SlideShare une entreprise Scribd logo
1  sur  27
Best practice recommendations for
utilizing open source software
(from a Legal Perspective)
Dave McLoughlin, Director OSS
Auditing
Presenters
Rogue Wave Software
Dave.McLoughlin@roguewave.com
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Marco Gatti, IP Attorney
Brooks Kushman
Mgatti@brookskushman.com
Agenda
• Trends in Open Source Software (OSS)
• The open source audit and license identification
• Developing a OSS process/policy
• Compliance
• Legal implications
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Trends in open source
Use of open source continues to grow
90% of companies use OSS
components in commercial
software (Gartner)
>80% of a typical Java
application is open-source
components and frameworks
(TechCrunch)
11 million developers
worldwide make 13 billion
open source requests each
year
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
 Open source components provide critical functionality
 Improves developer productivity
No license fees
Innovation drives open source use
 “More eyes” improves security
Leveraged development effort
 Apache, Tomcat, Wildfly, Jakarta Commons, Jquery
 Communities continuously improve features
Mature, commoditized applications and libraries
Massive peer review
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Assessing risk in open source
For all its benefits, risks exist
License risk
Failure to comply with
OSS license may
create liability
Security risk
The OSS component
can include
vulnerabilities
Support risk
Who do you call for
help?
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Managing OSS risk
20%
 Scanning to discover open
of organizations lack meaningful controls
over OSS selection and use
 Scanning to discover open
of developers need not prove security of OSS
they are using
 Scanning to discover open
of the organizations claim to track
vulnerabilities in OSS over time
76%
80%
Increased use + few controls = unmanaged risk
11 million developers worldwide make 13 billion open
source requests each year
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS audit & license identification
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Ad hoc or automated scanning tools
Interview developers and build list of OSS Run a scanning tool to find matches
Analyze results
Review matches: code, copyright, license, urls,
author information
Find and validate copyright and license
Create
Bill of Material: OSS and associated licenses Compliance checklist
Example report
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open Source Bill of
Material (BOM)
License Information
Compliance
Information
OSS best practices
OSS Policy
Acquisition &
approval
Support &
maintenance
Tracking
Audit &
governanceTraining
Legal
compliance
Community
interaction
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
– License requirements
– Security requirements
– Support requirements
Establish OSS policies
– Risk tolerance v. OSS value
– Recognize development realities
– Start small, streamline, and expand
Set the guiding principles
Institutionalize the policy at the development
level
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Feed and maintain policies
OSS
Policy
Legal
Technical
Security
Business
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS licenses & terms
• OSS Developer chooses
• Hundreds of pre-existing licenses to choose from
• Developers may make their own license
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Example of license obligations
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS License Potential Conflicts
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Example – Reviewing Clauses of LGPLv2
• Allows the open source software to be “linked” (“dynamically”) with
software without having the OSS terms apply to the proprietary S/W.
• Allows developers and companies to integrate LGPL software into their
own software without being required to release their proprietary source
code ~ depending on integration (i.e., static vs. dynamic linking).
• Requires that the open source software is modifiable by an end-user (via
source code availability), therefore the LGPL open source software are
usually used in the form of a shared library so that there is a clear
separation between the proprietary software and open source software.
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Example - LGPLv2
Two Kinds of “Linking”: Static vs. Dynamic
• Static libraries (e.g., .a file): Library of object code which is linked with,
and becomes part of the application (i.e., executable).
• Dynamically linked shared object libraries (e.g., .dll, .so file): The
libraries must be available during compile/link phase. The shared
objects are not included into the executable component but are
selected during the execution of the executable.
Depending on how the developer links the LGPLv2 OSS will determine
whether you have to make proprietary software available
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
LGPLv2.1 – Static vs. Dynamic
Static Linking Dynamic Linking
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
The product having an executable that contains an OSS Library
header files which dynamically call the OSS Libraries.
Example - LGPLv2.1 Section 5
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
LGPLv2.1 Section 6
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Lean Header
Loaded Header
Example - LGPLv2.1
“Loaded Header File”?
LGPLv2.1
• We researched the FSF’s position on the header file
implementation. In 2003, Richard Stallman (the author of the LGPL
license) stated as follows:
Someone recently made the claim that including a header file always
header file always makes a derivative work. That's not the FSF's view.
the FSF's view. Our view is that just using structure definitions, typedefs,
definitions, typedefs, enumeration constants, macros with simple bodies,
with simple bodies, etc., is NOT enough to make a derivative work. It
derivative work. It would take a substantial amount of code (coming from
code (coming from inline functions or macros with substantial bodies) to
substantial bodies) to do that.
Based on this interpretation, the OSS header files having template code
would follow under FSF’s view of header files not being a derivative work.© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS – Copyright Cases
• Jacobsen v. Katzer, 535 F.3d 1373 (Fed. Cir. 2008)
• Welte v. Fantec GmbH (6/14/13 – Germany)
• XimpleWare Corp. v. Versata
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Other OSS Copyright Cases
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Enforcement
• Free Software Foundation (FSF) is in some ways
the de facto enforcer of the GPL license
• FSF conducts a compliance laboratory that
investigates violations
• FSF is available for hire to assist companies to
comply
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Summary
• Three takeaways
– Understand the use of OSS
– Create Policies that works for your
company/organization
– Be aware of legal obligations based on OSS license
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Questions?
Dave.McLoughlin@roguewave.com
Mgatti@brookskushman.com

