SlideShare ist ein Scribd-Unternehmen logo
1 von 31
451RESEARCH.COM
©2018 451 Research. All Rights Reserved.
New Research Reveals Key
Strategy to Manage Open
Source Security
Scott Crawford, 451 Research
Rami Elron, WhiteSource
October 31, 2018
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 2
Rami Elron
Senior Director of Product Management
Scott Crawford
Research Director
451RESEARCH.COM
©2018 451 Research. All Rights Reserved.
Questions?
Presentation Slides
Feedback
Housekeeping items
Questions?
A copy of the presentation will be provided to
all attendees
Presentation Slides
Feedback
To ask a question, click on the question button
Don’t forget to leave feedback at the end of
the webinar
451RESEARCH.COM
©2018 451 Research. All Rights Reserved.
An increasingly pervasive
digital world
• Technology becoming
integrated with virtually every
aspect of life
• In industry, as well as in
personal/consumer interaction
• Creating demand as never
before
• What drives tech? Software
2011: “Software is eating the world.”
2016: “Software will program the world.”
-Marc Andreesen
4
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 5
How to source this demand?
• Internal, bespoke
development can only extend
so far
• The community precedent
• Well established (see Linux)
• Collaborative development
• The rise of shared
repositories
• “Social coding”
451RESEARCH.COM
©2018 451 Research. All Rights Reserved.
Fast forward to today
• Technology now highly
dependent on open source
software (OSS)
• GitHub:
• 28 million developers
• 85 million code repositories
(public and private)
• And now, we can hang a
value on it!
6
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 7
Not without risks
• Case in point: Licensing
• Open Source Initiative: 83 different
schemes
• Even the definition of “free” may
not always be clear
• What about:
• Sublicenses?
• Software links?
• In development?
• Dynamic links in operations?
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 8
And then there was…
• Heartbleed
• OpenSSL v1.0.1 (Jan 2012)
• Not discovered & disclosed until
2014
• 17% of secure websites
• ~Half million digital certificates
• …And more (Cisco: 78 different
products affected)
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 9
The pervasiveness of exposure
• Struts 2 vulnerability
• …which extends the Java Servet API
• …had a vuln in OGNL (remote code
execution exposure)
• …which is incorporated in Jakarta
• …which was part of Apache
• Equifax
• Breach discovered July 29, 2017
• After vuln initially disclosed in March
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 10
Tackling the challenge:
Software Composition Analysis
• Awareness and action,
before incorporating OSS
risks in critical software
• Licensing
• Identify and clarify
• Security issues
• Discover and track
• Distinctions among versions
• Process integration
• Essential to modern agile,
DevOps environments
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 11
SCA: Inventory, integration, administration
and coverage
• Track All The Things!
• Development of a Bill of Materials (BOM) from multiple
sources
• Breadth of coverage
• Languages, toolsets
• Action at multiple project stages
• Shifting left …and right
• Today: Containers, too
• Tomorrow: Serverless
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 12
SCA: Security analysis in depth
• Vulnerability research
• Not just the NVD
• Dependencies
• Vulnerabilities can appear at multiple levels of depth
• Across projects & components
• Organizations are often not aware of these dependencies
• “Effective exposure”
• Vulnerability may or may not face active exposure
• An important consideration in, e.g., failing a build
• Remediation guidance
• Helping to prioritize and deliver
