SlideShare a Scribd company logo
THE STATE OF OPEN SOURCE
VULNERABILITIES
MANAGEMENT
Presented by:
Rami Elron, Senior Director of Product Management at WhiteSource
Key Findings:
1 Reported open source security vulnerabilities are on the
rise.
2
The absence of standard practices and developer-
focused tools lead to inefficient handling of open source
vulnerabilities.
3 Prioritization is crucial to ensure companies address the
most critical vulnerabilities on time.
4 Prioritization based on usage analysis can reduce security
alerts by 70% to 85%.
OPEN SOURCE SECURITY
VULNERABILITIES ARE ON THE RISE
1
The number of disclosed open source vulnerabilities
rose by over 50% in 2017
NUMBER OF REPORTED OPEN SOURCE VULNERABILITIES ROSE BY 51.2% IN 2017
FREQUENCY OF USE OF OPEN SOURCE COMPONENTS
of developers rely on open
source components
96.8%
of all open source projects are
vulnerable, but when it comes to
the most popular open source
projects…
7.5%
But, it's not all bad.
The rise in awareness also led to a
sharp rise in suggested fixes…
of all reported vulnerabilities have at least one
suggested fix in the open source community
97.4%
Information about vulnerabilities is scattered across hundreds of resources,
usually poorly indexed and therefore unsearchable
OF REPORTED OPEN SOURCE
VULNERABILITIES APPEAR
IN THE CVE DATABASE
86%
OVER
DEVELOPERS ARE NOT EFFICIENTLY
MANAGING OPEN SOURCE
VULNERABILITIES
2
Developers rated security vulnerabilities as the #1 challenge
when using open source components
TOP CHALLENGES IN USING OPEN SOURCE COMPONENTS
Developers spend 15 hours each month
dealing with open source vulnerabilities
(e.g. reviewing, discussing, addressing,
remediating, etc.)
The cost is even higher, considering that the more experienced
developers are the ones remediating
HOURS SPENT ON OPEN SOURCE VULNERABILITIES PER
DEVELOPERS' EXPERIENCE
WHAT DO YOU DO WHEN A VULNERABILITY IS
FOUND?
1.0%
34.1%
13.3%
18.7%
33.0%
Out of the monthly 15 hours
only 3.8 hours are invested
in remediation.
The lack of set practices and
tools can explain these
inefficiencies.
PRIORITIZATION IS KEY TO OPEN
SOURCE VULNERABILITY
MANAGEMENT
3
Perfect security is impossible.
Zero risk is impossible.
We must bring prioritization of application vulnerabilities to DevSecOps. In
a futile attempt to remove all possible vulnerabilities from applications, we
are slowing developers down and wasting their time chasing issues that
aren’t real.
10 Things to Get Right for Successful DevSecOps
Neil MacDonald, Gartner
25.2%
11.6%
15.1%
17.3%
Survey results show that developers prioritize remediation of
vulnerabilities based on available information, not necessarily
on the impact of a vulnerability on the security of an
application.
14.7%
16.2%
Security teams analyze
and prioritize
vulnerabilities
Sending emails or
opening issues/tickets
Closing the loop on
resolution is hard
The Common Way of Handling Security Vulnerabilities
Bridging the Gap is a Must
Security DevOps Developers
WhiteSource Software Confidential
? ?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
? ?
?
?
?
?
?
Reported Vulnerabilities
Can you really handle all of them?
Which ones constitute a real risk?
Which ones should be addressed first?
Effective Vulnerabilities
Less to deal with. Much less.vs.
The Secret to Prioritization:
Reported Vulnerabilities are not Necessarily EFFECTIVE
Focusing on Effective Vulnerabilities Could Enable:
Better development efficiency
Better development effectiveness
Better security
A new approach to
prioritizing
vulnerabilities - based
their impact on an
application’s security
EFFECTIVE VULNERABILITY
If the proprietary code is making calls
to the vulnerable functionality
INEFFECTIVE VULNERABILITY
If the proprietary code is NOT
making calls to the vulnerable
functionality
EFFECTIVE VS INEFFECTIVE
VULNERABILITIES IN A COMPONENT
After testing 2,000 Java applications, WhiteSource found that 72% of all detected
vulnerabilities were deemed ineffective.
Based on the data collected in our survey, this can be translated to saving 10.5 hours per
month per each developer (70% of 15 monthly hours).
EFFECTIVE USAGE ANALYSIS
4
Effective Usage Analysis is the technology of prioritizing open
source vulnerabilities based on the way they are used by the
application.
Our beta testing on 25 commercial applications from 12
organizations showed that:
analyzed projects were found to be vulnerable
of the vulnerabilities (effective and ineffective) were
found in transitive dependencies
of all vulnerability alerts were found to be ineffective
of all analyzed projects were found to contain only
ineffective vulnerabilities
ALL
90%
86%
64%
Q&A

