SlideShare a Scribd company logo
The Hidden Risk of Component Based Software Development
What You Don’t Know Will Hurt You
The Hidden Risk of Component Based Software Development

Ryan Berg, CSO Sonatype

Send Tweets to #CSORisk

The Component Lifecycle Management Company
80%

>
Written

Assembled

of a typical application
is assembled from
open source & proprietary
components

The Component Lifecycle Management Company
The Ice-Caps are Melting

The Component Lifecycle Management Company
Development Must Keep Up with Pace Of Innovation

Development must change

The Component Lifecycle Management Company
Components are Everywhere

By 2016, OSS will be included in
mission-critical software portfolios
within 99% of Global 2000
enterprises, up from 75% in 2010.
Predicts 2011:
Open-Source Software, the
Power Behind the Throne
November 2010

Global 100 Financial Institution
6,000
4,500
3,000
1,500
0

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec

Unique Components per Month
The Component Lifecycle Management Company
“But we don’t use Open Source”

It’s no longer a question
of whether you use
OSS, it’s how many
components are being
used & where

The Component Lifecycle Management Company
What You Don’t Know Can and Will Hurt You

46,000,000

18,000

4,000

downloads of insecure
versions of the
31 most popular
security libraries and
web frameworks

organizations
downloaded a version
of the Struts
framework with a
‘severe’ security flaw

organizations
downloaded versions of
Struts 1.x with known
security flaws (most
classified as ‘severe’).

Uncontrolled, Unmanaged Risk

The Component Lifecycle Management Company
No “Throat to Choke”

• Discovering a security issue
is half the battle
• Transitive and hidden
dependencies make it
extremely difficult to assign
responsibility to propagate
fixes throughout the
component chain

The Component Lifecycle Management Company
A Multi-faceted Challenge

Complexity

Diversity

Volume

Change

One component may
rely on 00s
of others

40,000 Projects
200MM Classes
400K Components

Typical Enterprise
Consumes
000s of
Components Monthly

Typical Component
is Updated 4X
per Year

The Component Lifecycle Management Company
Success Requires Discipline

The Component Lifecycle Management Company
The Problem is Not Problem Discovery

• When our software development
ecosystem looks like this it is
easy to find problems
• The real challenge is to develop
at scale and deliver continuous
value continuously when
everything else is a mess

The Component Lifecycle Management Company
Current State

No

No visibility to what components are used,
where they are used and where there is risk

No

No way to govern/enforce component usage.
Policies are not integrated with development .

Visibility
Control

No

No efficient way to fix existing flaws.

Fix

The Component Lifecycle Management Company
Practical Solutions Require a Practical Approach

The Component Lifecycle Management Company
“Haven’t I heard this story before?”

The Component Lifecycle Management Company
It’s Not a One Trick Pony

The Component Lifecycle Management Company
Accurate Identification

You can’t begin if you don’t know where to start, and
you can’t start if you don’t know what you have.

The Component Lifecycle Management Company
Components Can be Compromised

Component Repositories

Non-vetted components
enter the dev process from
many sources

Development Repositories

Integrate

Build

Deploy

Components can be
compromised throughout
the lifecycle

The Component Lifecycle Management Company
Component Lifecycle Management

Development Repo

Development Repositories

The Component Lifecycle Management Company
Data Driven Policies Facilitate Governance
Data Feeds

Security

License

Quality

Custom

Policy Management



Workflow

Reporting
Rule-based Policies

Alerts
POLICY

The Component Lifecycle Management Company
Sonatype Governed Development

Informs and governs the software
supply chain with security, popularity,
and licensing information, developerfriendly policy enforcement, and early
flaw detection and prevention.

• Optimal component selection
provides clean starting point
minimizing downstream issues
• Centralized policy administration
with local enforcement ensures
effective governance & compliance
• Early problem detection &
remediation ensures fast, trusted
application delivery with low cost

• Inventory capability provides basis
for effective management &
monitoring

The Component Lifecycle Management Company
Sonatype Monitoring & Remediation

Provides a fast-path to discovering and
fixing at-risk applications by precisely
identifying component flaws and offering
flexible remediation options.

• Constant monitoring of applications
ensures continuous trust.
• Triage capability helps prioritize
critical work.
• Flexible remediation enables fast
response to application problems.
• Reporting & analysis capability
supports audit and regulatory
requirements.

