portal must adhere to.
[50:07] Viktor Petersson
So they have like a design UI UX kit that every single UK government service follows, which I think is actually great.
[50:16] Viktor Petersson
Like you might like or dislike the UI ux, it doesn't really matter, but it is thought through and it follows best practices for most things.
[50:24] Viktor Petersson
We kind of need the same thing for cybersecurity now.
[50:27] Anthony Harrison
Now, one of the things I was involved, there was a survey and they were asking, do I use software that's come from outside the uk?
[50:36] Viktor Petersson
Well, what does that even mean?
[50:38] Anthony Harrison
What does that mean?
[50:39] Anthony Harrison
That's a good question.
[50:40] Anthony Harrison
But.
[50:41] Anthony Harrison
And the analogy I was saying when I had a chat with somebody said if I write my software in my laptop in Manchester and then I take my laptop and write it, that when I go to Paris, am I now writing software in Paris and am I using software that's now come from the outside the uk?
[50:55] Anthony Harrison
It doesn't make sense because, you know.
[50:58] Anthony Harrison
But why that.
[51:00] Anthony Harrison
Why is not a question they were thinking that's relevant.
[51:04] Viktor Petersson
Well, I mean, we've had a lot of those conversations.
[51:06] Viktor Petersson
When I was involved with cisa, a lot of the working groups, one of the talking points around that is around who wrote the code.
[51:12] Olle Johansson
Right.
[51:12] Viktor Petersson
This is kind of nest bombs, right.
[51:14] Viktor Petersson
Like what's the GitHub handle?
[51:17] Anthony Harrison
It doesn't matter where they're writing it.
[51:19] Anthony Harrison
Who's writes it?
[51:20] Anthony Harrison
Isn't it?
[51:20] Viktor Petersson
Well yeah, but, but also how do you do attribute like it's almost impossible.
[51:28] Olle Johansson
But shall we take another.
[51:30] Olle Johansson
I mean if you look at these two CRA and everything it's.
[51:35] Olle Johansson
And secure by design.
[51:37] Olle Johansson
One trend that was discussed heavily a year ago or more was shift security left.
[51:43] Viktor Petersson
Yeah.
[51:44] Olle Johansson
The question is who do we shift left?
[51:47] Olle Johansson
Because they don't exist in most organizations.
[51:51] Olle Johansson
And we also had a discussion at my conference last time about legal needs to be in there as well because with risk assessments that is part most of all these regulations legal needs to be involved in the risk assessment because that's a legal decision they claim.
[52:09] Olle Johansson
So we need to shift legal left.
[52:11] Olle Johansson
And the problem with that is that the legal department is very used to say no and not come up with solutions and say yes.
[52:20] Olle Johansson
And the same goes for security.
[52:22] Olle Johansson
You developed a service software as a service or something.
[52:28] Olle Johansson
You develop a product and in the last minute before launch you have a security review.
[52:32] Olle Johansson
You have a pen test and you have security people that act as police saying yes or no.
[52:38] Olle Johansson
And if they say no you'll get additional cost and you have to go back and rebuild.
[52:43] Olle Johansson
But they're not part of that process.
[52:45] Olle Johansson
You come back after a while to another toll gate where they stand and check your product from their big shares.
[52:55] Olle Johansson
This is a culture shame for a lot of people.
[52:58] Olle Johansson
And the question is where are those people?
[53:02] Olle Johansson
Companies today doesn't pay for training.
[53:05] Olle Johansson
Companies are.
[53:08] Olle Johansson
We're in a financial climate where we can't employ a lot of new people.
[53:13] Olle Johansson
So how can we do this?
[53:16] Olle Johansson
There big change both in the eastern sectors and all producers of products in.
[53:22] Viktor Petersson
08 for the producer software.
[53:25] Viktor Petersson
I think as much as I hate to use the phrase but I think AI is actually the savior here because the reality is that modern models we have today, like look at Opus, they will write better and more secure code than the average developer.
[53:40] Viktor Petersson
I would argue that Opus 4.6 probably writes better code than 98% of developers out there.
[53:46] Viktor Petersson
Right.
[53:48] Viktor Petersson
And more secure.
[53:50] Viktor Petersson
So I guess what I'm saying is in one way it's easier than ever to write more secure code in that way.
[53:59] Olle Johansson
It is.
[53:59] Viktor Petersson
And also auditing that code is easier than ever was.
[54:02] Olle Johansson
Right.
[54:03] Viktor Petersson
Because now you can have an LLM that's trained on security dimensions and it can do a full on audit on your code base in minutes or hours.
[54:13] Viktor Petersson
Right.
[54:13] Olle Johansson
You someone needs to understand that audit.
