Case Studies

Lessons from SolarWinds: Two Years Later

Two years after the SolarWinds breach reshaped cybersecurity, we examine what the industry actually learned and what organizations still get wrong about supply chain security.

Yukti Singhal
Security Researcher
6 min read

In December 2020, FireEye disclosed that a sophisticated threat actor had compromised SolarWinds Orion, injecting malicious code into a routine software update. The SUNBURST backdoor reached approximately 18,000 organizations. Two years later, the dust has settled enough for a clear-eyed assessment of what actually changed.

What Happened, Briefly

The attackers compromised the SolarWinds build pipeline. They injected a backdoor into the Orion software update process, meaning every customer who applied the update received a trojanized binary signed with legitimate SolarWinds certificates. The operation was attributed to Russia's SVR intelligence service, operating under the umbrella now tracked as Nobelium (or APT29 by some vendors).

The sophistication was notable not for novel exploitation but for patience. The attackers spent months inside the build environment, carefully testing their injections, and the malicious code mimicked legitimate Orion telemetry traffic. Detection took over a year.

Lesson 1: Build Pipeline Integrity Is Non-Negotiable

Before SolarWinds, most organizations treated their CI/CD systems as internal infrastructure that didn't warrant the same hardness as production environments. That was a catastrophic miscalculation.

The attackers didn't need to find a zero-day in Orion. They compromised the pipeline that builds Orion. The distinction matters. Your source code can be pristine, your code reviews rigorous, your static analysis comprehensive, and none of it matters if an attacker can inject code between your repository and your compiled output.

Two years on, the industry response has been frameworks like SLSA (Supply-chain Levels for Software Artifacts), which defines provenance requirements for build systems. Google open-sourced it, CISA endorsed it, and adoption is growing but still far from universal.

The uncomfortable reality: most organizations still don't have reproducible builds. They can't prove that a given binary was built from a given commit with a given set of dependencies. If you can't prove it, you can't detect tampering.

Lesson 2: Trust but Verify Died Hard

The entire SolarWinds model exploited implicit trust. Orion was network monitoring software, so it had broad network access by design. Customers trusted SolarWinds because it was a well-known vendor. SolarWinds trusted their build process because it had always worked.

Zero trust was already a buzzword before SolarWinds, but the breach gave it teeth. The real lesson isn't about network architecture, though. It's about vendor risk. Organizations trusted a software update from a vendor without any mechanism to verify what was in that update beyond a digital signature, and the signature was valid because the attackers had compromised the signing process too.

Two years later, SBOMs (Software Bills of Materials) gained significant traction partly because of SolarWinds. Executive Order 14028, signed in May 2021, mandated SBOMs for software sold to the federal government. The logic was straightforward: you can't assess risk in what you can't inventory.

Lesson 3: Detection of Supply Chain Attacks Requires Different Thinking

Traditional security monitoring focuses on known-bad indicators: malicious IPs, file hashes, behavioral signatures. SolarWinds demonstrated that supply chain attacks can evade all of these. The malicious traffic looked like legitimate Orion telemetry. The binary was properly signed. The behavior was designed to blend in.

Detection required anomaly-based thinking. FireEye caught it because they noticed unauthorized access to their own red team tools, not because they detected the SolarWinds backdoor directly. That's a sobering realization.

Organizations need to invest in understanding what normal looks like for their software supply chain. Which dependencies update, how often, what changes between versions. Without that baseline, detecting subtle tampering is nearly impossible.

Lesson 4: Incident Response Plans Weren't Built for This

When SolarWinds broke, most incident response playbooks assumed a direct compromise: attacker gets in, moves laterally, exfiltrates data. A supply chain attack breaks the model because the initial vector is trusted software doing trusted things.

Many organizations discovered they couldn't answer basic questions: Which systems run Orion? What version? When was it last updated? Which networks does it have access to? The scramble to answer these questions under pressure exposed gaps in asset management and software inventory that had been ignored for years.

Post-SolarWinds, the more mature organizations rebuilt their IR playbooks to include supply chain scenarios. They developed questions like: What if a core piece of infrastructure software is compromised? How do we isolate it without taking down monitoring? How do we validate that our remediation is complete?

Lesson 5: The Government Response Was Slow but Meaningful

Executive Order 14028 was the most significant policy response. It mandated SBOMs, pushed for zero trust architecture in federal agencies, established the Cyber Safety Review Board, and set timelines for improving software supply chain security standards.

Two years on, implementation is uneven. Federal agencies are at various stages of SBOM adoption. The NIST Secure Software Development Framework (SSDF) has been updated but compliance is inconsistent. Private sector adoption is driven more by market pressure than regulation.

Still, the direction is clear. SBOM requirements are expanding beyond federal procurement. Industries like healthcare and financial services are developing their own supply chain security standards. The conversation shifted from "should we do this" to "how do we do this efficiently."

What Still Isn't Fixed

Despite two years of progress, fundamental problems remain:

Dependency sprawl is worse, not better. The average application has more dependencies today than in 2020. The attack surface grew faster than defenses.

Open-source funding hasn't improved enough. Critical infrastructure depends on projects maintained by one or two volunteers. The xz backdoor scare in 2024 would prove this point emphatically, but even by late 2022, the signs were everywhere.

Small and mid-size organizations lack resources. Enterprise security teams can invest in SLSA compliance, reproducible builds, and sophisticated supply chain monitoring. A 50-person company with two developers cannot. The gap is widening.

Vendor transparency is still inconsistent. Some vendors now provide SBOMs and publish security practices. Many still treat their software composition as proprietary information, citing competitive concerns.

The Cultural Shift

Perhaps the most lasting impact of SolarWinds is cultural. Before the breach, supply chain security was a niche concern discussed at specialized conferences. After it, board rooms cared. CISOs who had struggled to get budget for dependency management suddenly had executive attention.

That attention is fading, as it always does between major incidents. But the institutional structures built in the aftermath, the executive order, the frameworks, the vendor requirements, those persist beyond the news cycle.

Two years later, the question isn't whether SolarWinds changed things. It did. The question is whether the changes are deep enough and fast enough to matter before the next supply chain attack of that magnitude hits.

How Safeguard.sh Helps

Safeguard.sh was built with the lessons of SolarWinds baked into its architecture. The platform provides continuous SBOM generation and monitoring, giving organizations real-time visibility into every component in their software supply chain. When a dependency is compromised, you know which applications are affected within minutes, not days. Safeguard.sh tracks build provenance, monitors for anomalous changes in your dependency tree, and provides the kind of baseline behavioral understanding that makes supply chain tampering detectable. The goal is straightforward: make sure no organization has to answer "what software do we run" under the pressure of an active incident.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.