The Component Lifecycle Management Company
The Patch vs. Replace Dilemma

Patch

•
•
•
•
•

Replace

Investigate severity of security vulnerability
Determine project status (under active maintenance)
Find patch (is it available?)
Determine impact of patch (assess API compatibility, etc.)
Re-certify

The Component Lifecycle Management Company
Security is a Matter of Priorities

Development

Operations

Security

Features

Performance

Security

Usability

Reliability/Scalability

Compliance

Performance

Compliance

Everything Else

Reliability/Scalability

Security

Maintainability

Maintainability

Security

Features/Usability

Compliance
The Component Lifecycle Management Company
Building A Better Bridge Between Dev, Ops and Security

• Need to recognize that the
priorities are different
• Tooling needs to adopt the
practice of the practitioner not
the other way around
• A Tool is not a process and a
process is not a tool learn to
leverage both.

The Component Lifecycle Management Company
For More Information: Free Risk Assessment

www.sonatype.com/Products/App
lication-Health-Check/AnalyzeYour-App

www.sonatype.com/Contact-Us

The Component Lifecycle Management Company
The Hidden Risk of Component Based Software Development

More Related Content

PPTX
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
PDF
5 things about os sharon webinar final
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
PDF
Security & DevOps - What We Have Here Is a Failure to Communicate!
PPTX
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
PDF
Webinar: Systems Failures Fuel Security-Focused Design Practices
PDF
Information Security Incidents Survey in Russia
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
5 things about os sharon webinar final
2021 Open Source Governance: Top Ten Trends and Predictions
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Security & DevOps - What We Have Here Is a Failure to Communicate!
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
Webinar: Systems Failures Fuel Security-Focused Design Practices
Information Security Incidents Survey in Russia

What's hot (20)

PPTX
Find out what's new at Puppet - products, programs, and more!
PDF
Tackling the Risks of Open Source Security: 5 Things You Need to Know
PDF
Cloud Survey
PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
PDF
The State of Open Source Vulnerabilities Management
PPTX
Need Of security in DevOps
PDF
Healthcare application-security-practices-survey-veracode
PDF
Penetration Testing
PPTX
Veracode - Inglês
PPTX
Accelerating Innovation with Software Supply Chain Management
PDF
Enterprise Security APIs
PDF
Why the Future of Analytics Is Embedded
PDF
Fyipe - One complete DevOps and IT Ops platform.
PDF
Solving for Compliance: Mobile app security for banking and financial services
PPTX
3 Steps to Expand DevOps and Automation Throughout the Enterprise
PPTX
Supply Chain Solutions for Modern Software Development
PDF
Collaborative Mobile Test Automation
PPTX
Software testing trends for 2019
PDF
Should I Partner with an Outsourced QA Provider for Security Testing?
PDF
Future Of Software Testing
Find out what's new at Puppet - products, programs, and more!
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Cloud Survey
Winning open source vulnerabilities without loosing your deveopers - Azure De...
The State of Open Source Vulnerabilities Management
Need Of security in DevOps
Healthcare application-security-practices-survey-veracode
Penetration Testing
Veracode - Inglês
Accelerating Innovation with Software Supply Chain Management
Enterprise Security APIs
Why the Future of Analytics Is Embedded
Fyipe - One complete DevOps and IT Ops platform.
Solving for Compliance: Mobile app security for banking and financial services
3 Steps to Expand DevOps and Automation Throughout the Enterprise
Supply Chain Solutions for Modern Software Development
Collaborative Mobile Test Automation
Software testing trends for 2019
Should I Partner with an Outsourced QA Provider for Security Testing?
Future Of Software Testing
Ad

Similar to The Hidden Risk of Component Based Software Development (20)