[54:17] Olle Johansson
Oh 100.
[54:18] Viktor Petersson
But that's why the role of the engineer is changing to becoming an architect.
[54:25] Viktor Petersson
From a code monkey.
[54:26] Viktor Petersson
Right.
[54:27] Viktor Petersson
That is a huge.
[54:28] Olle Johansson
That architect needs to know.
[54:30] Olle Johansson
Secure by design.
[54:31] Viktor Petersson
Yes, yes.
[54:33] Olle Johansson
The mechanisms.
[54:34] Olle Johansson
And at the same time as we do all this and have this mountain of stuff to do for these two and for CRA compliance we have the post quantum crypto thing coming and yeah, we haven't seen all that regulation but that will happen during the coming five to 10 years during your product's life cycle.
[54:56] Olle Johansson
But this is interesting because that means we need to have crypto agility.
[55:00] Olle Johansson
We need to be able to change for products that exist out there in runtime.
[55:05] Olle Johansson
We need to change the whole crypto engine.
[55:08] Olle Johansson
We need to switch trust anchors and most companies haven't even thought of doing that.
[55:14] Olle Johansson
They're running PKIs with oh, we have 30 year certificates so we never have to bother.
[55:19] Olle Johansson
At least not before I retire.
[55:21] Viktor Petersson
Low crypto RSA stuff and.
[55:25] Viktor Petersson
But I want to steer it back to open source again because I think it's really important because I want to throw.
[55:31] Olle Johansson
I got you there.
[55:32] Anthony Harrison
Oh no.
[55:34] Viktor Petersson
I would love to talk PKI but I think it's been out of scope for the conversation.
[55:37] Viktor Petersson
We can do another episode of PKI because I would, I'd love to talk PKI with you because that's actually something I really enjoy.
[55:43] Viktor Petersson
But I want to turn this back to open source for a simple reason.
[55:47] Viktor Petersson
Because we started talking about the liability of open source in vendors and if we overlap that with the fact that these LLMs can write code very quickly.
[56:00] Viktor Petersson
So I saw a really interesting thought experiment the other day and someone was.
[56:07] Anthony Harrison
saying.
[56:09] Viktor Petersson
because these LLMs are so good these days and if we assume the rate of change is at the pace it has been for the last 612 months and they just could get better and better.
[56:21] Viktor Petersson
The argument someone was making, I forgot to credit it but it was basically like it makes it irrelevant for using open source in commercial products because it's more of a liability for the simple reason that if you're using open source then you need to do complete different supply chain management versus if your LLM is writing all that boiled code himself.
[56:47] Viktor Petersson
It changes the dimensions for security.
[56:51] Anthony Harrison
But what you're doing is.
[56:56] Anthony Harrison
I can see why someone say that because what you've got is you've got first party code, but you've got all of the code is first party code.
[57:04] Anthony Harrison
If you have some code that's open source, you've actually got a bigger development team because the open source community is looking after that bit of code for you as well.
[57:13] Anthony Harrison
Do you want to do.
[57:14] Anthony Harrison
And I can see both Sides if you want to be completely in control to the LLM, which is much the same way people like inner source, where they may think take all the open source and control it themselves, then periodically bring stuff from the outside.
[57:31] Anthony Harrison
Or do you use the open source community for what it's great at?
[57:34] Anthony Harrison
Unpaid, often no commitment, but some awesome development work and some awesome features who are actually far more responsive than maybe you can because you've got a thousand development teams in parallel rather than one development team.
[57:50] Viktor Petersson
This is not me shading open source.
[57:54] Viktor Petersson
I think it's fantastic.
[57:55] Viktor Petersson
I'm just saying the argument that this person was making was basically like when you're pulling in an open source library, you're going to use 1% of that code base.
[58:04] Anthony Harrison
Yeah, I can see that.
[58:05] Anthony Harrison
Yes.
[58:07] Viktor Petersson
The probability of vulnerability in that 1% of that code base is relatively small compared to you pulling an entire library.
[58:14] Anthony Harrison
So what I've been looking at is, and this is from some of the ideas that have been played around with Fosdem is I think SBOMs we need to go even lower than we currently do because we're at the component level, which it says I've got a library and I've got functions.
[58:29] Anthony Harrison
I'm not documenting which of those hundred functions I'm using now.
[58:34] Anthony Harrison
I've been looking at doing that for binaries and I've got somewhere with that.
[58:39] Anthony Harrison
It would be good to start getting that level of increased level of granularity such that allows you to say, well, if I am affected, am I really affected?
[58:50] Anthony Harrison
Because actually the S BOM or the transparency is going down to that level of detail and we don't have that.
[58:56] Anthony Harrison
And we don't have that with anything at the moment.
