Modern software is rarely built entirely from scratch. Organisations rely on commercial off-the-shelf (COTS) products, open-source libraries, and software-as-a-service (SaaS) applications to deliver functionality that would take years to develop internally. While this dramatically accelerates development, it also means that the organisation's security posture depends heavily on the security practices of software vendors and open-source maintainers over whom they have limited control. The CISSP exam tests the governance and risk management approach to acquired software security in Domain 8.

Risk Profiles Compared: COTS, Open-Source, and SaaS

Each category of acquired software has a distinct risk profile.

COTS (Commercial Off-The-Shelf) software is commercial software licensed from a vendor. The vendor is responsible for developing, testing, and maintaining the software, including security updates. COTS risk characteristics: the organisation has limited insight into the software's security testing practices or source code. Vulnerability disclosure depends on the vendor's processes — a vendor may be slow to disclose or patch vulnerabilities. The organisation is dependent on the vendor's continued existence and support. Licence terms may restrict security testing of the software. On the positive side, commercial vendors generally have security teams and formal security development processes, and they face reputational and financial incentives to maintain security.

Open-source software is software whose source code is publicly available and freely usable, modifiable, and distributable. Open-source risk characteristics: the source code is available for security review (a positive), but availability does not mean the code has been reviewed. Many open-source projects are maintained by a small number of volunteers with limited security expertise. Vulnerabilities may persist for years before being discovered and patched. When a vulnerability is disclosed, it is immediately visible to attackers as well as defenders. The Log4Shell vulnerability demonstrates the risk: a critical vulnerability in a widely used logging library (Log4j) affected thousands of applications that had incorporated it, often as a transitive dependency that development teams did not even know was present.