More Related Content

PDF
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
PDF
The State of Open Source Vulnerabilities Management
PDF
Taking Open Source Security to the Next Level
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
PDF
Tackling the Risks of Open Source Security: 5 Things You Need to Know
PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
PPTX
Supply Chain Solutions for Modern Software Development
PDF
Information Security Incidents Survey in Russia
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
The State of Open Source Vulnerabilities Management
Taking Open Source Security to the Next Level
The State of Open Source Vulnerabilities - A WhiteSource Webinar
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Winning open source vulnerabilities without loosing your deveopers - Azure De...
Supply Chain Solutions for Modern Software Development
Information Security Incidents Survey in Russia

What's hot (20)

PDF
Webinar: Systems Failures Fuel Security-Focused Design Practices
PPTX
One login enemy at the gates
PPTX
Accelerating Innovation with Software Supply Chain Management
PDF
Why happier developers create more secure code
PDF
Increasing DevSecOps Maturity Level in 2021
PPTX
Four things that are almost guaranteed to reduce the reliability of a softwa...
PDF
Risks in the Software Supply Chain
PDF
Infographic: Heartbleed - Everything Was Secure Until, Suddenly, It Wasn't
PDF
5 things about os sharon webinar final
PPTX
Need Of security in DevOps
PDF
Applying Software Quality Models to Software Security
PDF
Deep Dive into Container Security
PDF
Security & DevOps - What We Have Here Is a Failure to Communicate!
PDF
Sonatype's 2013 OSS Software Survey
PPTX
Live 2014 Survey Results: Open Source Development and Application Security Su...
PDF
PDF
Inauguration lecture Martin Pinzger, University of Klagenfurt, Austria
PPTX
Continuous Acceleration with a Software Supply Chain Approach
PPTX
Strengthening cyber resilience with Software Supply Chain Visibility
PDF
Veracode Corporate Overview - Print
Webinar: Systems Failures Fuel Security-Focused Design Practices
One login enemy at the gates
Accelerating Innovation with Software Supply Chain Management
Why happier developers create more secure code
Increasing DevSecOps Maturity Level in 2021
Four things that are almost guaranteed to reduce the reliability of a softwa...
Risks in the Software Supply Chain
Infographic: Heartbleed - Everything Was Secure Until, Suddenly, It Wasn't
5 things about os sharon webinar final
Need Of security in DevOps
Applying Software Quality Models to Software Security
Deep Dive into Container Security
Security & DevOps - What We Have Here Is a Failure to Communicate!
Sonatype's 2013 OSS Software Survey
Live 2014 Survey Results: Open Source Development and Application Security Su...
Inauguration lecture Martin Pinzger, University of Klagenfurt, Austria
Continuous Acceleration with a Software Supply Chain Approach
Strengthening cyber resilience with Software Supply Chain Visibility
Veracode Corporate Overview - Print
Ad