Contenu connexe

Tendances

Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementProtecode
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceBlack Duck by Synopsys
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Denim Group
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Najib Radzuan
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment securityDevSecCon
 
How to Manage Open Source requirements with AboutCode
How to Manage Open Source requirements with AboutCodeHow to Manage Open Source requirements with AboutCode
How to Manage Open Source requirements with AboutCodenexB Inc.
 
Licensing in Composite Projects
Licensing in Composite ProjectsLicensing in Composite Projects
Licensing in Composite ProjectsTiberius Forrester
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Black Duck by Synopsys
 
nexB Software Audit M&A: What to expect as a Seller
nexB Software Audit M&A: What to expect as a SellernexB Software Audit M&A: What to expect as a Seller
nexB Software Audit M&A: What to expect as a SellernexB Inc.
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Software audit for acquisition due diligence with nexB
Software audit for acquisition due diligence with nexBSoftware audit for acquisition due diligence with nexB
Software audit for acquisition due diligence with nexBnexB Inc.
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceAll Things Open
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsBlack Duck by Synopsys
 
Stack overflow code_laundering
Stack overflow code_launderingStack overflow code_laundering
Stack overflow code_launderingFoutse Khomh
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)Hui (Henry) Chen
 
Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudDevSecCon
 
Licensing in Composite Open Source Projects
Licensing in Composite Open Source ProjectsLicensing in Composite Open Source Projects
Licensing in Composite Open Source ProjectsProtecode
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Black Duck by Synopsys
 
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...Agile Testing Alliance
 

Tendances (20)

Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software Management
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
How to Manage Open Source requirements with AboutCode
How to Manage Open Source requirements with AboutCodeHow to Manage Open Source requirements with AboutCode
How to Manage Open Source requirements with AboutCode
 
Licensing in Composite Projects
Licensing in Composite ProjectsLicensing in Composite Projects
Licensing in Composite Projects
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
nexB Software Audit M&A: What to expect as a Seller
nexB Software Audit M&A: What to expect as a SellernexB Software Audit M&A: What to expect as a Seller
nexB Software Audit M&A: What to expect as a Seller
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Software audit for acquisition due diligence with nexB
Software audit for acquisition due diligence with nexBSoftware audit for acquisition due diligence with nexB
Software audit for acquisition due diligence with nexB
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and Compliance
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Stack overflow code_laundering
Stack overflow code_launderingStack overflow code_laundering
Stack overflow code_laundering
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
 
Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloud
 
Licensing in Composite Open Source Projects
Licensing in Composite Open Source ProjectsLicensing in Composite Open Source Projects
Licensing in Composite Open Source Projects
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
 

En vedette

Beyond the GPL
Beyond the GPLBeyond the GPL
Beyond the GPLMatt Ryan
 
Managing OSS license obligations
Managing OSS license obligationsManaging OSS license obligations
Managing OSS license obligationsnexB Inc.
 
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...riscoss-eu
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Mindtrek
 
SFO15-TR7: OSS License Compliance
 SFO15-TR7: OSS License Compliance SFO15-TR7: OSS License Compliance
SFO15-TR7: OSS License ComplianceLinaro
 
Managing Open Source software in the Docker era
Managing Open Source software in the Docker era Managing Open Source software in the Docker era
Managing Open Source software in the Docker era nexB Inc.
 
