SlideShare a Scribd company logo
SECURITY IN THE AGE
OF OPEN SOURCE
Mike Pittenger
VP, Security Strategy
Open Source Changed the Way Applications are Built
10% Open
Source
20% Open
Source
50% Open
Source
Up to 90%
Open Source
1998 2005 2010
TODAY
Open Source is the modern architectureCustom & Commercial Code
Open Source Software
Why Use Open Source?
Open source adds tremendous
value
• Needed functionality w/o
acquisition costs
• Faster time to market
• Lower development costs
• Support from broad
communities
COMPOSITION OF SOFTWARE
TESTED BY BLACK DUCK ON
DEMAND
Open Source
Custom Code
Consequences Can Be Costly When
You Can’t Control What You Can’t See
OpenSSL
Introduction: 2011
Discovery: 2014
Heartbleed
GNU C Library
Introduction: 2000
Discovery: 2015
Ghost
QEMU
Introduction: 2004
Discovery: 2015
Venom
Bash
Introduction: 1989
Discovery: 2014
Shellshock
OpenSSL
Introduction: 1990's
Discovery: 2015
Freak
FREAK!
Why Aren’t We Finding These in Testing?
• Static analysis
• Testing of source code or binaries for unknown security vulnerabilities in custom code
• Advantages in buffer overflow, some types of SQL injection
• Provides results in source code
• Dynamic analysis
• Testing of compiled application in a staging environment to detect unknown security
vulnerabilities in custom code
• Advantages in injection errors, XSS
• Provides results by URL, must be traced to source
What’s Missing?
There Are No Silver Bullets
•Automated testing finds common
vulnerabilities in the code you write
• They are good, not perfect
• Different tools work better on different classes of bugs
• Many types of bugs are undetectable except by trained
security researchers
All possible
security vulnerabilities
FREAK!
Identifiable
with Static
Analysis
Identifiable
with
Dynamic
Analysis
What Do Security Testing Tools Miss?
• Static Analysis Tools and Dynamic Analysis Tools can be very effective in finding
bugs in the code written by internal developers.
• HOWEVER…
• They are ineffective in finding known vulnerabilities in Open Source components
• They provide a point-in-time snapshot of security
What happens when the threat landscape changes?
The Threat Landscape Constantly Changes
• VulnDB (Open Source Vulnerability Database)
• In 2015, over 3,000 new vulnerabilities in open source
• Since 2004, over 74,000 vulnerabilities have been disclosed by NVD.
• 63 reference automated tools
• 50 of those are for vulnerabilities reported in the tools
• 13 are for vulnerabilities that could be identified by a fuzzer
0
500
1000
1500
2000
2500
3000
3500
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Open Source Vulnerabilities Reported Per Year
nvd vulndb-exclusive
Black Duck Open Source Security Audit Report
Highlights Security & Management Challenges
We Have Little Control Over How Open
Source Enters The Code Base
OPEN SOURCE
CODE
INTERNAL CODE
OUTSOURCED CODE
LEGACY CODE
REUSED CODE
SUPPLY CHAIN CODE
THIRD PARTY CODE
DELIVERED CODE
Open Source is an Attractive TargetOPEN SOURCE IS AN ATTRACTIVE TARGET
OPEN SOURCE IS USED EVERYWHERE
VULNERABILITIES ARE PUBLICIZEDEASY ACCESS TO SOURCE CODE
STEPS TO EXPLOIT READILY AVAILABLE
Who’s Responsible For Security?
Commercial Code Open Source Code
• Dedicated security researchers
• Alerting and notification infrastructure