Similar to The State of Open Source Vulnerabilities Management (20)

PDF
Taking Open Source Security to the Next Level
PPTX
7 Reasons Your Applications are Attractive to Adversaries
PDF
PDF The complete guide to developer first application security By Github.Co...
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
PPTX
Amy DeMartine - 7 Habits of Rugged DevOps
PPTX
Intelligence on the Intractable Problem of Software Security
PPTX
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
PDF
Aliens in Your Apps!
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
PDF
The State of Software Security 2022 SOSS - Solution
PPTX
Software Security Assurance for DevOps
PPTX
Software Security Assurance for Devops
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
PDF
Case Closed with IBM Application Security on Cloud infographic
PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
PPTX
Why Patch Management is Still the Best First Line of Defense
PPTX
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
PPTX
Shifting the conversation from active interception to proactive neutralization
PPTX
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
Taking Open Source Security to the Next Level
7 Reasons Your Applications are Attractive to Adversaries
PDF The complete guide to developer first application security By Github.Co...
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
Amy DeMartine - 7 Habits of Rugged DevOps
Intelligence on the Intractable Problem of Software Security
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
Aliens in Your Apps!
We are excited to announce that our new State of Software Security (SOSS) rep...
The State of Software Security 2022 SOSS - Solution
Software Security Assurance for DevOps
Software Security Assurance for Devops
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Case Closed with IBM Application Security on Cloud infographic
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
Why Patch Management is Still the Best First Line of Defense
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Shifting the conversation from active interception to proactive neutralization
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
Ad

More from SBWebinars (20)

PDF
Securing Mobile Apps, From the Inside Out
PPTX
SAP Concur’s Cloud Journey
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
Software-Defined Segmentation Done Easily, Quickly and Right
PDF
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
PPTX
The Next Generation of Application Security
PDF
You're Bleeding. Exposing the Attack Surface in your Supply Chain
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
PDF
Top 10 Threats to Cloud Security
PDF
Deploying Secure Modern Apps in Evolving Infrastructures
PDF
Reduce the Burden Of Managing SAP With Enterprise Identity Management
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
PDF
Flow Metrics: What They Are & Why You Need Them
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
PDF
Take a Bite Out of the Remediation Backlog
PDF
The Trick to Passing Your Next Compliance Audit
Securing Mobile Apps, From the Inside Out
SAP Concur’s Cloud Journey
Top Cybersecurity Threats and How SIEM Protects Against Them
Software-Defined Segmentation Done Easily, Quickly and Right
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
The Next Generation of Application Security
You're Bleeding. Exposing the Attack Surface in your Supply Chain
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Top 10 Threats to Cloud Security
Deploying Secure Modern Apps in Evolving Infrastructures
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Maturing DevSecOps: From Easy to High Impact
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Reducing Risk of Credential Compromise at Netflix
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
Flow Metrics: What They Are & Why You Need Them
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Building Blocks of Secure Development: How to Make Open Source Work for You
Take a Bite Out of the Remediation Backlog
The Trick to Passing Your Next Compliance Audit

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
cuic standard and advanced reporting.pdf

