The Synopsys Software Integrity Group is now Black Duck®. Learn More

close search bar

Sorry, not available in this language yet

close language selection

BSIMM15: New focus on securing AI and the software supply chain

Black Duck Editorial Staff

Jan 14, 2025 / 5 min read

The latest “Building Security in Maturity Model” (BSIMM) report, now in its 15th iteration, reveals how participating organizations are securing AI and other emerging technologies, as well as prioritizing efforts to secure the software supply chain in response to renewed regulatory pressures.

BSIMM15 analyzes the security practices of 121 organizations across eight verticals and contains information on what’s working, what isn’t, and what’s changing about the risks and threat landscapes in software security—and how organizations are responding to those challenges.

As AI has gone mainstream in software development among organizations of all sizes and in all verticals, it’s brought new security risks along with opportunities. BSIMM15 offers valuable insights into how some of the leading organizations in the world are navigating the security challenges posed by AI and can serve as a roadmap to others looking to innovate securely.

Securing the software supply chain also continues to be a high priority, especially for organizations that sell software to the U.S. government. Activities that support compliance such as creating Software Bills of Material (SBOMs) and performing software composition analysis (SCA) have increased substantially in the past year.

About BSIMM

The goal of BSIMM remains what it was when it was launched in 2008: to enable cooperation among organizations and help them build trust in their software, not by dictating or prescribing what they should do but by sharing what other organizations are doing within their own software security programs.

BSIMM15 provides detailed information from 121 organizations in verticals including the cloud, financial services, financial technology, healthcare, Internet of Things (IoT), and technology. The participants include 11,100 security professionals who collectively help 270,000 developers working on roughly 96,000 applications.

Because every organization differs in its risk profile, priorities, and capabilities, BSIMM refutes a “one size fits all” approach. Instead, the report serves as a roadmap that allows each organization to choose its own path. It describes nearly 130 discreet activities without mandating which to include in your program. What’s important is that every organization has a software security program that matches its risk profile and priorities.

How security is changing

The annual BSIMM report reflects trends in software security that are responses to the evolution of cybercrime. This year has been defined by organizations adjusting to the opportunities and challenges posed by AI and large language models (LLMs) while also building software security programs that are in compliance with government mandates. Companies that provide DevSecOps platforms, cloud solutions, and security tooling are rising to challenges from the marketplace and attackers to make it easier for developers to automate security tests and practices.

The demands of AI, the cloud, toolchains, adjacent functions to application security, and government scrutiny are leading to a vastly increased scope in software security programs, which in turn is necessitating a new era of shared responsibility between software security groups and engineering. Future security efforts will be heavily influenced by the continuing impact of government regulations on software products and the maturity of AI that will enable new use cases.

Three BSIMM15 software security trends

 
Regulatory pressures to secure the software supply chain

With self-attestation requirements for selling software to the U.S. government, organizations are increasingly prioritizing activities that support compliance. This year saw a 22% increase in the number of organizations creating SBOMs for deployed software, and a 67% increase in the number of organizations performing SCA on code repositories.

BSIMM participants are also protecting the code they publish to improve regulatory compliance. The security activity “protect code integrity” increased by roughly 20% from BSIMM14 to BSIMM15, and “use code protection” increased by about 45%. Participants are feeling pressure to implement incident response functionality that can handle vulnerability reports and security bulletins, as shown in the roughly 25% increase in “streamline incoming responsible vulnerability disclosure” activities.

BSIMM15 also introduced a new activity, “protect the integrity of development endpoints,” to measure how participants are securing workstations that access various servers and services of the toolchain. And as the Cyber Resilience Act moves through the European Union regulatory process, BSIMM will watch to see if mandated design review and security requirement-based activities increase in response.

Securing AI and new technologies

As the use of artificial intelligence continued to proliferate in software development over the last year, organizations are struggling with securing it. Most BSIMM participants have yet to define the new attack surface created by AI, let alone understand how to secure it. A key trend in BSIMM15 is a roughly 30% increase in organizations engaging research groups to develop new attack methods. The use of adversarial tests (abuse cases) has also increased, more than doubling since BSIMM14.

For the first time, the BSIMM15 report includes a section on artificial intelligence/machine learning that explains the activities around proactively planning to mitigate the impact of new technologies on security. A new BSIMM activity, “create standards controlling and guiding the adoption of new technologies,” is geared toward companies looking to take advantage of innovations like AI that are on the cutting edge of technology.

Additionally, there are five existing BSIMM activities that can help organizations address AI security.

  • Gather and use attack intelligence
  • Create technology-specific attack patterns
  • Form a board to approve and maintain secure design patterns
  • Integrate software supply chain risk management
  • Make code review mandatory for all projects

Throughout 2025, BSIMM will continue to measure how companies are securing AI and other emerging technologies.

The evolution of shift everywhere

“Shift everywhere” is an approach to governing the software development life cycle (SDLC) that acknowledges the reality that consistently achieving acceptable levels of software risk is a shared responsibility that includes legal, audit, risk, governance, IT, cloud, technology, vendor management, and others. A shift everywhere approach begins by asking how these roles get the information they need, when they need it, and the processes they normally use.

The core tenets of shift everywhere lie in taking advantage of automation to put data collection and decisions as close to the software development process as required. The BSIMM activity “integrate software-defined life cycle governance” was introduced five years ago and has shown steady growth each year. In BSIMM15, it has grown nearly 48%.

Deciding when a test is required in the SDLC is essential to ensuring that software is evaluated for risk at the most appropriate time. As a result, BSIMM15 saw a 43% increase in implementing event-driven security testing in automation, allowing organizations to automate security decisions and governance in real time.

Use the BSIMM report to build an AppSec culture

Software security maturity is a journey, not an event. For over a decade, the BSIMM report has provided a measuring stick and blueprint to help security teams compare the maturity of their programs against those of their peers. Measurements and benchmark data are derived from organizations participating in BSIMM, so the report provides a direct line of sight into real-world application security (AppSec) program strategies being implemented today.

The annual BSIMM report provides a reference for AppSec maturity assessments, serves as a community that connects security professionals, and is the driving model to help form remediation plans.

Download the BSIMM15 report now.

Reports

BSIMM Report

BSIMM15 Report
Get the latest edition

Building Security In Maturity Model (BSIMM) is a data-driven model developed through analysis of real-world software security initiatives. The BSIMM report represents the latest evolution of this detailed model for software security.

Continue Reading

Explore Topics