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 13
SCA: Getting a handle on licensing
• Clarity on actual licenses in use
• Number and prevalence
• In dependencies as well as in primary components
• Non-compliance isn’t necessarily intentional
• Use cases may subject software to licensing that differs from
that declared
• Impact on intellectual property rights
• Factors into, e.g., M&A
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 14
Organizations are adopting SCA
• In a 2018 451
Research study, 44%
of 190 respondents
surveyed are using
or plan to deploy
Software
Composition
Analysis
Source: 451 Research, Voice of the Enterprise:
Information Security, Workloads and Key
Projects 2018
451RESEARCH.COM
©2018 451 Research. All Rights Reserved. 15
Increase in SCA spending
• 42% of
organizations
reporting SCA in use
or in pilot or POC
plan to increase
their spending on
SCA
Source: 451 Research, Voice of the Enterprise:
Information Security, Workloads and Key
Projects 2018
Rami Elron
Senior Director of Product Management, WhiteSource
NEW RESEARCH REVEALS KEY
STRATEGY TO MANAGE
OPEN SOURCE SECURITY
Open Source Risk
Is On The Rise
80% of the Code Base is Open Source Components
5%-10%
1998
30%-50%
2008
60%-80%
2016
Proprietary Code
Open Source Code
Source: North Bridge Future Of Open Source Survey
Number of Reported Open Source
Vulnerabilities Grew by 51.2% in 2017
Source: WhiteSource Annual Report
Risk is Pronounced with Popular Projects
Source: WhiteSource Annual Report
Top 10 Vulnerable Open Source Projects Based on
Number of Vulnerabilities
Open Source Security Cost is Rising
Developers spend almost 15 hours per month on open source
security vulnerabilities, on average
1.3%
25.4%
29.8%
26.1%
13.3%
4.1%
None
1 -1 0 hours
11- 20 hours
20-35 hours
36 - 60 hours
Over 60 hours
0.0% 10.0% 20.0% 30.0% 40.0%
Source: WhiteSource Annual Report
Consider this:
Over 40% spend >20 hours per month
Open Source Security Cost is Rising
Developers spend almost 15 hours per month on open
source security vulnerabilities, on average
Why is that so?
Lacking tools and practices for practical prioritization
1.3%
25.4%
29.8%
26.1%
13.3%
4.1%
None
1 -1 0 hours
11- 20 hours
20-35 hours
36 - 60 hours
Over 60 hours
0.0% 10.0% 20.0% 30.0% 40.0%
Source: WhiteSource Annual Report
Over 40% spend
>20 hours
The Common Way of Handling Security Vulnerabilities
Security teams
analyze and prioritize
vulnerabilities
Sending emails or
opening issues/tickets
Closing the loop on
resolution is hard
Bridging the Gap is a Must
Security DevOps Developers
Essential Solution Ingredients
Continuous scans
Comprehensive
inventory
Full coverage
Alerts
Early as possible issue
detection
The Key Strategy:
Prioritization of Effective Vulnerabilities
WhiteSource Software Confidential
? ?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
? ?
?
?
?
?
?
Reported Vulnerabilities
Can you really handle all of them?
Which ones constitute a real risk?
Which ones should be addressed first?
Effective Vulnerabilities
Less to deal with. Much less.vs.
Focusing on Effective Vulnerabilities Could Enable:
Better development efficiency
Better development effectiveness
Better security
The Secret to Prioritization:
Reported Vulnerabilities Are Not Necessarily EFFECTIVE
Only some of the reported
security vulnerabilities in open
source libraries are effectively
referenced by developer code.
Ineffective vs. Effective Vulnerabilities
Ineffective
Effective
70%
30%
Ineffective vs. Effective Vulnerabilities
Ineffective
Effective
70%
30%
A modern approach to prioritize
security vulnerabilities should be
based on effective impact
Q&A
451RESEARCH.COM
©2018 451 Research. All Rights Reserved.
451research.com
Thank you
@s_crawford
@451Research
New York
London
Boston
Washington, D.C.
San Francisco

