SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
© 2019 Synopsys, Inc.1
Is Your Software Supply Chain a Security Blind
Spot?
Lisa Bryngelson Sr. Product Manager - Black Duck Binary Analysis
July 25, 2019
© 2019 Synopsys, Inc.2
Agenda
How is scanning binaries for open source different than source code?
Key Use Cases
How to make your company more secure?
© 2019 Synopsys, Inc.3
Let’s make sure we are all on the same page …
• Binary file refers to a non-text file containing bytes interpreted as something
other text characters.
• Examples: Compiled computer programs like .exe, ISO, rpm. Linux distributions,
Docker containers, jars, .class, dlls, firmware
© 2019 Synopsys, Inc.4
Differences between identifying open source in
source code vs. binaries
© 2019 Synopsys, Inc.5
Should I really be concerned about binaries if I scan source?
In Gartner’s Latest Survey, Cybersecurity Risk (Again) Comes Out as the No. 1 Concern
for Supply Chain Leaders *
“In Gartner’s recent “Future of Supply Chain” survey of 270 supply chain leaders, we asked
respondents to identify their top concerns regarding a series of risks within their supply and
demand chains in 2018 and 2019 …
The results are loud and clear and consistent with data we have been seeing for several years
now (see “Combat Digital Security Threats to the Supply Chain”). Cybersecurity attacks rank
well above all other risks, whether they are regulatory, operational or financial.”
* Gartner report “Get Ahead of the Expanding Risk Frontier: Supply Chain Security” May 20, 2019
© 2019 Synopsys, Inc.6
Identifying open source in source code vs. binaries
• You care about managing open source in your applications.
• You should care about the open source in binaries as well as the source.
• You may still be responsible for any risks that may be found with the binaries if you are
shipping them.
• Know your company’s risk tolerance.
Since you don’t have access to the source there are a couple of options:
• Trust what the supplier tells you what’s in the binary
• Scan the binary using a tool that has the ability to interrogate the binary
Recommendation:
• Trust but verify
© 2019 Synopsys, Inc.7
What are the key use cases for binaries
© 2019 Synopsys, Inc.8
What are the key use cases for binaries
• Supply Chain
Customer’s suppliers, their suppliers, their suppliers, etc. deliver product as or including binary to
be included in customer’s products
• Development
“Drag in” source code in the form of libraries, dll’s, etc.
• Procurement
Packaged software purchased from vendors for internal use
• Vertical Isolation
Business units only share binaries between other business units like classified environments
Where do binaries come from?
8
© 2019 Synopsys, Inc.9
Developed In-house
Another piece is the supply chain puzzle: binaries
How binaries get into the product?
Third-party
commercial
software
Open Source
Components
Often delivered as
binary and difficult to
crack open to
understand contents
Custom
Code
Source
Binary
© 2019 Synopsys, Inc.10
How to make your Company more secure?
© 2019 Synopsys, Inc.11
End-to-end control of open source risks
DETECT
Inventory and track
all open source
components
in your code
MANAGE
Set, verify, and enforce
open source security
and use policies
across supply chain
MONITOR
Actively monitor and
fix new vulnerabilities
that impact
deployed software
PROTECT
Identify and remediate
known open source
vulnerabilities
and license issues
before you ship
INTEGRATE and AUTOMATE with your DevOps tools and processes
© 2019 Synopsys, Inc.12
When to scan for binaries?
Where do the binaries come into your SDLC?
Do you have access to the source for the binary?
What is your companies risk tolerance?
– Impacts how often you scan
– Impacts to what level you identify components
– Require OSS approvals
© 2019 Synopsys, Inc.13
When to Scan during the SDLC?
Development Build Test Deploy ProductionOSS
Approval
© 2019 Synopsys, Inc.14
Things to think about when you look at binary analysis
tools
• What type of binaries are you scanning?
• Structured/unmodified
• Unstructured/modified (custom binaries)