The State of Open Source Vulnerabilities Management

  • 1. THE STATE OF OPEN SOURCE VULNERABILITIES MANAGEMENT Presented by: Rami Elron, Senior Director of Product Management at WhiteSource
  • 2. Key Findings: 1 Reported open source security vulnerabilities are on the rise. 2 The absence of standard practices and developer- focused tools lead to inefficient handling of open source vulnerabilities. 3 Prioritization is crucial to ensure companies address the most critical vulnerabilities on time. 4 Prioritization based on usage analysis can reduce security alerts by 70% to 85%.
  • 4. The number of disclosed open source vulnerabilities rose by over 50% in 2017 NUMBER OF REPORTED OPEN SOURCE VULNERABILITIES ROSE BY 51.2% IN 2017
  • 5. FREQUENCY OF USE OF OPEN SOURCE COMPONENTS of developers rely on open source components 96.8%
  • 6. of all open source projects are vulnerable, but when it comes to the most popular open source projects… 7.5%
  • 7. But, it's not all bad. The rise in awareness also led to a sharp rise in suggested fixes… of all reported vulnerabilities have at least one suggested fix in the open source community 97.4%
  • 8. Information about vulnerabilities is scattered across hundreds of resources, usually poorly indexed and therefore unsearchable OF REPORTED OPEN SOURCE VULNERABILITIES APPEAR IN THE CVE DATABASE 86% OVER
  • 9. DEVELOPERS ARE NOT EFFICIENTLY MANAGING OPEN SOURCE VULNERABILITIES 2
  • 10. Developers rated security vulnerabilities as the #1 challenge when using open source components TOP CHALLENGES IN USING OPEN SOURCE COMPONENTS
  • 11. Developers spend 15 hours each month dealing with open source vulnerabilities (e.g. reviewing, discussing, addressing, remediating, etc.) The cost is even higher, considering that the more experienced developers are the ones remediating HOURS SPENT ON OPEN SOURCE VULNERABILITIES PER DEVELOPERS' EXPERIENCE
  • 12. WHAT DO YOU DO WHEN A VULNERABILITY IS FOUND? 1.0% 34.1% 13.3% 18.7% 33.0% Out of the monthly 15 hours only 3.8 hours are invested in remediation. The lack of set practices and tools can explain these inefficiencies.
  • 13. PRIORITIZATION IS KEY TO OPEN SOURCE VULNERABILITY MANAGEMENT 3
  • 14. Perfect security is impossible. Zero risk is impossible. We must bring prioritization of application vulnerabilities to DevSecOps. In a futile attempt to remove all possible vulnerabilities from applications, we are slowing developers down and wasting their time chasing issues that aren’t real. 10 Things to Get Right for Successful DevSecOps Neil MacDonald, Gartner
  • 15. 25.2% 11.6% 15.1% 17.3% Survey results show that developers prioritize remediation of vulnerabilities based on available information, not necessarily on the impact of a vulnerability on the security of an application. 14.7% 16.2%
  • 16. Security teams analyze and prioritize vulnerabilities Sending emails or opening issues/tickets Closing the loop on resolution is hard The Common Way of Handling Security Vulnerabilities
  • 17. Bridging the Gap is a Must Security DevOps Developers
  • 18. WhiteSource Software Confidential ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Reported Vulnerabilities Can you really handle all of them? Which ones constitute a real risk? Which ones should be addressed first? Effective Vulnerabilities Less to deal with. Much less.vs. The Secret to Prioritization: Reported Vulnerabilities are not Necessarily EFFECTIVE Focusing on Effective Vulnerabilities Could Enable: Better development efficiency Better development effectiveness Better security
  • 19. A new approach to prioritizing vulnerabilities - based their impact on an application’s security EFFECTIVE VULNERABILITY If the proprietary code is making calls to the vulnerable functionality INEFFECTIVE VULNERABILITY If the proprietary code is NOT making calls to the vulnerable functionality EFFECTIVE VS INEFFECTIVE VULNERABILITIES IN A COMPONENT
  • 20. After testing 2,000 Java applications, WhiteSource found that 72% of all detected vulnerabilities were deemed ineffective. Based on the data collected in our survey, this can be translated to saving 10.5 hours per month per each developer (70% of 15 monthly hours).
  • 22. Effective Usage Analysis is the technology of prioritizing open source vulnerabilities based on the way they are used by the application. Our beta testing on 25 commercial applications from 12 organizations showed that: analyzed projects were found to be vulnerable of the vulnerabilities (effective and ineffective) were found in transitive dependencies of all vulnerability alerts were found to be ineffective of all analyzed projects were found to contain only ineffective vulnerabilities ALL 90% 86% 64%
  • 23. Q&A