• Regular patch updates
• Dedicated support team with SLA
• “community”-based code analysis
• Monitor newsfeeds yourself
• No standard patching mechanism
• Ultimately, you are responsible
How are Companies Managing Open Source Today? Not Well.HOW ARE COMPANIES MANAGING OPEN SOURCE TODAY? NOT WELL.
TRACKING VULNERABILITIES
• No single responsible entity
• Manual effort and labor intensive
• Unmanageable (11/day)
• Match applications, versions, components,
SPREADSHEET INVENTORY
• Depends on developer best effort or
memory
• Difficult maintenance
• Not source of truth
MANUAL TABULATION
• Architectural Review Board
• Occurs at end of SDLC
• High effort and low accuracy
• No controls
VULNERABILITY DETECTION
Run monthly/quarterly vulnerability
assessment tools (e.g., Nessus, Nexpose)
against all applications to identify exploitable
instances
Automating Five Critical Tasks and Having a
Bill of Materials Provide Distinct Advantage
INVENTORY
Open
Source
Software
MAP
Known
Security
Vulnerabilities
IDENTIFTY
License
Compliance
Risks
TRACK
Remediation
Priorities &
Progress
ALERT
New
Vulnerabilities
Affecting You
Visibility AND Control
1 2 3 4 5
Best Practices For Open Source
• Build and automatically enforce OSS policies
• Identify OSS components early in the SDLC
• Automatically create and maintain bills of material
• Continuously monitor threat environment for new vulnerabilities
Reqs
• OSS Policies
• Application Criticality
Ranking
• OSS Risk
Parameters
• License Risk
• Security Risk
• Operational Risk
Design
• OSS Selection
• Design Review
• License Risk
• Security Risk
• Operational Risk
Code
• OSS Detection
• Automatically detect
and alert on non-
conforming
components
• Correlation with Bills
of Material
Test
• OSS Enforcement
• Detect and alert on
non-conforming
components
• Correlation with Bills
of Material
Release
• OSS Monitoring
• Timely OSS
Vulnerability
Identification &
Reporting
• Bug Severity
• Remediation Advice
Key Takeaways
• Security testing is a good thing
• It identifies common vulnerabilities in the code
companies write
• Different testing methodologies are better suited for
different bug types
• Open Source Security isn’t covered by traditional tools
• Monitor for open source with known vulnerabilities, early
in the SDL
• Monitor production code for new vulnerabilities
• Security testing is a point-in-time snapshot
• New vulnerabilities may result from…
• Changes to code can change security posture
• Changes in the threat environment, even if the code hasn’t
changed
What Can You Do Tomorrow?
Speak with your head of application development
and find out:
• What policies exist?
• Is there a list of components?
• How are they creating the list?
• What controls do they have to ensure nothing gets
through?
• How are they tracking vulnerabilities for all components
over time?
7 of the top 10 Software companies,
and 44 of the top 100
6 of the top 8 Mobile handset vendors
6 of the top 10 Investment Banks
24
Countries
240+
Employees
1,600Customers
27 of the Fortune 100
About Black Duck
Award for
Innovation
Four Years in the “Software
500” Largest Software
Companies
Gartner Group
“Cool Vendor”
“Top Place to Work,”
The Boston Globe
Six Years in a row
for Innovation
2014
The Intelligent Management of Open Source