Performing an audit - Open source compliance seminar
Performing an audit - Open source compliance seminar Performing an audit - Open source compliance seminar
Performing an audit - Open source compliance seminar Rogue Wave Software
 
The GPL: What It Means (And What It Doesn't) - WC Udaipur
The GPL: What It Means (And What It Doesn't) - WC UdaipurThe GPL: What It Means (And What It Doesn't) - WC Udaipur
The GPL: What It Means (And What It Doesn't) - WC UdaipurNancy Thanki
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsAnsel Halliburton
 
GNU GPL, LGPL, Apache licence Types and Differences
GNU GPL, LGPL, Apache licence Types and DifferencesGNU GPL, LGPL, Apache licence Types and Differences
GNU GPL, LGPL, Apache licence Types and DifferencesIresha Rubasinghe
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source LicensesHarley Pascua
 
Why I Don't Use The GPL
Why I Don't Use The GPLWhy I Don't Use The GPL
Why I Don't Use The GPLShane Curcuru
 

En vedette (16)

Copyright
CopyrightCopyright
Copyright
 
Beyond the GPL
Beyond the GPLBeyond the GPL
Beyond the GPL
 
Managing OSS license obligations
Managing OSS license obligationsManaging OSS license obligations
Managing OSS license obligations
 
Open Source Software Licensing
Open Source Software LicensingOpen Source Software Licensing
Open Source Software Licensing
 
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
 
GNUGPL
GNUGPLGNUGPL
GNUGPL
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
SFO15-TR7: OSS License Compliance
 SFO15-TR7: OSS License Compliance SFO15-TR7: OSS License Compliance
SFO15-TR7: OSS License Compliance
 
Managing Open Source software in the Docker era
Managing Open Source software in the Docker era Managing Open Source software in the Docker era
Managing Open Source software in the Docker era
 
Performing an audit - Open source compliance seminar
Performing an audit - Open source compliance seminar Performing an audit - Open source compliance seminar
Performing an audit - Open source compliance seminar
 
The GPL: What It Means (And What It Doesn't) - WC Udaipur
The GPL: What It Means (And What It Doesn't) - WC UdaipurThe GPL: What It Means (And What It Doesn't) - WC Udaipur
The GPL: What It Means (And What It Doesn't) - WC Udaipur
 
Guide to Open Source Compliance
Guide to Open Source ComplianceGuide to Open Source Compliance
Guide to Open Source Compliance
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common Pitfalls
 
GNU GPL, LGPL, Apache licence Types and Differences
GNU GPL, LGPL, Apache licence Types and DifferencesGNU GPL, LGPL, Apache licence Types and Differences
GNU GPL, LGPL, Apache licence Types and Differences
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source Licenses
 
Why I Don't Use The GPL
Why I Don't Use The GPLWhy I Don't Use The GPL
Why I Don't Use The GPL
 

Similaire à Best practices for open source legal compliance

Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsRogue Wave Software
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business SANGHEE SHIN
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeEmerasoft, solutions to collaborate
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareOpenStack
 
Rapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRogue Wave Software
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseMarcel de Vries
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)dmgerman
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Open source software license
Open source software licenseOpen source software license
Open source software licenseaakash malhotra
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskProtecode
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskSource Code Control Limited
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Sonatype
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 

Similaire à Best practices for open source legal compliance (20)

Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business
 
Open Source ETL
Open Source ETLOpen Source ETL
Open Source ETL
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera Software
 
Rapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysis
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Open source software license
Open source software licenseOpen source software license
Open source software license
 
Open Source Licenses
Open Source LicensesOpen Source Licenses
Open Source Licenses
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 

Plus de Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-timeRogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyRogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youRogue Wave Software
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?Rogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure successRogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxRogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsRogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmRogue Wave Software
 

Plus de Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Best practices for open source legal compliance