• Language and artifact support
• What scanning techniques are used?
• Most tools will be really just looking at archives etc. in the manifest
• You want a tool that can really crack open the binaries to discover the composition inside
• Signature and string matching
• What kind of metadata is available for the binary matches?
• Security vulnerability info (NVD, Linux backpatching, remediation help)
• License information
• Other types of data available (hashes, timestamps, paths, string searches, permissions)
© 2019 Synopsys, Inc.15
Black Duck Binary Analysis
© 2019 Synopsys, Inc.16
Black Duck Binary Analysis
• Black Duck Binary Analysis is an automated software composition analysis tool that enables
organizations to audit open source software for security vulnerabilities and compliance in third-
party code.
• Focus is scanning binaries
• Pulls security vulnerability from NVD
• Surfaces backpatch information for Linux distros
• 200,000 components in Knowledgebase
• Security vulnerability data updated 4 time per day for Cloud
• Matching is based on hash matching combined with string searches algorithm. No reverse
engineering or de-compilation is used.
Find open source security, compliance, and quality risks in executables and libraries
© 2019 Synopsys, Inc.17
Black Duck Binary Analysis
Find open source security, compliance, and quality risks in executables and libraries
• Detect
Analyze firmware, mobile apps and virtual
appliances without access to source.
• Protect
Identify embedded open source usage
and risks within binary executables and
libraries.
• Manage
Combat code decay and improve software
quality within binary dependencies.
• Monitor
Proactive alters for new vulnerabilities in
previously scanned binaries
© 2019 Synopsys, Inc.18
Black Duck Binary Scanner – supported file formats
• Compression Formats:
– gzip (.gz)
– bzip2 (.bz2)
– lzma (.lz)
– lz4 (.lz4)
– compress (.Z)
– xz (.xz)
– pack200 (.jar)
• Archive formats:
– Zip (.zip, .jar, .apk and derivates)
– Xar (.xar)
– 7zip (.7z)
– ARJ (.arj)
– Tar (.tar)
– VM Tar (.tar)
– cpio (.cpio)
– RAR (.rar)
– LZH (.lzh)
– Electron archive (.asar)
• Firmware formats:
– Intel HEX
– SREC
– uBoot
– Arris firmware
– Juniper firmwares
– Kosmosx firmwares
– Android Sparse Filesystem
– Cisco firmwares
• Other:
– Various other formats which are effectively tarballs, zips
or other archives, like other Linux package formats,
containers (e.g. Docker)
– Unrecognized data blobs are scavenged for common
filesystems, archives and executables
Installation formats:
• Redhat RPM (.rpm)
• Debian package (.deb)
• Mac installers (.dmg, .pkg)
• Unix Shell file installers (.sh, .bin)
• Windows installers (.exe, .msi, .cab)
Filesystems / Disk images:
• ISO 9660 / UDF (.iso)
• Windows imaging
• ext2/3/4
• JFFS2
• UBIFS
• RomFS
• Microsoft Disk Image
• Macintosh HFS
• VMWare VMDK (.vmdk, .ova)
• QEMU copy-on-write (.qcow2)
• Virtualbox VDI (.vdi)
• QNX - EFS, IFS
• Netboot images (.nbi)
…
© 2019 Synopsys, Inc.19
Black Duck Binary Analysis Metadata
• Security relevant file information
– NVE CVE data and Linux backpatch information
– Missing exploit mitigation features in compiled files, e.g. stack protector, ASLR
– Required permission for Android/iOS apps
© 2019 Synopsys, Inc.20
Black Duck Binary Analysis Metadata
• Docker Image Layers • Historical graph of security vuln data for
component
© 2019 Synopsys, Inc.21
Black Duck Binary Analysis Metadata
• Information Leakage:
– Surfaces Info Leakage data from any file
touched during the scan
– Forgotten developer credentials in
unsuspected places
– AWS Keys
– URLs
– Passwords
– IP Addresses, MAC Address
– Image metadata (location info)
– Shell history
© 2019 Synopsys, Inc.22
Key Take Aways
© 2019 Synopsys, Inc.23
Key Takeaways
• Supply Chain leaders consider Cybersecurity Risk a number one priority
• Trust but verify
• Understand your company’s risk tolerance level
• Secure through - Detect, Protect, Manage, Monitor
• Black Duck Binary Analysis is the best !
© 2019 Synopsys, Inc.24
Build secure, high-quality software faster