[59:00] Olle Johansson
That, that's typical us because we're, we worked for quite some time now with bombs and we're looking at the next step while most of the people are not.
[59:10] Olle Johansson
Haven't really begun the first step.
[59:13] Olle Johansson
Right.
[59:13] Olle Johansson
But I do agree we need to go to a component level at some time, but that's going to cost a lot more time and money.
[59:19] Olle Johansson
But Victor, coming back to your way of thinking there, I'm an old network guy.
[59:26] Olle Johansson
I, I built networks, which is Piper trained people in Ethernet and IP and LDAP and all that.
[59:33] Olle Johansson
I worked for 10 years with the SIP protocol, so I'm a protocol geek.
[59:38] Olle Johansson
And what we see today in the world of networking is that most people take it assumed that it's working and the knowledge is disappearing from organizations.
[59:50] Viktor Petersson
Yes.
[59:50] Olle Johansson
So even basic misconfiguration and problems can't be solved because there's no one home.
[59:58] Olle Johansson
What if your scenario with coding happens and we got a problem that the LLM can solve for you?
[01:00:07] Olle Johansson
We need someone that goes in and analyze the code and fixes the problem or finds it and helps the LLM.
[01:00:14] Olle Johansson
Well, I mean that person won't be there.
[01:00:17] Viktor Petersson
You're right, you're right.
[01:00:20] Anthony Harrison
However.
[01:00:24] Olle Johansson
serious cost and problem 100 I, I just.
[01:00:27] Viktor Petersson
The future scenario that I envision in 5, 10, 15 years from now is these LLMs will write code that no human can understand.
[01:00:37] Viktor Petersson
They might help, they might even write assembly straight up.
[01:00:39] Viktor Petersson
Right.
[01:00:40] Olle Johansson
And yeah, they don't need the abstraction layer we need.
[01:00:44] Viktor Petersson
Exactly, exactly.
[01:00:46] Viktor Petersson
So, so maybe that argument is kind of moot because, well, the pool of people on the planet today that could do assembly that well is very small,
[01:00:56] Anthony Harrison
but that comes, you know, I've worked in sort of what you'll call critical infrastructures and where safety and security and you know, we can argue safety and security where they are.
[01:01:08] Anthony Harrison
I want determinism, I want stability, I want guarantees.
[01:01:14] Anthony Harrison
You thought something into an LLM, you've no guarantee you're going to get the same thing the next day.
[01:01:20] Anthony Harrison
No, if you use a coder, a developer, a person with experience, you're going to get roughly the same.
[01:01:27] Anthony Harrison
Okay, they'll learn and they might get better, but you're going to see some relationship.
[01:01:34] Anthony Harrison
So I think we've got to be really careful about assuming everything doesn't need the human involvement.
[01:01:42] Anthony Harrison
In particular these regulations need the evidence.
[01:01:46] Anthony Harrison
And if you can ask the developer why he made a decision.
[01:01:49] Anthony Harrison
And currently I've got a student working for me and we're trying to emphasize the importance of writing those assumptions that you may implicitly writing those down, someone can pick them up six months later.
[01:02:01] Anthony Harrison
LL doesn't do that.
[01:02:03] Anthony Harrison
And if we need to do that when we can understand when an issue happens in a product and we can say, well, we made that design decision not to do, not to encrypt that data flow because it's a design decision, but it's captured, at least you've got some evidence to start with of why you've got, maybe you've got the consequences of not doing that.
[01:02:22] Olle Johansson
We are going that direction.
[01:02:24] Olle Johansson
I mean, look at the way we, I mean 15 years ago when we created a system, we had this UNIX guy, Linux guy that installed all the things.
[01:02:33] Olle Johansson
He was magical and he installed everything and then installed the application, got it running.
[01:02:40] Olle Johansson
Nowadays we have a lot of systems as Code, we have terraforms, we have docker files, we set up stuff.
[01:02:48] Olle Johansson
But we seldom log into all of these.
[01:02:51] Olle Johansson
Right.
[01:02:52] Olle Johansson
We don't sit with Chop or anything.
[01:02:54] Olle Johansson
We monitor.
[01:02:57] Olle Johansson
And what you're saying is we're going to take the next step and say the input to the LMS is the code.
[01:03:04] Olle Johansson
That's what we're going to manage and control.
[01:03:06] Olle Johansson
But the code, well, we won't even understand it and we don't have to.
[01:03:11] Olle Johansson
But I guess we need much better test systems.
[01:03:15] Olle Johansson
The whole paradigm is changing.
[01:03:17] Olle Johansson
But it's always been changing.
[01:03:19] Viktor Petersson
Yeah, but I mean this is what some of the smartest people in the AI world is working right now.