More Related Content

PPTX
September 13, 2016: Security in the Age of Open Source:
PPTX
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
PDF
Myths and Misperceptions of Open Source Security
PDF
Application Security in the Age of Open Source
PPTX
Secure application deployment in Apache CloudStack
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PDF
Open Source in Application Security
PDF
The 4 Levels of Open Source Risk Management
September 13, 2016: Security in the Age of Open Source:
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Myths and Misperceptions of Open Source Security
Application Security in the Age of Open Source
Secure application deployment in Apache CloudStack
Managing Open Source in Application Security and Software Development Lifecycle
Open Source in Application Security
The 4 Levels of Open Source Risk Management

What's hot (18)

PPTX
Secure application deployment in the age of continuous delivery
PPTX
Open Source Security
PDF
Integrating Black Duck into your Agile DevOps Environment
PDF
Secure Application Development in the Age of Continuous Delivery
PPTX
Empowering Application Security Protection in the World of DevOps
PPTX
FROM OPEN SOURCE COMPLIANCE TO SECURITY
PPTX
Using hypervisor and container technology to increase datacenter security pos...
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Black Duck & IBM Present: Application Security in the Age of Open Source
PPTX
The How and Why of Container Vulnerability Management
PDF
Software Security Assurance for DevOps
PDF
(In)security in Open Source
PDF
PCI and Vulnerability Assessments - What’s Missing
PDF
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PDF
Customer Case Study: ScienceLogic - Many Paths to Compliance
PPTX
Contain your risk: Deploy secure containers with trust and confidence
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Secure application deployment in the age of continuous delivery
Open Source Security
Integrating Black Duck into your Agile DevOps Environment
Secure Application Development in the Age of Continuous Delivery
Empowering Application Security Protection in the World of DevOps
FROM OPEN SOURCE COMPLIANCE TO SECURITY
Using hypervisor and container technology to increase datacenter security pos...
Security in the age of open source - Myths and misperceptions
Black Duck & IBM Present: Application Security in the Age of Open Source
The How and Why of Container Vulnerability Management
Software Security Assurance for DevOps
(In)security in Open Source
PCI and Vulnerability Assessments - What’s Missing
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Automating Open Source Security: A SANS Review of WhiteSource
Customer Case Study: ScienceLogic - Many Paths to Compliance
Contain your risk: Deploy secure containers with trust and confidence
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Ad

Viewers also liked (20)

ODP
Open Source Software (OSS/FLOSS) and Security
PPTX
Aprendizaje autónomo rafael vargas tinoco
PDF
Java EE 6 Aquarium Paris
ODP
ISFET Plots
PDF
JavaFX 1.0 SDK Aquarium Paris
PPTX
Yeni maryam
PDF
UNFPA End of project report -FINAL
PPTX
Zakelijk Bloggen en Instagram marketing B2B
PPTX
писатели кузбасса участники вов
PPTX
Social goes visual
PPTX
Performing an audit - Open source compliance seminar
PDF
Facebook vs instagram - Fellipe Guimarães - Instaby
PDF
MPC Capability Brochure_V6_2016_Digital
PDF
Amazon by alex
PDF
Pay Pal
PDF
Nvidia
PDF
SpaceX
PDF
Disney Karl Marco
PDF
Snapchat Company Presentation
PDF
2016 Future of Open Source Survey Results
Open Source Software (OSS/FLOSS) and Security
Aprendizaje autónomo rafael vargas tinoco
Java EE 6 Aquarium Paris
ISFET Plots
JavaFX 1.0 SDK Aquarium Paris
Yeni maryam
UNFPA End of project report -FINAL
Zakelijk Bloggen en Instagram marketing B2B
писатели кузбасса участники вов
Social goes visual
Performing an audit - Open source compliance seminar
Facebook vs instagram - Fellipe Guimarães - Instaby
MPC Capability Brochure_V6_2016_Digital
Amazon by alex
Pay Pal
Nvidia
SpaceX
Disney Karl Marco
Snapchat Company Presentation
2016 Future of Open Source Survey Results
Ad

Similar to Security in the Age of Open Source (20)

PDF
Security in the Age of Open Source
PPTX
Welcome & The State of Open Source Security
PDF
3/ Black Duck @ OPEN'16
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PPTX
RVAsec Bill Weinberg Open Source Hygiene Presentation
PPTX
Secure application deployment in the age of continuous delivery
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PDF
Q1 2016 Open Source Security Report: Glibc and Beyond
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
PPTX
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
PDF
Open Source Security for Newbies - Best Practices
PDF
Security in open source projects
PPTX
Software Security Assurance for Devops
PDF
Webinar–2019 Open Source Risk Analysis Report
PPTX
Software Security Assurance for DevOps
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PDF
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
PDF
Donu’t Let Vulnerabilities Create a Hole in Your Organization
Security in the Age of Open Source
Welcome & The State of Open Source Security
3/ Black Duck @ OPEN'16
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
RVAsec Bill Weinberg Open Source Hygiene Presentation
Secure application deployment in the age of continuous delivery
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Q1 2016 Open Source Security Report: Glibc and Beyond
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Security for Newbies - Best Practices
Security in open source projects
Software Security Assurance for Devops
Webinar–2019 Open Source Risk Analysis Report
Software Security Assurance for DevOps
Secure application deployment in the age of continuous delivery
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Donu’t Let Vulnerabilities Create a Hole in Your Organization