Weitere ähnliche Inhalte

Was ist angesagt?

Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Synopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Software Integrity Group
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Black Duck by Synopsys
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...Black Duck by Synopsys
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 

Was ist angesagt? (19)

Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 

Ähnlich wie Webinar–Is Your Software Security Supply Chain a Security Blind Spot?

Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisVMware Tanzu
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfICS
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckBlack Duck by Synopsys
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Shannon Williams
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container SecurityKsenia Peguero
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)dmgerman
 
Managing Open Source Software Supply Chains
Managing Open Source Software Supply ChainsManaging Open Source Software Supply Chains
Managing Open Source Software Supply ChainsnexB Inc.
 
Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementProtecode
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg Tunde Ogunkoya
 
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on KubernetesKCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetessparkfabrik
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013drewz lin
 

Ähnlich wie Webinar–Is Your Software Security Supply Chain a Security Blind Spot? (20)

Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container Security
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
Managing Open Source Software Supply Chains
Managing Open Source Software Supply ChainsManaging Open Source Software Supply Chains
Managing Open Source Software Supply Chains
 
Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software Management
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
 
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on KubernetesKCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
 

Mehr von Synopsys Software Integrity Group

Mehr von Synopsys Software Integrity Group (10)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 

Kürzlich hochgeladen (20)

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 

Webinar–Is Your Software Security Supply Chain a Security Blind Spot?