[01:03:23] Viktor Petersson
It's the guardrails around that.
[01:03:25] Olle Johansson
Right.
[01:03:25] Viktor Petersson
How do you put up guardrails?
[01:03:27] Viktor Petersson
And without losing philosophy.
[01:03:29] Anthony Harrison
But picking up the bird testing, isn't that bringing everything back?
[01:03:35] Anthony Harrison
The reason they want the regulation is because people are releasing products that haven't been tested adequately.
[01:03:44] Viktor Petersson
objective.
[01:03:47] Anthony Harrison
Yeah.
[01:03:47] Anthony Harrison
And you know, we all know we can always test.
[01:03:50] Anthony Harrison
Testing is always time bound, you know, and actually, okay, AI could help do that.
[01:03:56] Anthony Harrison
But ultimately, how do you know you have tested every possibility?
[01:04:00] Anthony Harrison
Because if once you've tested every possibility, then your product will never be on the market.
[01:04:06] Viktor Petersson
Test every possibility.
[01:04:08] Viktor Petersson
Machines are really good at testing every possible possibility.
[01:04:12] Anthony Harrison
How do you do that?
[01:04:14] Olle Johansson
Yeah, the testing has focused on the functionality the customer requires, the blinking lamps and all the cool stuff.
[01:04:22] Olle Johansson
But they totally ignore the security aspects.
[01:04:24] Olle Johansson
They haven't looked for security holes.
[01:04:26] Olle Johansson
They haven't.
[01:04:27] Anthony Harrison
Yeah.
[01:04:27] Olle Johansson
I mean they ignore the vast amounts of cyber security knowledge that's been out there for business reasons.
[01:04:34] Olle Johansson
And I understand that if you operated a business with maximum profit as the goal, there was no reason because customers bought your.
[01:04:43] Olle Johansson
There's no reason to invest in cyber security.
[01:04:45] Olle Johansson
And by the way, the cyber security experts, they're weird people.
[01:04:49] Olle Johansson
You don't want to hang out with them.
[01:04:50] Olle Johansson
Right.
[01:04:52] Olle Johansson
So.
[01:04:53] Viktor Petersson
No, no.
[01:04:54] Viktor Petersson
But this is the way back to where we started.
[01:04:56] Olle Johansson
Legislation is needed to fix this.
[01:04:58] Anthony Harrison
Yeah.
[01:04:59] Olle Johansson
Be a culture change.
[01:05:01] Olle Johansson
And legislation won't fix the culture and how people act and think.
[01:05:05] Anthony Harrison
But people have got to think.
[01:05:06] Anthony Harrison
And this is where secure by design can come in as well.
[01:05:09] Anthony Harrison
Because a lot of people focus on the functionality, as you say, the use cases.
[01:05:13] Anthony Harrison
When I train people, I say you need to think differently, not like an engineer sometimes.
[01:05:19] Anthony Harrison
And you have to think about the abuse cases.
[01:05:21] Olle Johansson
Yeah.
[01:05:22] Anthony Harrison
And that's that suddenly things.
[01:05:24] Anthony Harrison
Well, what's an abuse case?
[01:05:25] Anthony Harrison
Well, it's not written down.
[01:05:27] Anthony Harrison
Well, that's.
[01:05:27] Anthony Harrison
The hacker hasn't got a playbook of how to Hack your product.
[01:05:30] Anthony Harrison
He's got some playbook things of things that common failures but he's not going to, you know, he'll find things that are not written down.
[01:05:38] Anthony Harrison
So therefore how do you ensure that?
[01:05:41] Anthony Harrison
And that's the things that's where the testing is.
[01:05:43] Anthony Harrison
Maybe, you know, you can automate a lot of it, but maybe you do need to have a different thinking and you know, how much testing do you do?
[01:05:51] Anthony Harrison
There's a, you know.
[01:05:54] Anthony Harrison
Yeah, you know, I mean how much training do you need to do for a marathon?
[01:05:57] Anthony Harrison
Well, you've got time.
[01:05:58] Anthony Harrison
Yes, yes.
[01:05:59] Anthony Harrison
You know, you've got to do.
[01:06:01] Anthony Harrison
Be pragmatic sometimes.
[01:06:03] Viktor Petersson
Yeah, I'm just saying like training and data set on say OWASP top hundred is relatively trivial and running that against a code base is relatively trivial.
[01:06:12] Viktor Petersson
That's more than most companies out there are doing today.
[01:06:17] Olle Johansson
Right.
[01:06:18] Viktor Petersson
And that's why I'm like I'm bullish on agents to do security audits because they can be very specific and they are read up on the latest vulnerabilities and whatnot, have that data set.