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PDF
Open Source Rookies and Community
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Open-Source- Sicherheits- und Risikoanalyse 2018
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - From Protex to Hub
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Rookies and Community
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Security Breaches and Cryptocurrency Dominating News

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools

Security in the Age of Open Source

  • 1. SECURITY IN THE AGE OF OPEN SOURCE Mike Pittenger VP, Security Strategy
  • 2. Open Source Changed the Way Applications are Built 10% Open Source 20% Open Source 50% Open Source Up to 90% Open Source 1998 2005 2010 TODAY Open Source is the modern architectureCustom & Commercial Code Open Source Software
  • 3. Why Use Open Source? Open source adds tremendous value • Needed functionality w/o acquisition costs • Faster time to market • Lower development costs • Support from broad communities COMPOSITION OF SOFTWARE TESTED BY BLACK DUCK ON DEMAND Open Source Custom Code
  • 4. Consequences Can Be Costly When You Can’t Control What You Can’t See OpenSSL Introduction: 2011 Discovery: 2014 Heartbleed GNU C Library Introduction: 2000 Discovery: 2015 Ghost QEMU Introduction: 2004 Discovery: 2015 Venom Bash Introduction: 1989 Discovery: 2014 Shellshock OpenSSL Introduction: 1990's Discovery: 2015 Freak FREAK!
  • 5. Why Aren’t We Finding These in Testing? • Static analysis • Testing of source code or binaries for unknown security vulnerabilities in custom code • Advantages in buffer overflow, some types of SQL injection • Provides results in source code • Dynamic analysis • Testing of compiled application in a staging environment to detect unknown security vulnerabilities in custom code • Advantages in injection errors, XSS • Provides results by URL, must be traced to source What’s Missing?
  • 6. There Are No Silver Bullets •Automated testing finds common vulnerabilities in the code you write • They are good, not perfect • Different tools work better on different classes of bugs • Many types of bugs are undetectable except by trained security researchers All possible security vulnerabilities FREAK! Identifiable with Static Analysis Identifiable with Dynamic Analysis
  • 7. What Do Security Testing Tools Miss? • Static Analysis Tools and Dynamic Analysis Tools can be very effective in finding bugs in the code written by internal developers. • HOWEVER… • They are ineffective in finding known vulnerabilities in Open Source components • They provide a point-in-time snapshot of security What happens when the threat landscape changes?
  • 8. The Threat Landscape Constantly Changes • VulnDB (Open Source Vulnerability Database) • In 2015, over 3,000 new vulnerabilities in open source • Since 2004, over 74,000 vulnerabilities have been disclosed by NVD. • 63 reference automated tools • 50 of those are for vulnerabilities reported in the tools • 13 are for vulnerabilities that could be identified by a fuzzer 0 500 1000 1500 2000 2500 3000 3500 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Open Source Vulnerabilities Reported Per Year nvd vulndb-exclusive
  • 9. Black Duck Open Source Security Audit Report Highlights Security & Management Challenges
  • 10. We Have Little Control Over How Open Source Enters The Code Base OPEN SOURCE CODE INTERNAL CODE OUTSOURCED CODE LEGACY CODE REUSED CODE SUPPLY CHAIN CODE THIRD PARTY CODE DELIVERED CODE
