Use up-to-date and trusted third-party software components. When possible, choose established
and proven frameworks and libraries that provide adequate security. Acquire these components from
trusted sources or evaluate the software for vulnerabilities before use.
The organization implements an allowlist for approved libraries by requiring digital signatures from trusted certificate authorities for all libraries.
The organization uses application whitelisting to ensure only approved libraries load and configures security policies to block unapproved libraries.
Vulnerabilities in third-party or open source libraries must be monitored, scanned, and reported in the same style as other vulnerabilities.
The organization must define policies to identify required updates in applications that use external libraries. Surveillance scans can be automated with specialized tools.
It also makes sense for an organization to monitor overall communication about vulnerabilities.