SlideShare a Scribd company logo
THE STATE OF OPEN SOURCE
VULNERABILITIES
MANAGEMENT
Presented by:
Rami Elron, Senior Director of Product Management at WhiteSource
Key Findings:
1 Reported open source security vulnerabilities are on the
rise.
2
The absence of standard practices and developer-
focused tools lead to inefficient handling of open source
vulnerabilities.
3 Prioritization is crucial to ensure companies address the
most critical vulnerabilities on time.
4 Prioritization based on usage analysis can reduce security
alerts by 70% to 85%.
OPEN SOURCE SECURITY
VULNERABILITIES ARE ON THE RISE
The number of disclosed open source vulnerabilities
rose by over 50% in 2017
NUMBER OF REPORTED OPEN SOURCE VULNERABILITIES ROSE BY 51.2% IN 2017
FREQUENCY OF USE OF OPEN SOURCE COMPONENTS
of developers rely on open
source components
96.8%
of all open source projects are
vulnerable, but when it comes to
the most popular open source
projects…
7.5%
But, it's not all bad.
The rise in awareness also led to a
sharp rise in suggested fixes…
of all reported vulnerabilities have at least one
suggested fix in the open source community
97.4%
Information about vulnerabilities is scattered across hundreds of resources,
usually poorly indexed and therefore unsearchable
OF REPORTED OPEN SOURCE
VULNERABILITIES APPEAR
IN THE CVE DATABASE
86%
OVER
DEVELOPERS ARE NOT EFFICIENTLY
MANAGING OPEN SOURCE
VULNERABILITIES
Developers rated security vulnerabilities as the #1 challenge
when using open source components
TOP CHALLENGES IN USING OPEN SOURCE COMPONENTS
Developers spend 15 hours each month
dealing with open source vulnerabilities
(e.g. reviewing, discussing, addressing,
remediating, etc.)
The cost is even higher, considering that the more experienced
developers are the ones remediating
HOURS SPENT ON OPEN SOURCE VULNERABILITIES PER
DEVELOPERS' EXPERIENCE
WHAT DO YOU DO WHEN A VULNERABILITY IS
FOUND?
1.0%
34.1%
13.3%
18.7%
33.0%
Out of the monthly 15 hours
only 3.8 hours are invested
in remediation.
The lack of set practices and
tools can explain these
inefficiencies.
PRIORITIZATION IS KEY TO OPEN
SOURCE VULNERABILITY
MANAGEMENT
Perfect security is impossible.
Zero risk is impossible.
We must bring prioritization of application vulnerabilities to DevSecOps. In
a futile attempt to remove all possible vulnerabilities from applications, we
are slowing developers down and wasting their time chasing issues that
aren’t real.
10 Things to Get Right for Successful DevSecOps
Neil MacDonald, Gartner
25.2%
11.6%
15.1%
17.3%
Survey results show that developers prioritize remediation of
vulnerabilities based on available information, not necessarily
on the impact of a vulnerability on the security of an
application.
14.7%
16.2%
Security teams analyze
and prioritize
vulnerabilities
Sending emails or
opening issues/tickets
Closing the loop on
resolution is hard
The Common Way of Handling Security Vulnerabilities
Bridging the Gap is a Must
Security DevOps Developers
WhiteSource Software Confidential
? ?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
? ?
?
?
?
?
?
Reported Vulnerabilities
Can you really handle all of them?
Which ones constitute a real risk?
Which ones should be addressed first?
Effective Vulnerabilities
Less to deal with. Much less.vs.
The Secret to Prioritization:
Reported Vulnerabilities are not Necessarily EFFECTIVE
Focusing on Effective Vulnerabilities Could Enable:
Better development efficiency
Better development effectiveness
Better security
A new approach to
prioritizing
vulnerabilities - based
their impact on an
application’s security
EFFECTIVE VULNERABILITY
If the proprietary code is making calls
to the vulnerable functionality
INEFFECTIVE VULNERABILITY
If the proprietary code is NOT
making calls to the vulnerable
functionality
EFFECTIVE VS INEFFECTIVE
VULNERABILITIES IN A COMPONENT
After testing 2,000 Java applications, WhiteSource found that 72% of all detected
vulnerabilities were deemed ineffective.
Based on the data collected in our survey, this can be translated to saving 10.5 hours per
month per each developer (70% of 15 monthly hours).
EFFECTIVE USAGE ANALYSIS
Effective Usage Analysis is the technology of prioritizing open
source vulnerabilities based on the way they are used by the
application.
Our beta testing on 25 commercial applications from 12
organizations showed that:
analyzed projects were found to be vulnerable
of the vulnerabilities (effective and ineffective) were
found in transitive dependencies
of all vulnerability alerts were found to be ineffective
of all analyzed projects were found to contain only
ineffective vulnerabilities
ALL
90%
86%
64%
Q&A

More Related Content

PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
PDF
The State of Open Source Vulnerabilities Management
PDF
Open Source Security at Scale- The DevOps Challenge 
PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
Automating Open Source Security: A SANS Review of WhiteSource
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
The State of Open Source Vulnerabilities Management
Open Source Security at Scale- The DevOps Challenge 
Winning open source vulnerabilities without loosing your deveopers - Azure De...