  • 11. Open Source is an Attractive TargetOPEN SOURCE IS AN ATTRACTIVE TARGET OPEN SOURCE IS USED EVERYWHERE VULNERABILITIES ARE PUBLICIZEDEASY ACCESS TO SOURCE CODE STEPS TO EXPLOIT READILY AVAILABLE
  • 12. Who’s Responsible For Security? Commercial Code Open Source Code • Dedicated security researchers • Alerting and notification infrastructure • Regular patch updates • Dedicated support team with SLA • “community”-based code analysis • Monitor newsfeeds yourself • No standard patching mechanism • Ultimately, you are responsible
  • 13. How are Companies Managing Open Source Today? Not Well.HOW ARE COMPANIES MANAGING OPEN SOURCE TODAY? NOT WELL. TRACKING VULNERABILITIES • No single responsible entity • Manual effort and labor intensive • Unmanageable (11/day) • Match applications, versions, components, SPREADSHEET INVENTORY • Depends on developer best effort or memory • Difficult maintenance • Not source of truth MANUAL TABULATION • Architectural Review Board • Occurs at end of SDLC • High effort and low accuracy • No controls VULNERABILITY DETECTION Run monthly/quarterly vulnerability assessment tools (e.g., Nessus, Nexpose) against all applications to identify exploitable instances
  • 14. Automating Five Critical Tasks and Having a Bill of Materials Provide Distinct Advantage INVENTORY Open Source Software MAP Known Security Vulnerabilities IDENTIFTY License Compliance Risks TRACK Remediation Priorities & Progress ALERT New Vulnerabilities Affecting You Visibility AND Control 1 2 3 4 5
  • 15. Best Practices For Open Source • Build and automatically enforce OSS policies • Identify OSS components early in the SDLC • Automatically create and maintain bills of material • Continuously monitor threat environment for new vulnerabilities Reqs • OSS Policies • Application Criticality Ranking • OSS Risk Parameters • License Risk • Security Risk • Operational Risk Design • OSS Selection • Design Review • License Risk • Security Risk • Operational Risk Code • OSS Detection • Automatically detect and alert on non- conforming components • Correlation with Bills of Material Test • OSS Enforcement • Detect and alert on non-conforming components • Correlation with Bills of Material Release • OSS Monitoring • Timely OSS Vulnerability Identification & Reporting • Bug Severity • Remediation Advice
  • 16. Key Takeaways • Security testing is a good thing • It identifies common vulnerabilities in the code companies write • Different testing methodologies are better suited for different bug types • Open Source Security isn’t covered by traditional tools • Monitor for open source with known vulnerabilities, early in the SDL • Monitor production code for new vulnerabilities • Security testing is a point-in-time snapshot • New vulnerabilities may result from… • Changes to code can change security posture • Changes in the threat environment, even if the code hasn’t changed
  • 17. What Can You Do Tomorrow? Speak with your head of application development and find out: • What policies exist? • Is there a list of components? • How are they creating the list? • What controls do they have to ensure nothing gets through? • How are they tracking vulnerabilities for all components over time?
  • 18. 7 of the top 10 Software companies, and 44 of the top 100 6 of the top 8 Mobile handset vendors 6 of the top 10 Investment Banks 24 Countries 240+ Employees 1,600Customers 27 of the Fortune 100 About Black Duck Award for Innovation Four Years in the “Software 500” Largest Software Companies Gartner Group “Cool Vendor” “Top Place to Work,” The Boston Globe Six Years in a row for Innovation 2014
  • 19. The Intelligent Management of Open Source