Weitere ähnliche Inhalte

Was ist angesagt?

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 

Was ist angesagt? (20)

CI/CD pipeline security from start to finish with WhiteSource & CircleCI
CI/CD pipeline security from start to finish with WhiteSource & CircleCICI/CD pipeline security from start to finish with WhiteSource & CircleCI
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
 
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge 
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksA question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
 
Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
 
Welcome & The State of Open Source Security
Welcome & The State of Open Source SecurityWelcome & The State of Open Source Security
Welcome & The State of Open Source Security
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 

Ähnlich wie WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source Security

Ähnlich wie WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source Security (20)

You Can’t Live Without Open Source - Results from the Open Source 360 Survey
You Can’t Live Without Open Source - Results from the Open Source 360 SurveyYou Can’t Live Without Open Source - Results from the Open Source 360 Survey
You Can’t Live Without Open Source - Results from the Open Source 360 Survey
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 

Mehr von WhiteSource

Mehr von WhiteSource (17)

From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
 
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your RiskInnocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
 
Empowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With Confidence
 
Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
 
Securing Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsSecuring Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOps
 
The Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOpsThe Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOps
 
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to KnowTackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to Know
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Deep Dive into Container Security
Deep Dive into Container SecurityDeep Dive into Container Security
Deep Dive into Container Security
 
Fire alarms vs. Fire hoses: Keeping up with Dependencies
Fire alarms vs. Fire hoses: Keeping up with DependenciesFire alarms vs. Fire hoses: Keeping up with Dependencies
Fire alarms vs. Fire hoses: Keeping up with Dependencies
 
DevSecOps: Closing the Loop from Detection to Remediation
DevSecOps: Closing the Loop from Detection to RemediationDevSecOps: Closing the Loop from Detection to Remediation
DevSecOps: Closing the Loop from Detection to Remediation
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
 
Top Open Source Licenses Explained
Top Open Source Licenses ExplainedTop Open Source Licenses Explained
Top Open Source Licenses Explained
 
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
Strategies for Improving Enterprise Application Security - a WhiteSource WebinarStrategies for Improving Enterprise Application Security - a WhiteSource Webinar
Strategies for Improving Enterprise Application Security - a WhiteSource Webinar
 
How temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedHow temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combined
 

Kürzlich hochgeladen

Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 

Kürzlich hochgeladen (20)

Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 

WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source Security

  • 1. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. New Research Reveals Key Strategy to Manage Open Source Security Scott Crawford, 451 Research Rami Elron, WhiteSource October 31, 2018
  • 2. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 2 Rami Elron Senior Director of Product Management Scott Crawford Research Director
  • 3. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. Questions? Presentation Slides Feedback Housekeeping items Questions? A copy of the presentation will be provided to all attendees Presentation Slides Feedback To ask a question, click on the question button Don’t forget to leave feedback at the end of the webinar
  • 4. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. An increasingly pervasive digital world • Technology becoming integrated with virtually every aspect of life • In industry, as well as in personal/consumer interaction • Creating demand as never before • What drives tech? Software 2011: “Software is eating the world.” 2016: “Software will program the world.” -Marc Andreesen 4
  • 5. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 5 How to source this demand? • Internal, bespoke development can only extend so far • The community precedent • Well established (see Linux) • Collaborative development • The rise of shared repositories • “Social coding”
  • 6. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. Fast forward to today • Technology now highly dependent on open source software (OSS) • GitHub: • 28 million developers • 85 million code repositories (public and private) • And now, we can hang a value on it! 6
  • 7. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 7 Not without risks • Case in point: Licensing • Open Source Initiative: 83 different schemes • Even the definition of “free” may not always be clear • What about: • Sublicenses? • Software links? • In development? • Dynamic links in operations?
  • 8. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 8 And then there was… • Heartbleed • OpenSSL v1.0.1 (Jan 2012) • Not discovered & disclosed until 2014 • 17% of secure websites • ~Half million digital certificates • …And more (Cisco: 78 different products affected)
  • 9. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 9 The pervasiveness of exposure • Struts 2 vulnerability • …which extends the Java Servet API • …had a vuln in OGNL (remote code execution exposure) • …which is incorporated in Jakarta • …which was part of Apache • Equifax • Breach discovered July 29, 2017 • After vuln initially disclosed in March
  • 10. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 10 Tackling the challenge: Software Composition Analysis • Awareness and action, before incorporating OSS risks in critical software • Licensing • Identify and clarify • Security issues • Discover and track • Distinctions among versions • Process integration • Essential to modern agile, DevOps environments
  • 11. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 11 SCA: Inventory, integration, administration and coverage • Track All The Things! • Development of a Bill of Materials (BOM) from multiple sources • Breadth of coverage • Languages, toolsets • Action at multiple project stages • Shifting left …and right • Today: Containers, too • Tomorrow: Serverless
  • 12. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 12 SCA: Security analysis in depth • Vulnerability research • Not just the NVD • Dependencies • Vulnerabilities can appear at multiple levels of depth • Across projects & components • Organizations are often not aware of these dependencies • “Effective exposure” • Vulnerability may or may not face active exposure • An important consideration in, e.g., failing a build • Remediation guidance • Helping to prioritize and deliver
  • 13. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 13 SCA: Getting a handle on licensing • Clarity on actual licenses in use • Number and prevalence • In dependencies as well as in primary components • Non-compliance isn’t necessarily intentional • Use cases may subject software to licensing that differs from that declared • Impact on intellectual property rights • Factors into, e.g., M&A
  • 14. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 14 Organizations are adopting SCA • In a 2018 451 Research study, 44% of 190 respondents surveyed are using or plan to deploy Software Composition Analysis Source: 451 Research, Voice of the Enterprise: Information Security, Workloads and Key Projects 2018
  • 15. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 15 Increase in SCA spending • 42% of organizations reporting SCA in use or in pilot or POC plan to increase their spending on SCA Source: 451 Research, Voice of the Enterprise: Information Security, Workloads and Key Projects 2018
  • 16. Rami Elron Senior Director of Product Management, WhiteSource NEW RESEARCH REVEALS KEY STRATEGY TO MANAGE OPEN SOURCE SECURITY
  • 17. Open Source Risk Is On The Rise
  • 18. 80% of the Code Base is Open Source Components 5%-10% 1998 30%-50% 2008 60%-80% 2016 Proprietary Code Open Source Code Source: North Bridge Future Of Open Source Survey
  • 19. Number of Reported Open Source Vulnerabilities Grew by 51.2% in 2017 Source: WhiteSource Annual Report
  • 20. Risk is Pronounced with Popular Projects Source: WhiteSource Annual Report Top 10 Vulnerable Open Source Projects Based on Number of Vulnerabilities
  • 21. Open Source Security Cost is Rising Developers spend almost 15 hours per month on open source security vulnerabilities, on average 1.3% 25.4% 29.8% 26.1% 13.3% 4.1% None 1 -1 0 hours 11- 20 hours 20-35 hours 36 - 60 hours Over 60 hours 0.0% 10.0% 20.0% 30.0% 40.0% Source: WhiteSource Annual Report Consider this: Over 40% spend >20 hours per month
  • 22. Open Source Security Cost is Rising Developers spend almost 15 hours per month on open source security vulnerabilities, on average Why is that so? Lacking tools and practices for practical prioritization 1.3% 25.4% 29.8% 26.1% 13.3% 4.1% None 1 -1 0 hours 11- 20 hours 20-35 hours 36 - 60 hours Over 60 hours 0.0% 10.0% 20.0% 30.0% 40.0% Source: WhiteSource Annual Report Over 40% spend >20 hours
  • 23. The Common Way of Handling Security Vulnerabilities Security teams analyze and prioritize vulnerabilities Sending emails or opening issues/tickets Closing the loop on resolution is hard
  • 24. Bridging the Gap is a Must Security DevOps Developers
  • 25. Essential Solution Ingredients Continuous scans Comprehensive inventory Full coverage Alerts Early as possible issue detection
  • 26. The Key Strategy: Prioritization of Effective Vulnerabilities
  • 27. WhiteSource Software Confidential ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Reported Vulnerabilities Can you really handle all of them? Which ones constitute a real risk? Which ones should be addressed first? Effective Vulnerabilities Less to deal with. Much less.vs. Focusing on Effective Vulnerabilities Could Enable: Better development efficiency Better development effectiveness Better security The Secret to Prioritization: Reported Vulnerabilities Are Not Necessarily EFFECTIVE
  • 28. Only some of the reported security vulnerabilities in open source libraries are effectively referenced by developer code. Ineffective vs. Effective Vulnerabilities Ineffective Effective 70% 30%
  • 29. Ineffective vs. Effective Vulnerabilities Ineffective Effective 70% 30% A modern approach to prioritize security vulnerabilities should be based on effective impact
  • 30. Q&A
  • 31. 451RESEARCH.COM ©2018 451 Research. All Rights Reserved. 451research.com Thank you @s_crawford @451Research New York London Boston Washington, D.C. San Francisco

Hinweis der Redaktion

  1. Colleen/Kristen
  2. 00:00 - 00:00 Colleen/Kristen
  3. Feel free to customize this slide with your personal contact information