What's hot (20)

PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
PDF
Tackling the Risks of Open Source Security: 5 Things You Need to Know
PDF
Taking Open Source Security to the Next Level
PDF
The State of Open Source Vulnerabilities Management
PPTX
Supply Chain Solutions for Modern Software Development
PPTX
7 Reasons Your Applications are Attractive to Adversaries
PDF
The AppSec Path to Enlightenment
PPTX
A question of trust - understanding Open Source risks
PPTX
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
PDF
PCI and Vulnerability Assessments - What’s Missing?
PDF
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PPTX
Open Source 360 Survey Results
PPTX
Accelerating Innovation with Software Supply Chain Management
PDF
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
PDF
Information Security Incidents Survey in Russia
PPTX
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
PPTX
Software Security Assurance for Devops
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
WhiteSource Webinar What's New With WhiteSource in December 2018
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Taking Open Source Security to the Next Level
The State of Open Source Vulnerabilities Management
Supply Chain Solutions for Modern Software Development
7 Reasons Your Applications are Attractive to Adversaries
The AppSec Path to Enlightenment
A question of trust - understanding Open Source risks
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
PCI and Vulnerability Assessments - What’s Missing?
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Open Source 360 Survey Results
Accelerating Innovation with Software Supply Chain Management
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Information Security Incidents Survey in Russia
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
Software Security Assurance for Devops
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Ad

Similar to The State of Open Source Vulnerabilities - A WhiteSource Webinar (20)

PDF
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
PDF
5 things about os sharon webinar final
PDF
Taking Open Source Security to the Next Level
PDF
PDF The complete guide to developer first application security By Github.Co...
PPTX
Intelligence on the Intractable Problem of Software Security
PPTX
One login enemy at the gates
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
PDF
The State of Software Security 2022 SOSS - Solution
PPTX
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
PPTX
Amy DeMartine - 7 Habits of Rugged DevOps
PDF
Aliens in Your Apps!
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PPTX
Software Security Assurance for DevOps
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
PDF
Infographic: Heartbleed - Everything Was Secure Until, Suddenly, It Wasn't
PDF
Case Closed with IBM Application Security on Cloud infographic
PPTX
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
PPTX
Why Patch Management is Still the Best First Line of Defense
PPTX
Shifting the conversation from active interception to proactive neutralization
PPT
Risk Based Software Planning
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
5 things about os sharon webinar final
Taking Open Source Security to the Next Level
PDF The complete guide to developer first application security By Github.Co...
Intelligence on the Intractable Problem of Software Security
One login enemy at the gates
We are excited to announce that our new State of Software Security (SOSS) rep...
The State of Software Security 2022 SOSS - Solution
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
Amy DeMartine - 7 Habits of Rugged DevOps
Aliens in Your Apps!
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Software Security Assurance for DevOps
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Infographic: Heartbleed - Everything Was Secure Until, Suddenly, It Wasn't
Case Closed with IBM Application Security on Cloud infographic
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
Why Patch Management is Still the Best First Line of Defense
Shifting the conversation from active interception to proactive neutralization
Risk Based Software Planning
Ad

More from WhiteSource (15)

PDF
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
PDF
Empowering Financial Institutions to Use Open Source With Confidence
PDF
Tackling the Container Iceberg:How to approach security when most of your sof...
PDF
Securing Container-Based Applications at the Speed of DevOps
PDF
The Challenges of Scaling DevSecOps
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PDF
Deep Dive into Container Security
PDF
Fire alarms vs. Fire hoses: Keeping up with Dependencies
PDF
DevSecOps: Closing the Loop from Detection to Remediation
PDF
Barriers to Container Security and How to Overcome Them
PDF
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PDF
Top Open Source Licenses Explained
PPTX
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
PPTX
How temenos manages open source use, the easy way combined
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
Empowering Financial Institutions to Use Open Source With Confidence
Tackling the Container Iceberg:How to approach security when most of your sof...
Securing Container-Based Applications at the Speed of DevOps
The Challenges of Scaling DevSecOps
Open Source Security: How to Lay the Groundwork for a Secure Culture
Deep Dive into Container Security
Fire alarms vs. Fire hoses: Keeping up with Dependencies
DevSecOps: Closing the Loop from Detection to Remediation
Barriers to Container Security and How to Overcome Them
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Top Open Source Licenses Explained
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
How temenos manages open source use, the easy way combined

Recently uploaded (20)

PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Introduction to Information and Communication Technology
PPTX
Funds Management Learning Material for Beg
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
innovation process that make everything different.pptx
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
artificial intelligence overview of it and more
PPTX
E -tech empowerment technologies PowerPoint
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
Introduction to Information and Communication Technology
Funds Management Learning Material for Beg
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Power Point - Lesson 3_2.pptx grad school presentation
PptxGenJS_Demo_Chart_20250317130215833.pptx
presentation_pfe-universite-molay-seltan.pptx
SAP Ariba Sourcing PPT for learning material
innovation process that make everything different.pptx
Introduction to the IoT system, how the IoT system works
Introuction about ICD -10 and ICD-11 PPT.pptx
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
artificialintelligenceai1-copy-210604123353.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
artificial intelligence overview of it and more
E -tech empowerment technologies PowerPoint
isotopes_sddsadsaadasdasdasdasdsa1213.ppt