[01:06:30] Viktor Petersson
Whereas an old school security guy might go to like two conferences a day a year and pick up on new stuff.
[01:06:36] Viktor Petersson
Whereas.
[01:06:37] Viktor Petersson
So like it's a moving target.
[01:06:38] Viktor Petersson
Right?
[01:06:38] Viktor Petersson
Yeah, but, so let's steer this back to CRA which ultimately steers us to S BOMs because I think that's the common thread between all of us.
[01:06:49] Olle Johansson
What am I. Oh, back to home turf, Victor.
[01:06:52] Viktor Petersson
Back to home turf indeed.
[01:06:53] Viktor Petersson
But one thing that worries me a little bit around the SBoM requirements in CRA is that people treat it as a checkbox exercise and they would just submit something and as we all know, garbage in, garbage out.
[01:07:12] Viktor Petersson
Right.
[01:07:12] Viktor Petersson
Because if there's no audit of that, how do we like or even.
[01:07:17] Viktor Petersson
Let me ask a question like how do we even prevent that from happening?
[01:07:21] Olle Johansson
First, there's no obligation to submit anything until I mean if you're certified there may be other rules.
[01:07:29] Olle Johansson
Right.
[01:07:29] Olle Johansson
But if you're self certified until the market authority asks you.
[01:07:34] Olle Johansson
But there's also a clause saying that market authorities may ask you to collect statistics from their spons.
[01:07:42] Olle Johansson
But I think that there is a mistake.
[01:07:44] Olle Johansson
When they wrote here, they specified clearly there's bomb the authorities will ask for, which is at least top level dependencies because they can find out the rest if they have the top levels.
[01:07:55] Olle Johansson
Right.
[01:07:56] Olle Johansson
And they're well known unless they're internal.
[01:07:59] Olle Johansson
So you have Victor 1, Victor 2, Victor 3 as top level dependencies.
[01:08:05] Olle Johansson
No one knows what that is, you probably need to go one layer down there.
[01:08:09] Olle Johansson
But the rest of the text indicates clearly that the vendor is responsible for everything.
[01:08:15] Olle Johansson
He sells all the components and he needs to have due diligence, he needs to have vulnerability checks, he needs to do pen testing.
[01:08:25] Olle Johansson
So in order to comply with that, you need a database of all your components.
[01:08:31] Olle Johansson
And you probably also want the licenses and the copyrights and the package URLs for checking it.
[01:08:39] Olle Johansson
And you end up with a full S bond, not level dependency.
[01:08:43] Olle Johansson
Right?
[01:08:44] Olle Johansson
You can call it whatever you want, Excel, spreadsheet or database, but it isn't software bill of materials.
[01:08:51] Olle Johansson
So the law.
[01:08:52] Olle Johansson
Could I be more clear that.
[01:08:54] Olle Johansson
Well, the thing you deliver to market authorities is one.
[01:08:58] Olle Johansson
But in order to fulfill the process here, you certainly need a full SBoM.
[01:09:04] Anthony Harrison
But going back to what you said, how do you know whether it's complete or how do you know whether it's right?
[01:09:11] Anthony Harrison
And I think this is one of the big challenges we have as an SBoM community is we have no consistency.
[01:09:20] Anthony Harrison
If you own one tool and you've got five dependencies, direct or indirect, just matter, and you have another tool that tells you 10, how do you know which is right?
[01:09:31] Anthony Harrison
Because if you only take the five and you only monitor those five components, you can still have a vulnerability that could be exploited in a component you don't know about.
[01:09:43] Anthony Harrison
You will still be affected by the COA because you have a requirement to not deliver a product without exploitable vulnerabilities, whatever that might mean.
[01:09:54] Anthony Harrison
So we have a quality problem in terms of how do you ensure the things.
[01:09:58] Anthony Harrison
So I strongly recommend to people that they should never just use one tool.
[01:10:02] Anthony Harrison
They should use multiple tools and often try and aggregate those and try and say, well, if they are significantly different, well, maybe get a third tool to try and arbitrate.
[01:10:16] Anthony Harrison
But if they are radically different, that's a danger.
[01:10:21] Anthony Harrison
The danger I see is people were going to select one tool and assumes that's the right thing to do.
[01:10:27] Anthony Harrison
I've never been of that view.
[01:10:28] Anthony Harrison
When I used to compile code in C, I would always have two or three compilers and compile them and prove it worked.
[01:10:37] Olle Johansson
different states.
[01:10:37] Olle Johansson
Here, the tool.
[01:10:39] Olle Johansson
I fully agree with Anthony here.
[01:10:41] Olle Johansson
I've been in projects where management bought a fancy cool tool from a company and it didn't work for our code base at all.