Editor's Notes

  • #4: The broader use of open source has been great for businesses. They relieve development teams from writing many features from scratch, lowering development costs and speeding time to market. Many of the popular open source libraries are used by thousands of organizations, and have proven their effectiveness in large, enterprise applications. Our audits find open source in over 98% of the applications we test, and on average, about 1/3 of these code bases are comprised of open source
  • #5: We’ve seen a trend recently in “named vulnerabilities”, and Heartbleed, Shellshock, Freak and the others are likely familiar to you. What do these all have in common? Each is a vulnerability in a widely used open source component Each existed for years without being detected by automated analysis tools and penetration testing methods. Each was ultimately identified and disclosed by security researchers conducting manual code reviews. If automated security analysis tools and penetration testing tools were effective at finding vulnerabilities in open source, these vulnerabilities would have been found long ago.
  • #6: 2 most common automated security testing methodologies are static analysis and dynamic analysis. In both instances, these tools are looking for common security vulnerabilities – unknown to the developer – in the custom code written by development engineers. Static analysis works by scanning source code or binaries, and building a model of the applications data flow and control flow. Once built, the tools can then run pre-determined rules against the model. For example, a rule may look for an instance of a string copy, then traverse the model to determine if it is possible for the source buffer to have a value larger than the destination buffer. If so, a buffer overflow issue could be possible. Possible issues are mapped to the source code, making it simpler for developers to examine the issue, determine if it a true or false positive, and remediate. Dynamic analysis works on running applications in a test environment, therefore by definition very late in the development lifecycle. It will also look for common bugs resulting from coding errors, often by testing inputs to the application with unexpected data. An example could be using SQL commands in a password field to check for input validation. The results from these tests are mapped to the URL of the application (which page was tested), the input, and the results. Developers must then trace the issue from the web application to the source code for verification and remediation. These tools are very helpful in preventing common security issues in applications – but what’s missing?
  • #7: Organizations should use static and dynamic analysis to find bugs in the code they write, but… Open source vulnerabilities are too complex and too nuanced to be found by automated tools If the tools were effective at finding vulnerabilities in open source, the vulnerabilities would have been found long ago HeartBleed was present in OpenSSL for 2+ years, despite constant testing using automated tools 50+ vulnerabilities in OpenSSL since Heartbleed have all been found by researchers. Vulnerabilities in open source are almost exclusively found by researchers manually inspecting the code and conducting experiments Of the 4,000 vulnerabilities identified last year, fewer than 10 we Very useful in identifying common security bugs in custom code Typically responsibility of security team Some can integrate into the build Provide a snapshot of security vulnerabilities that each tool can identify Exploitability of an issue can easily change Results require review and scrubbing #1 complaint – too many useless issues Typically used late in the SDLC Often require compiled application and/or test environment re identified by automated tools
  • #8: Organizations should use static and dynamic analysis to find bugs in the code they write, but… Open source vulnerabilities are too complex and too nuanced to be found by automated tools They provide a snapshot of the perceived security of the code base – at a single point in time.
  • #9: When a product is released or deployed, security testing usually stops. After all, the code base isn’t changing, so the automated tools would just return the same results over and over again. And while the code base may not change – the threat environment changes constantly as new vulnerabilities are discovered and disclosed. In 2014, over 7,900 new vulnerabilities were disclosed by NIST, a little over half of which were in open source components. These were often not obvious bugs, and very few were identified by automated tools. Instead, individual security researchers discovered and disclosed the issues.
  • #11: Managing open source can be a challenge, since it can enter the code base in several ways. You may have policies, and even review and approve open source in design reviews, but developers may reuse internal code that includes older open source components, pull unapproved code from web-based repositories, integrate code from supply chain partners. The end result is deployed code that contains open source, often without the knowledge or review of development managers and security teams.
  • #12: MIKE: Open source is not necessarily less secure, or more secure, than commercial software. There are, however, some characteristics of open source that make it particularly attractive to attackers. Open source is widely used by enterprises in commercial applications Therefore, a new vulnerability in a popular project provides a target-rich environment for attackers. Attackers have access to the code for analysis Vulnerabilities in commercial code are exploitable, but attackers don’t have easy access to the source for analysis. That’s not the case in open source, where everyone has access. Like researchers, attackers can also identify new vulnerabilities When new vulnerabilities are disclosed, we publish them to the world NIST maintains the National Vulnerability database as a publicly available reference for vulnerabilities identified in software, and other sources – most notably OSVDB – focus on all identified vulnerabilities in open source. Proof of the vulnerability (in the form of an exploit) is often included When a vulnerability is discovered, the researcher will typically provide proof of the vulnerability in the form of exploit code, making the attackers’ job even easier Attackers can use these as well – but if they are confused, there are typically YouTube videos available to provide step-by-step instructions