PDF
How IT Can Empower Citizen Developers to Build Apps
PPTX
Navigating HCM Compliance Through Managed Services Part 2
PDF
Sonatype's 2013 OSS Software Survey
PPTX
Fundamentals of Deploy and Release
PPTX
Blankenship application insights overview
PDF
Software supply chain management: Gaining velocity without losing control
PPTX
Office Add-ins developer community call-July 2019
PPT
Lean Systems Thinking Bob Marshall
PDF
Mavenlink Analyst Review April 2011
PPTX
Recent and-future-trends spm
PDF
The Ultimate Guide to Automated Functional Testing.pdf
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PPTX
Enterprise DevOps
PPT
IT Symposium Agile
PDF
ITIL Guide for DevOps
PDF
Slides from "Taking an Holistic Approach to Product Quality"
PDF
Gain business insight with Continuous Controls Monitoring
PDF
State of the Market - Data Quality in 2023
PDF
Software Testing Principles
PDF
Use the Right Tools to Avoid the DevOps Culture Clash
How IT Can Empower Citizen Developers to Build Apps
Navigating HCM Compliance Through Managed Services Part 2
Sonatype's 2013 OSS Software Survey
Fundamentals of Deploy and Release
Blankenship application insights overview
Software supply chain management: Gaining velocity without losing control
Office Add-ins developer community call-July 2019
Lean Systems Thinking Bob Marshall
Mavenlink Analyst Review April 2011
Recent and-future-trends spm
The Ultimate Guide to Automated Functional Testing.pdf
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Enterprise DevOps
IT Symposium Agile
ITIL Guide for DevOps
Slides from "Taking an Holistic Approach to Product Quality"
Gain business insight with Continuous Controls Monitoring
State of the Market - Data Quality in 2023
Software Testing Principles
Use the Right Tools to Avoid the DevOps Culture Clash
Ad

More from Sonatype (20)

PPTX
DevOps Days Columbus - Derek Weeks - 2019
PDF
2019 DevSecOps Reference Architectures
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
PPTX
DevSecOps reference architectures 2018
PDF
30+ Nexus Integrations to Accelerate DevOps
PDF
2017 DevSecOps Survey
PPTX
Starting and Scaling DevOps In the Enterprise
PPTX
DevOps Friendly Doc Publishing for APIs & Microservices
PDF
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
PPTX
DevOps and All the Continuouses w/ Helen Beal
PDF
Serverless and the Way Forward
PDF
A Small Association's Journey to DevOps w/ Edward Ruiz
PDF
What's My Security Policy Doing to My Help Desk w/ Chris Swan
PDF
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
PDF
Static Analysis For Security and DevOps Happiness w/ Justin Collins
PDF
Automated Infrastructure Security: Monitoring using FOSS
PDF
System Hardening Using Ansible
PDF
There is No Server: Immutable Infrastructure and Serverless Architecture
PDF
Getting out of the Job Jungle with Jenkins
PDF
Modern Infrastructure Automation
DevOps Days Columbus - Derek Weeks - 2019
2019 DevSecOps Reference Architectures
RSAC DevSecOpsDays 2018 - We are all Equifax
DevSecOps reference architectures 2018
30+ Nexus Integrations to Accelerate DevOps
2017 DevSecOps Survey
Starting and Scaling DevOps In the Enterprise
DevOps Friendly Doc Publishing for APIs & Microservices
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
DevOps and All the Continuouses w/ Helen Beal
Serverless and the Way Forward
A Small Association's Journey to DevOps w/ Edward Ruiz
What's My Security Policy Doing to My Help Desk w/ Chris Swan
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Automated Infrastructure Security: Monitoring using FOSS
System Hardening Using Ansible
There is No Server: Immutable Infrastructure and Serverless Architecture
Getting out of the Job Jungle with Jenkins
Modern Infrastructure Automation