[01:10:51] Olle Johansson
But people believe that, well, we run it, we comply with the management and we're happy.
[01:10:57] Olle Johansson
But they didn't have any S bomb.
[01:11:00] Olle Johansson
I think that's critical.
[01:11:01] Olle Johansson
But if you go back to CRA you need sboms for your development work, that's fine.
[01:11:07] Olle Johansson
But the product you deliver may be something else.
[01:11:10] Olle Johansson
There may be an installer, there may be hardware firmware like we discussed IPMAI earlier, and other things.
[01:11:19] Olle Johansson
The market Authority will want SBOMs of the product, not your code, only the product you're placing on the market.
[01:11:30] Olle Johansson
Yeah, and I think that's the critical difference that people are quite often missing, that the product you placing on the market can contain a lot of different things.
[01:11:41] Viktor Petersson
Let me tell you firsthand, if you're a PC manufacturer today or OEM selling PCs to the European market, you're not gonna find a vendor out there, to my knowledge, that can value S BOM of every single firmware.
[01:11:55] Viktor Petersson
They do not exist.
[01:11:57] Viktor Petersson
I've looked.
[01:11:58] Viktor Petersson
I am not aware of any that can buy your SBoM, except to some extreme niche players, perhaps.
[01:12:06] Olle Johansson
But, but also check the agreements.
[01:12:08] Olle Johansson
When you buy a board and you get firmware and you get drivers and other things, the agreements may be problematic if you want to reveal what's in there.
[01:12:17] Olle Johansson
And yeah, as you said, they're not ready to provide you with S bombs, which means you may have to change board manufacturer.
[01:12:26] Olle Johansson
And that means you have less than one and a half year to do that and rewrite your code for that.
[01:12:34] Viktor Petersson
Yeah, yeah.
[01:12:36] Anthony Harrison
And I think, you know, if people are, if, you know, if some manufacturers aren't prepared to deliver an S bom, then does the onus then become on the manufacturer to create an S bomb?
[01:12:47] Viktor Petersson
Well, good luck doing that with AMI bias or something like that.
[01:12:52] Viktor Petersson
Right, Correct.
[01:12:53] Anthony Harrison
So therefore is, you know, that's a challenge that people are going to have to do and it won't be, you know, do we want everybody to be doing that?
[01:13:02] Anthony Harrison
So, you know, choose your bios.
[01:13:04] Anthony Harrison
And the BIOS is in hundreds of products.
[01:13:06] Anthony Harrison
Does that mean you want hundreds of people trying to do the same job or not?
[01:13:11] Anthony Harrison
Where does that, where does that go?
[01:13:13] Olle Johansson
We, we're now in a very technical, exact world, which is good for engineers.
[01:13:19] Olle Johansson
We feel safe and comfortable.
[01:13:21] Viktor Petersson
Comfortable.
[01:13:21] Olle Johansson
But we also have to realize the market authorities doesn't have the knowledge.
[01:13:26] Olle Johansson
They don't.
[01:13:27] Olle Johansson
They're staffing up in Sweden.
[01:13:28] Olle Johansson
We haven't even made decision about which market authorities.
[01:13:31] Olle Johansson
We have a proposal so that they haven't got the directives, they haven't got the funding, they haven't got the staff.
[01:13:37] Olle Johansson
So this will be a market problem that, as Anthony indicated, will apply to many different companies.
[01:13:45] Olle Johansson
And I think it's an issue we have to take later.
[01:13:48] Olle Johansson
We have to start with baby steps.
[01:13:50] Olle Johansson
And move ourselves upward the stack.
[01:13:52] Olle Johansson
But it's going to be a problem at some point.
[01:13:55] Olle Johansson
Absolutely.
[01:13:56] Viktor Petersson
Yeah.
[01:13:56] Viktor Petersson
I mean, piggyback on that narrative.
[01:13:58] Viktor Petersson
Like when I had Sarah on the show we talk about.
[01:14:00] Viktor Petersson
Because she was on attacking committee for CRA.
[01:14:02] Olle Johansson
Right.
[01:14:02] Viktor Petersson
So she has a lot of insight into the reasoning of why things are written the way they are.
[01:14:06] Viktor Petersson
But she was basically saying to your point, it's about showing effort.
[01:14:11] Viktor Petersson
That's the thing like, and kind of like what I was.
[01:14:14] Viktor Petersson
My, my talk at Folstom was essentially about how you generate SBoM that's CRA compliant.
[01:14:19] Viktor Petersson
And it's about showing effort that you're moving in the direction.
[01:14:24] Olle Johansson
You won't get fines if the market authority finds a component you haven't got in your S bom.