  • #13: What’s the implication of using open source code? Something many organizations haven’t considered is that the support model is entirely different. With commercial code, there are often dedicated security researchers, whose findings are put out via a robust alerting infrastructure to all their customers. Regular patches means their customers need not worry too much about remediation, as long as their patch management process is fairly robust. And most importantly, dedicated support teams are able to respond to your issues should anything happen. With open source code, security research is often done by “white hat” hackers, academics, and the general open source community. There isn’t necessarily a clear process for making sure all code commits do not introduce new vulnerabilities. Security issues are usually announced on newsfeeds, email lists which you need to subscribe to. There is no proactive alerting for customers since there are no “customers” in the traditional sense of the word. When bug fixes go out, patching usually just means downloading the latest version, which may break the application. There is no one standard way of distributing patches to open source code. And finally, the biggest challenge of all is that your engineering and security teams are ultimately responsible for the open source code you use. In case of a security incident, when it comes to open source there is no vendor you can point a finger at. That means the imperative is on you to be extra-vigilant when it comes to open source vulnerabilities.
  • #14: MIKE: In short, many companies are not addressing this. The best practices we have seen in large, multi-national organizations, with mature SDLC practices, would be similar to the 3 activities listed here – question development teams about what they are using, tally the results in a spreadsheet, and react to vulnerabilities that they hear about. Manual tabulation Manual tabulation occurs either at design review (and is therefore dependent on developers adhering to version requirements and not adding additional functionality) or at the end of the development cycle (therefore dependent on the dev teams' memory and best efforts).  In both cases, accuracy is dependent on static requirements or managers’ memories. Accuracy at the beginning of the SDLC ignores any changes in requirements, especially in an Agile environment. It is also dependent on developers selecting the approved version of a component Accuracy at the end of the SDLC is subject to recollection and level of effort Maintain results in a spreadsheet Updates to code that include new open source may not be captured Tracking of new vulnerabilities in the components used is decentralized, at best Manual tracking quickly becomes unmanageable On average, 11 new vulnerabilities per day What do you do if you have 100 internal applications, and each uses 10 open source components?
  • #15: A best-practices solution would combine elements of TRUST, VERIFICATION, and MONITORING: 1 – Starting with TRUST, this is providing developers and architects a way to choose open source components that are free of known vulnerabilities, and have active community support. This is a proactive step that reduces risk downstream in the software development process, and is the most cost-effective means of risk reduction. 2 – VERIFICATION means two things, having an accurate inventory of open source and being able to map than against all known vulnerabilities, in any and all applications, at any point in the SDL 3 – MONITOR means being able to monitor the released code for newly discovered vulnerabilities and alert the right people for remediation. Many organizations end security testing when applications are released. After all, the code base isn’t changing, nor are the security rules in the tools, so why test simply to see the same results again? However, this ignores the fact that while the code base isn’t changing, the threat environment changes constantly. With over 4,000 new vulnerabilities each year, a comprehensive solution should be continuously monitoring this constant stream of new vulnerabilities, and automatically notify you of any new vulnerabilities in the open source you used in deployed applications, including: Which applications use the code How critical the vulnerability is, and How to remediate it
  • #18: In summary, we’ve discussed: OSS is pervasive and important part of app development OSS has unique security and support challenges existing tools don’t fill the gap manual process isn’t sufficient Therefore, level of risk warrants action. If you agree this is a priority for you, the next steps are critical. Most CISOs we speak with want to find out more about the current situation at their organization. The best person to ask is often the head of application development. What you want to know are the answers to the following questions: What policies exist? Is there a list of components? How are they creating the list? Are they tracking vulnerabilities? How do they ensure nothing gets through? These questions will shed light on the current state of how open source is used and managed at your organization and give you a good starting point for further discussions. What would you propose the next steps should be?