The State of Open Source Vulnerabilities - A WhiteSource Webinar

  • 1. THE STATE OF OPEN SOURCE VULNERABILITIES MANAGEMENT Presented by: Rami Elron, Senior Director of Product Management at WhiteSource
  • 2. Key Findings: 1 Reported open source security vulnerabilities are on the rise. 2 The absence of standard practices and developer- focused tools lead to inefficient handling of open source vulnerabilities. 3 Prioritization is crucial to ensure companies address the most critical vulnerabilities on time. 4 Prioritization based on usage analysis can reduce security alerts by 70% to 85%.
  • 4. The number of disclosed open source vulnerabilities rose by over 50% in 2017 NUMBER OF REPORTED OPEN SOURCE VULNERABILITIES ROSE BY 51.2% IN 2017
  • 5. FREQUENCY OF USE OF OPEN SOURCE COMPONENTS of developers rely on open source components 96.8%
  • 6. of all open source projects are vulnerable, but when it comes to the most popular open source projects… 7.5%
  • 7. But, it's not all bad. The rise in awareness also led to a sharp rise in suggested fixes… of all reported vulnerabilities have at least one suggested fix in the open source community 97.4%
  • 8. Information about vulnerabilities is scattered across hundreds of resources, usually poorly indexed and therefore unsearchable OF REPORTED OPEN SOURCE VULNERABILITIES APPEAR IN THE CVE DATABASE 86% OVER
  • 9. DEVELOPERS ARE NOT EFFICIENTLY MANAGING OPEN SOURCE VULNERABILITIES
  • 10. Developers rated security vulnerabilities as the #1 challenge when using open source components TOP CHALLENGES IN USING OPEN SOURCE COMPONENTS
  • 11. Developers spend 15 hours each month dealing with open source vulnerabilities (e.g. reviewing, discussing, addressing, remediating, etc.) The cost is even higher, considering that the more experienced developers are the ones remediating HOURS SPENT ON OPEN SOURCE VULNERABILITIES PER DEVELOPERS' EXPERIENCE
  • 12. WHAT DO YOU DO WHEN A VULNERABILITY IS FOUND? 1.0% 34.1% 13.3% 18.7% 33.0% Out of the monthly 15 hours only 3.8 hours are invested in remediation. The lack of set practices and tools can explain these inefficiencies.
  • 13. PRIORITIZATION IS KEY TO OPEN SOURCE VULNERABILITY MANAGEMENT
  • 14. Perfect security is impossible. Zero risk is impossible. We must bring prioritization of application vulnerabilities to DevSecOps. In a futile attempt to remove all possible vulnerabilities from applications, we are slowing developers down and wasting their time chasing issues that aren’t real. 10 Things to Get Right for Successful DevSecOps Neil MacDonald, Gartner
  • 15. 25.2% 11.6% 15.1% 17.3% Survey results show that developers prioritize remediation of vulnerabilities based on available information, not necessarily on the impact of a vulnerability on the security of an application. 14.7% 16.2%
  • 16. Security teams analyze and prioritize vulnerabilities Sending emails or opening issues/tickets Closing the loop on resolution is hard The Common Way of Handling Security Vulnerabilities
  • 17. Bridging the Gap is a Must Security DevOps Developers
  • 18. WhiteSource Software Confidential ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Reported Vulnerabilities Can you really handle all of them? Which ones constitute a real risk? Which ones should be addressed first? Effective Vulnerabilities Less to deal with. Much less.vs. The Secret to Prioritization: Reported Vulnerabilities are not Necessarily EFFECTIVE Focusing on Effective Vulnerabilities Could Enable: Better development efficiency Better development effectiveness Better security
  • 19. A new approach to prioritizing vulnerabilities - based their impact on an application’s security EFFECTIVE VULNERABILITY If the proprietary code is making calls to the vulnerable functionality INEFFECTIVE VULNERABILITY If the proprietary code is NOT making calls to the vulnerable functionality EFFECTIVE VS INEFFECTIVE VULNERABILITIES IN A COMPONENT
  • 20. After testing 2,000 Java applications, WhiteSource found that 72% of all detected vulnerabilities were deemed ineffective. Based on the data collected in our survey, this can be translated to saving 10.5 hours per month per each developer (70% of 15 monthly hours).
  • 22. Effective Usage Analysis is the technology of prioritizing open source vulnerabilities based on the way they are used by the application. Our beta testing on 25 commercial applications from 12 organizations showed that: analyzed projects were found to be vulnerable of the vulnerabilities (effective and ineffective) were found in transitive dependencies of all vulnerability alerts were found to be ineffective of all analyzed projects were found to contain only ineffective vulnerabilities ALL 90% 86% 64%
  • 23. Q&A