[01:14:31] Olle Johansson
But if you ignore them and don't update your S bom, then you will be in trouble.
[01:14:38] Olle Johansson
So it's a lot about cooperation and as you say, process here way is more about process than checklist business.
[01:14:44] Viktor Petersson
Yeah.
[01:14:44] Anthony Harrison
And people and I've always said, you.
[01:14:47] Olle Johansson
know, models, which is the critical issue, it doesn't point to management, but it will end up in management because it's going to change the business model.
[01:14:57] Olle Johansson
The cost of maintaining a product will be much higher than before and many companies doesn't have a revenue to match that cost.
[01:15:06] Anthony Harrison
I, I've always said, you know, when I used to, when I got started getting looking at open source licensing, you know, ignorance is no defense.
[01:15:15] Anthony Harrison
And I said, you know, when I tell the engineers, you know, this is what the challenges are, basically at least take it seriously and try and do the best you can.
[01:15:25] Anthony Harrison
You're not going to be perfect, but at least you'd have made an effort to try and capitalize, you know, to look at, you know, has that application got a license, a valid license or not against your policy.
[01:15:36] Anthony Harrison
And I think the SCRA is going to start with that and exactly as you say.
[01:15:41] Anthony Harrison
And Sarah would say would.
[01:15:42] Anthony Harrison
Let's, let's demonstrate commitment.
[01:15:44] Anthony Harrison
We're committed to try and do that.
[01:15:46] Anthony Harrison
We're never going to be perfect because perfect doesn't.
[01:15:48] Anthony Harrison
No one's defined what perfect exists.
[01:15:51] Anthony Harrison
Then when we start looking at all the different standards around the world in terms of what should we include in our SBoM?
[01:15:59] Anthony Harrison
Yeah, that will evolve over time, but I don't want us to get fixated is it JSON, is it XML, is it CycloneDx, SPDX?
[01:16:09] Anthony Harrison
I just want to make sure have we got that inventory of information that we can then start doing things to actually make society secure more Secure and more resilient.
[01:16:18] Anthony Harrison
Ultimately that's the goal we want to get to.
[01:16:21] Olle Johansson
Yeah, I'd love to have a one hour discussion about XML or ABCDIC or Jason.
[01:16:26] Viktor Petersson
Well, the longest word is that if you hate yourself, go for xml.
[01:16:29] Viktor Petersson
If you don't hate yourself, go for JSON.
[01:16:32] Olle Johansson
We're not even talking about XML schemas.
[01:16:34] Olle Johansson
But anyway, I think Anthony's point is important here.
[01:16:38] Olle Johansson
Yeah, it's about making society more secure.
[01:16:41] Olle Johansson
Yes.
[01:16:41] Olle Johansson
Racism about making society secure.
[01:16:44] Olle Johansson
Yeah.
[01:16:44] Olle Johansson
It's the process.
[01:16:46] Viktor Petersson
Yeah.
[01:16:47] Olle Johansson
Ultimately critical.
[01:16:48] Viktor Petersson
That's one thing.
[01:16:49] Viktor Petersson
Right.
[01:16:49] Viktor Petersson
It's when we're looking at again, kind of throw back to my first time talk is basically people want an easy button.
[01:16:58] Viktor Petersson
That's the vast majority of the people that needs to adhere to CRA, they do not care of.
[01:17:06] Viktor Petersson
Between Cyclone spdx, Cyclone versions.
[01:17:10] Viktor Petersson
SPDX versions, build, run all these like neons that we kind of like in this little bubble spend the days talking about the vast bureau of customers who needs to be.
[01:17:20] Viktor Petersson
Or vendors that need to be compliant.
[01:17:22] Viktor Petersson
They couldn't care less.
[01:17:23] Viktor Petersson
They want that easy button design.
[01:17:25] Viktor Petersson
Do I have an S bomb?
[01:17:26] Viktor Petersson
Yes.
[01:17:27] Olle Johansson
Cool.
[01:17:28] Viktor Petersson
Move on.
[01:17:28] Anthony Harrison
Not having an extra.
[01:17:30] Anthony Harrison
Not having an S bomb is the problem.
[01:17:31] Anthony Harrison
You know, I want people to start saying when you ask for an S bomb and that's what my Fosden talk.
[01:17:37] Anthony Harrison
Which one do you want?
[01:17:38] Anthony Harrison
I want people to be actually asking those sort of questions.
[01:17:43] Anthony Harrison
What flavor would you like?
[01:17:44] Viktor Petersson
Yes, that's step two, right?
[01:17:46] Viktor Petersson
That's not, that's not step one.
[01:17:47] Viktor Petersson
That's step two.
[01:17:48] Anthony Harrison
Okay.