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

The Hidden Risk of Component Based Software Development

  • 2. What You Don’t Know Will Hurt You The Hidden Risk of Component Based Software Development Ryan Berg, CSO Sonatype Send Tweets to #CSORisk The Component Lifecycle Management Company
  • 3. 80% > Written Assembled of a typical application is assembled from open source & proprietary components The Component Lifecycle Management Company
  • 4. The Ice-Caps are Melting The Component Lifecycle Management Company
  • 5. Development Must Keep Up with Pace Of Innovation Development must change The Component Lifecycle Management Company
  • 6. Components are Everywhere By 2016, OSS will be included in mission-critical software portfolios within 99% of Global 2000 enterprises, up from 75% in 2010. Predicts 2011: Open-Source Software, the Power Behind the Throne November 2010 Global 100 Financial Institution 6,000 4,500 3,000 1,500 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Unique Components per Month The Component Lifecycle Management Company
  • 7. “But we don’t use Open Source” It’s no longer a question of whether you use OSS, it’s how many components are being used & where The Component Lifecycle Management Company
  • 8. What You Don’t Know Can and Will Hurt You 46,000,000 18,000 4,000 downloads of insecure versions of the 31 most popular security libraries and web frameworks organizations downloaded a version of the Struts framework with a ‘severe’ security flaw organizations downloaded versions of Struts 1.x with known security flaws (most classified as ‘severe’). Uncontrolled, Unmanaged Risk The Component Lifecycle Management Company
  • 9. No “Throat to Choke” • Discovering a security issue is half the battle • Transitive and hidden dependencies make it extremely difficult to assign responsibility to propagate fixes throughout the component chain The Component Lifecycle Management Company
  • 10. A Multi-faceted Challenge Complexity Diversity Volume Change One component may rely on 00s of others 40,000 Projects 200MM Classes 400K Components Typical Enterprise Consumes 000s of Components Monthly Typical Component is Updated 4X per Year The Component Lifecycle Management Company
  • 11. Success Requires Discipline The Component Lifecycle Management Company
  • 12. The Problem is Not Problem Discovery • When our software development ecosystem looks like this it is easy to find problems • The real challenge is to develop at scale and deliver continuous value continuously when everything else is a mess The Component Lifecycle Management Company
  • 13. Current State No No visibility to what components are used, where they are used and where there is risk No No way to govern/enforce component usage. Policies are not integrated with development . Visibility Control No No efficient way to fix existing flaws. Fix The Component Lifecycle Management Company
  • 14. Practical Solutions Require a Practical Approach The Component Lifecycle Management Company
  • 15. “Haven’t I heard this story before?” The Component Lifecycle Management Company
  • 16. It’s Not a One Trick Pony The Component Lifecycle Management Company
  • 17. Accurate Identification You can’t begin if you don’t know where to start, and you can’t start if you don’t know what you have. The Component Lifecycle Management Company
  • 18. Components Can be Compromised Component Repositories Non-vetted components enter the dev process from many sources Development Repositories Integrate Build Deploy Components can be compromised throughout the lifecycle The Component Lifecycle Management Company
  • 19. Component Lifecycle Management Development Repo Development Repositories The Component Lifecycle Management Company
  • 20. Data Driven Policies Facilitate Governance Data Feeds Security License Quality Custom Policy Management  Workflow Reporting Rule-based Policies Alerts POLICY The Component Lifecycle Management Company
  • 21. Sonatype Governed Development Informs and governs the software supply chain with security, popularity, and licensing information, developerfriendly policy enforcement, and early flaw detection and prevention. • Optimal component selection provides clean starting point minimizing downstream issues • Centralized policy administration with local enforcement ensures effective governance & compliance • Early problem detection & remediation ensures fast, trusted application delivery with low cost • Inventory capability provides basis for effective management & monitoring The Component Lifecycle Management Company
  • 22. Sonatype Monitoring & Remediation Provides a fast-path to discovering and fixing at-risk applications by precisely identifying component flaws and offering flexible remediation options. • Constant monitoring of applications ensures continuous trust. • Triage capability helps prioritize critical work. • Flexible remediation enables fast response to application problems. • Reporting & analysis capability supports audit and regulatory requirements. The Component Lifecycle Management Company
  • 23. The Patch vs. Replace Dilemma Patch • • • • • Replace Investigate severity of security vulnerability Determine project status (under active maintenance) Find patch (is it available?) Determine impact of patch (assess API compatibility, etc.) Re-certify The Component Lifecycle Management Company
  • 24. Security is a Matter of Priorities Development Operations Security Features Performance Security Usability Reliability/Scalability Compliance Performance Compliance Everything Else Reliability/Scalability Security Maintainability Maintainability Security Features/Usability Compliance The Component Lifecycle Management Company
  • 25. Building A Better Bridge Between Dev, Ops and Security • Need to recognize that the priorities are different • Tooling needs to adopt the practice of the practitioner not the other way around • A Tool is not a process and a process is not a tool learn to leverage both. The Component Lifecycle Management Company
  • 26. For More Information: Free Risk Assessment www.sonatype.com/Products/App lication-Health-Check/AnalyzeYour-App www.sonatype.com/Contact-Us The Component Lifecycle Management Company