  • 1. Best practice recommendations for utilizing open source software (from a Legal Perspective)
  • 2. Dave McLoughlin, Director OSS Auditing Presenters Rogue Wave Software Dave.McLoughlin@roguewave.com © 2015 Rogue Wave Software, Inc. All Rights Reserved. Marco Gatti, IP Attorney Brooks Kushman Mgatti@brookskushman.com
  • 3. Agenda • Trends in Open Source Software (OSS) • The open source audit and license identification • Developing a OSS process/policy • Compliance • Legal implications © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 4. Trends in open source Use of open source continues to grow 90% of companies use OSS components in commercial software (Gartner) >80% of a typical Java application is open-source components and frameworks (TechCrunch) 11 million developers worldwide make 13 billion open source requests each year © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 5.  Open source components provide critical functionality  Improves developer productivity No license fees Innovation drives open source use  “More eyes” improves security Leveraged development effort  Apache, Tomcat, Wildfly, Jakarta Commons, Jquery  Communities continuously improve features Mature, commoditized applications and libraries Massive peer review © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 6. Assessing risk in open source For all its benefits, risks exist License risk Failure to comply with OSS license may create liability Security risk The OSS component can include vulnerabilities Support risk Who do you call for help? © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 7. Managing OSS risk 20%  Scanning to discover open of organizations lack meaningful controls over OSS selection and use  Scanning to discover open of developers need not prove security of OSS they are using  Scanning to discover open of the organizations claim to track vulnerabilities in OSS over time 76% 80% Increased use + few controls = unmanaged risk 11 million developers worldwide make 13 billion open source requests each year © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 8. OSS audit & license identification © 2015 Rogue Wave Software, Inc. All Rights Reserved. Ad hoc or automated scanning tools Interview developers and build list of OSS Run a scanning tool to find matches Analyze results Review matches: code, copyright, license, urls, author information Find and validate copyright and license Create Bill of Material: OSS and associated licenses Compliance checklist
  • 9. Example report © 2015 Rogue Wave Software, Inc. All Rights Reserved. Open Source Bill of Material (BOM) License Information Compliance Information
  • 10. OSS best practices OSS Policy Acquisition & approval Support & maintenance Tracking Audit & governanceTraining Legal compliance Community interaction © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 11. – License requirements – Security requirements – Support requirements Establish OSS policies – Risk tolerance v. OSS value – Recognize development realities – Start small, streamline, and expand Set the guiding principles Institutionalize the policy at the development level © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 12. Feed and maintain policies OSS Policy Legal Technical Security Business © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 13. OSS licenses & terms • OSS Developer chooses • Hundreds of pre-existing licenses to choose from • Developers may make their own license © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 14. Example of license obligations © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 15. OSS License Potential Conflicts © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 16. Example – Reviewing Clauses of LGPLv2 • Allows the open source software to be “linked” (“dynamically”) with software without having the OSS terms apply to the proprietary S/W. • Allows developers and companies to integrate LGPL software into their own software without being required to release their proprietary source code ~ depending on integration (i.e., static vs. dynamic linking). • Requires that the open source software is modifiable by an end-user (via source code availability), therefore the LGPL open source software are usually used in the form of a shared library so that there is a clear separation between the proprietary software and open source software. © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 17. Example - LGPLv2 Two Kinds of “Linking”: Static vs. Dynamic • Static libraries (e.g., .a file): Library of object code which is linked with, and becomes part of the application (i.e., executable). • Dynamically linked shared object libraries (e.g., .dll, .so file): The libraries must be available during compile/link phase. The shared objects are not included into the executable component but are selected during the execution of the executable. Depending on how the developer links the LGPLv2 OSS will determine whether you have to make proprietary software available © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 18. LGPLv2.1 – Static vs. Dynamic Static Linking Dynamic Linking © 2015 Rogue Wave Software, Inc. All Rights Reserved. The product having an executable that contains an OSS Library header files which dynamically call the OSS Libraries.
  • 19. Example - LGPLv2.1 Section 5 © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 20. LGPLv2.1 Section 6 © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 21. Lean Header Loaded Header Example - LGPLv2.1 “Loaded Header File”?
  • 22. LGPLv2.1 • We researched the FSF’s position on the header file implementation. In 2003, Richard Stallman (the author of the LGPL license) stated as follows: Someone recently made the claim that including a header file always header file always makes a derivative work. That's not the FSF's view. the FSF's view. Our view is that just using structure definitions, typedefs, definitions, typedefs, enumeration constants, macros with simple bodies, with simple bodies, etc., is NOT enough to make a derivative work. It derivative work. It would take a substantial amount of code (coming from code (coming from inline functions or macros with substantial bodies) to substantial bodies) to do that. Based on this interpretation, the OSS header files having template code would follow under FSF’s view of header files not being a derivative work.© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 23. OSS – Copyright Cases • Jacobsen v. Katzer, 535 F.3d 1373 (Fed. Cir. 2008) • Welte v. Fantec GmbH (6/14/13 – Germany) • XimpleWare Corp. v. Versata © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 24. Other OSS Copyright Cases © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 25. Enforcement • Free Software Foundation (FSF) is in some ways the de facto enforcer of the GPL license • FSF conducts a compliance laboratory that investigates violations • FSF is available for hire to assist companies to comply © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 26. Summary • Three takeaways – Understand the use of OSS – Create Policies that works for your company/organization – Be aware of legal obligations based on OSS license © 2015 Rogue Wave Software, Inc. All Rights Reserved.