[01:17:49] Anthony Harrison
Well, yes, and I think we're probably as you say, because we're in this bubble.
[01:17:53] Anthony Harrison
We're already two steps ahead.
[01:17:55] Viktor Petersson
The world is a step minus two.
[01:17:57] Viktor Petersson
We are step five.
[01:17:58] Viktor Petersson
Right.
[01:17:58] Viktor Petersson
So let's get to zero first, Right?
[01:18:01] Anthony Harrison
Yeah, I think, I think zero is, I think zero is achieved because I think people have been talking about S bonds for five years and there is now some experience.
[01:18:10] Viktor Petersson
Let's be real, Anthony.
[01:18:12] Viktor Petersson
We have been talking about S bombs for five plus years.
[01:18:14] Viktor Petersson
That is not the rest of the world where you speak to a lot of people.
[01:18:17] Viktor Petersson
Even in the tech world, they don't even know what S bombs are.
[01:18:20] Viktor Petersson
So let's just, let's rein it in a little bit.
[01:18:24] Anthony Harrison
Okay?
[01:18:25] Anthony Harrison
Yeah.
[01:18:25] Anthony Harrison
Obviously I've got the wrong nerdy friends.
[01:18:27] Anthony Harrison
Then.
[01:18:29] Olle Johansson
Anthony and I in SBoM Europe we wrote something.
[01:18:33] Olle Johansson
Was it a year ago called yes.
[01:18:35] Anthony Harrison
Is that S bomb?
[01:18:37] Anthony Harrison
Yeah.
[01:18:37] Olle Johansson
And I think that's important to go back to now and then.
[01:18:40] Olle Johansson
And I think one of the most important one is of the 10 rules there is any S bomb is better than no S bomb?
[01:18:48] Viktor Petersson
Yes.
[01:18:50] Anthony Harrison
Yes.
[01:18:50] Olle Johansson
Then we can discuss the next step and the next step, but get an S bomb, get it working and try to take your first steps and then we can make better.
[01:19:03] Viktor Petersson
Yeah, I think that's a fantastic note to end at.
[01:19:06] Viktor Petersson
Thank you both for coming on the show.
[01:19:08] Viktor Petersson
We are at time.
[01:19:10] Viktor Petersson
Are there any last words?
[01:19:12] Viktor Petersson
Ola, I know you have a conference coming up.
[01:19:14] Viktor Petersson
You should do a shout out to that about that before we wrap up.
[01:19:17] Olle Johansson
Absolutely.
[01:19:19] Olle Johansson
Anthony and I, as I said, we've been running SBOM Europe for a while now with we've been participating in conferences and other things, but we try to notch put things up a notch now by starting our own conference called SBoM Focus.
[01:19:34] Olle Johansson
Because we haven't found that on this side of the Atlantic and with all the legislations we've been talking about, I think it's time for the SBOM nerds to meet and work on the steps forward.
[01:19:47] Olle Johansson
So SSBOM Focus is April 10, Friday, April 10, in Stockholm, Sweden.
[01:19:53] Olle Johansson
We are planning to move this around Europe and also discussing how to create labs, much like the Espo Marama labs in us.
[01:20:06] Olle Johansson
Yeah.
[01:20:06] Olle Johansson
To test interoperability, to help the community and the industry to get tools that work together.
[01:20:16] Olle Johansson
Because this is going to be a tool chain, not a single tool, and we need them to work together.
[01:20:22] Olle Johansson
And in addition to that, in the labs, we're going to introduce labs and interoperability tests for the Transparency Exchange API, which will be very important.
[01:20:34] Olle Johansson
And that goes hand in hand with Cyclone DX2O.
[01:20:38] Olle Johansson
So we have a lot of cool stuff, but it all starts in Stockholm.
[01:20:43] Olle Johansson
Go to SBOmFocus EU and you'll find more information and we'll see you in Stockholm in the spring.
[01:20:51] Olle Johansson
Much better than today.
[01:20:53] Olle Johansson
Good stuff.
[01:20:54] Olle Johansson
Perfect.
[01:20:56] Viktor Petersson
Thank you both for coming on the show.
[01:20:58] Viktor Petersson
A lot of fun.
[01:20:58] Viktor Petersson
I really appreciate it.
[01:21:00] Viktor Petersson
And I will see you both at some ESPO event around the world sometime soon.
[01:21:05] Viktor Petersson
But until then, have a good one.
[01:21:07] Viktor Petersson
Thank you so much, guys.
[01:21:08] Olle Johansson
Have a good one.
[01:21:09] Anthony Harrison
Take care.
[01:21:11] Anthony Harrison
Bye.

Found an error or typo? File PR against this file or the transcript.