  • 1. © 2019 Synopsys, Inc.1 Is Your Software Supply Chain a Security Blind Spot? Lisa Bryngelson Sr. Product Manager - Black Duck Binary Analysis July 25, 2019
  • 2. © 2019 Synopsys, Inc.2 Agenda How is scanning binaries for open source different than source code? Key Use Cases How to make your company more secure?
  • 3. © 2019 Synopsys, Inc.3 Let’s make sure we are all on the same page … • Binary file refers to a non-text file containing bytes interpreted as something other text characters. • Examples: Compiled computer programs like .exe, ISO, rpm. Linux distributions, Docker containers, jars, .class, dlls, firmware
  • 4. © 2019 Synopsys, Inc.4 Differences between identifying open source in source code vs. binaries
  • 5. © 2019 Synopsys, Inc.5 Should I really be concerned about binaries if I scan source? In Gartner’s Latest Survey, Cybersecurity Risk (Again) Comes Out as the No. 1 Concern for Supply Chain Leaders * “In Gartner’s recent “Future of Supply Chain” survey of 270 supply chain leaders, we asked respondents to identify their top concerns regarding a series of risks within their supply and demand chains in 2018 and 2019 … The results are loud and clear and consistent with data we have been seeing for several years now (see “Combat Digital Security Threats to the Supply Chain”). Cybersecurity attacks rank well above all other risks, whether they are regulatory, operational or financial.” * Gartner report “Get Ahead of the Expanding Risk Frontier: Supply Chain Security” May 20, 2019
  • 6. © 2019 Synopsys, Inc.6 Identifying open source in source code vs. binaries • You care about managing open source in your applications. • You should care about the open source in binaries as well as the source. • You may still be responsible for any risks that may be found with the binaries if you are shipping them. • Know your company’s risk tolerance. Since you don’t have access to the source there are a couple of options: • Trust what the supplier tells you what’s in the binary • Scan the binary using a tool that has the ability to interrogate the binary Recommendation: • Trust but verify
  • 7. © 2019 Synopsys, Inc.7 What are the key use cases for binaries
  • 8. © 2019 Synopsys, Inc.8 What are the key use cases for binaries • Supply Chain Customer’s suppliers, their suppliers, their suppliers, etc. deliver product as or including binary to be included in customer’s products • Development “Drag in” source code in the form of libraries, dll’s, etc. • Procurement Packaged software purchased from vendors for internal use • Vertical Isolation Business units only share binaries between other business units like classified environments Where do binaries come from? 8
  • 9. © 2019 Synopsys, Inc.9 Developed In-house Another piece is the supply chain puzzle: binaries How binaries get into the product? Third-party commercial software Open Source Components Often delivered as binary and difficult to crack open to understand contents Custom Code Source Binary
  • 10. © 2019 Synopsys, Inc.10 How to make your Company more secure?
  • 11. © 2019 Synopsys, Inc.11 End-to-end control of open source risks DETECT Inventory and track all open source components in your code MANAGE Set, verify, and enforce open source security and use policies across supply chain MONITOR Actively monitor and fix new vulnerabilities that impact deployed software PROTECT Identify and remediate known open source vulnerabilities and license issues before you ship INTEGRATE and AUTOMATE with your DevOps tools and processes
  • 12. © 2019 Synopsys, Inc.12 When to scan for binaries? Where do the binaries come into your SDLC? Do you have access to the source for the binary? What is your companies risk tolerance? – Impacts how often you scan – Impacts to what level you identify components – Require OSS approvals
  • 13. © 2019 Synopsys, Inc.13 When to Scan during the SDLC? Development Build Test Deploy ProductionOSS Approval
  • 14. © 2019 Synopsys, Inc.14 Things to think about when you look at binary analysis tools • What type of binaries are you scanning? • Structured/unmodified • Unstructured/modified (custom binaries) • Language and artifact support • What scanning techniques are used? • Most tools will be really just looking at archives etc. in the manifest • You want a tool that can really crack open the binaries to discover the composition inside • Signature and string matching • What kind of metadata is available for the binary matches? • Security vulnerability info (NVD, Linux backpatching, remediation help) • License information • Other types of data available (hashes, timestamps, paths, string searches, permissions)
  • 15. © 2019 Synopsys, Inc.15 Black Duck Binary Analysis
  • 16. © 2019 Synopsys, Inc.16 Black Duck Binary Analysis • Black Duck Binary Analysis is an automated software composition analysis tool that enables organizations to audit open source software for security vulnerabilities and compliance in third- party code. • Focus is scanning binaries • Pulls security vulnerability from NVD • Surfaces backpatch information for Linux distros • 200,000 components in Knowledgebase • Security vulnerability data updated 4 time per day for Cloud • Matching is based on hash matching combined with string searches algorithm. No reverse engineering or de-compilation is used. Find open source security, compliance, and quality risks in executables and libraries
  • 17. © 2019 Synopsys, Inc.17 Black Duck Binary Analysis Find open source security, compliance, and quality risks in executables and libraries • Detect Analyze firmware, mobile apps and virtual appliances without access to source. • Protect Identify embedded open source usage and risks within binary executables and libraries. • Manage Combat code decay and improve software quality within binary dependencies. • Monitor Proactive alters for new vulnerabilities in previously scanned binaries
  • 18. © 2019 Synopsys, Inc.18 Black Duck Binary Scanner – supported file formats • Compression Formats: – gzip (.gz) – bzip2 (.bz2) – lzma (.lz) – lz4 (.lz4) – compress (.Z) – xz (.xz) – pack200 (.jar) • Archive formats: – Zip (.zip, .jar, .apk and derivates) – Xar (.xar) – 7zip (.7z) – ARJ (.arj) – Tar (.tar) – VM Tar (.tar) – cpio (.cpio) – RAR (.rar) – LZH (.lzh) – Electron archive (.asar) • Firmware formats: – Intel HEX – SREC – uBoot – Arris firmware – Juniper firmwares – Kosmosx firmwares – Android Sparse Filesystem – Cisco firmwares • Other: – Various other formats which are effectively tarballs, zips or other archives, like other Linux package formats, containers (e.g. Docker) – Unrecognized data blobs are scavenged for common filesystems, archives and executables Installation formats: • Redhat RPM (.rpm) • Debian package (.deb) • Mac installers (.dmg, .pkg) • Unix Shell file installers (.sh, .bin) • Windows installers (.exe, .msi, .cab) Filesystems / Disk images: • ISO 9660 / UDF (.iso) • Windows imaging • ext2/3/4 • JFFS2 • UBIFS • RomFS • Microsoft Disk Image • Macintosh HFS • VMWare VMDK (.vmdk, .ova) • QEMU copy-on-write (.qcow2) • Virtualbox VDI (.vdi) • QNX - EFS, IFS • Netboot images (.nbi) …
  • 19. © 2019 Synopsys, Inc.19 Black Duck Binary Analysis Metadata • Security relevant file information – NVE CVE data and Linux backpatch information – Missing exploit mitigation features in compiled files, e.g. stack protector, ASLR – Required permission for Android/iOS apps
  • 20. © 2019 Synopsys, Inc.20 Black Duck Binary Analysis Metadata • Docker Image Layers • Historical graph of security vuln data for component
  • 21. © 2019 Synopsys, Inc.21 Black Duck Binary Analysis Metadata • Information Leakage: – Surfaces Info Leakage data from any file touched during the scan – Forgotten developer credentials in unsuspected places – AWS Keys – URLs – Passwords – IP Addresses, MAC Address – Image metadata (location info) – Shell history
  • 22. © 2019 Synopsys, Inc.22 Key Take Aways
  • 23. © 2019 Synopsys, Inc.23 Key Takeaways • Supply Chain leaders consider Cybersecurity Risk a number one priority • Trust but verify • Understand your company’s risk tolerance level • Secure through - Detect, Protect, Manage, Monitor • Black Duck Binary Analysis is the best !
  • 24. © 2019 Synopsys, Inc.24 Build secure, high-quality software faster