Notes de l'éditeur

  1. The open source revolution is in full swing. It’s been a wonderful tool for software developers. Using open source allows organizations to add tested, proven functionality to their code base, without having to write the code from scratch or purchase third party, proprietary code to add the same functionality. Estimates now indicate over 90% of all companies now use open source in their commercial software, and that up to 80% of all code in new java applications is from open source components. If one looks at public repositories, including the Central Repository and SourceForge, over 13 billion downloads occur every year. This benefit comes with risk, however. The vast majority of companies using open source have little, if any oversight as to the selection and use of the libraries and their licenses. In addition, millions of OSS components with known vulnerabilities are downloaded for use each year. Managing this process better is possible, and what we will be discussing today.
  2. Mature: Best in class, vetted solutions, leveraged development effort Mature: Apache, Tomcat, Wildfly, Jakarta Commons, JQuery Disruptors: Open source is a sandbox for new ideas Disruptors: OpenStack, Hadoop/Hbase, NodeJS
  3. We are going to focus on 3 risks in open source software, and best practices for assessing and mitigating those risks. License Risk – Using open source with the wrong license could prevent you from legally distributing an application, or force you to open source your proprietary code. Security Risk – Like any other software, open source can include vulnerabilities. Even when disclosed and fixed, open source being open source, older, vulnerable builds are still available for download. Support Risk – While the acquisition cost of open source is low, the total cost of ownership can be high. Much of this depends on the relative maturity of the project’s community. The takeaway from this is if we are using more and more open source, without putting controls in place, we are inviting unmanaged risk into our applications.
  4. Open source use is certainly beneficial, and the risks can be mitigated. The root of the problem we see with open source usage is a lack of controls over the selection, use, and monitoring of components. That is, if we are using more and more open source, without putting controls in place, we are inviting unmanaged risk into our applications. Through our research we found that: 76% of the organizations we interviewed admit they have no meaningful controls 80% of the developers state that they can use any open source package they choose, without proving the security of those components Only 20% claim to track vulnerabilities in OSS over time This may be true to the extent that publicized problems, such as Heartbleed, are tracked, but to review, we just learned that 13 billion requests are made each year I personally, have never talked to a security person who can demonstrate how they track each package used, everywhere in their organization This leads us to our next topic – getting control over the open source in your organization.
  5. The first step is to document internal policies for open source use. This includes the types of licenses you will allow, any security requirements you may have, and determining how the OSS package will be supported. These decisions are determined by each organizations primarily by their appetite for risk, compared to the value derived from the open source, for each class of applications. Internet facing applications and those apps that access sensitive information require a higher security standard than some internal applications (with a smaller perceived attack surface). Good open source practices are good development practices, but we also need to recognize development realities. Open source often enters a code base organically; a developers think about functionality and deadlines. If he requires specific functionality, has used the open source previously, he is inclined to use it again to accelerate productivity. Finally, we need to institutionalize the policies. While many organizations have some standards, our research shows that those typically are not well managed or enforced. A successful governance program requires a certain level of discipline, and occasional trade-offs. Exceptions to the policies may ultimately be necessary due to design choices, functionality or market pressure, but these should be taken with full awareness by all parties. Most importantly, a successful governance program requires the ability to detect breaches of policy after the review is completed, which we will discuss in a few minutes.
  6. As you develop your best practices for legal, technical business, set up a pipeline via your OSS review board to constantly update your policies. OSS policies are based on multiple factors. Legal, technical and business are the top three. From a legal view what risk and practices do you want your team to utilize to ensure compliance and risk avoidance From a technical/security view as you monitor and update OSS what version and packages do you want to avoid or which version do you want your team to use From a business view, when is commercial software better? What business issues need to be addressed by OSS. Should you only use supported OSS?
  7. GPLv3 software cannot be included in Apache projects because when an Apache project software becomes a derivative work of some GPLv3 software, then the Apache software would have to be distributed under GPLv3. For example, merely linking to the GPLv2 and GPLv3 may be considered a derivative work, therefore would have the entire project licensed under GPL. FSF never considered the Apache license to be compatible with GPLv2 because of the patent termination and indemnification provisions. Indemnification Patent termination -
  8. Jacobsenv. Katzer - The conditions set forth in the Artistic License are vital to enable the copyright holder to retain the ability to benefit from the work of downstream users. By requiring that users who modify or distribute the copyrighted material retain the reference to the original source files, downstream users are directed to Jacobsen's website. Thus, downstream users know about the collaborative effort to improve and expand the SourceForge project once they learn of the “upstream” project from a “downstream” distribution, and they may join in that effort. The clear language of the Artistic License creates conditions to protect the economic rights at issue in the granting of a public license. These conditions govern the rights to modify and distribute the computer programs and files included in the downloadable software package Welte – sued Fantec twice, source code availabel for download was incomplete and outdated, german court rejected fantec’s argument that its supplier assured compliance with the GPL terms, court held, can’t rely on suppliers word, must perform audit yourself, XimpleWare Corp v. Versata Filed NDCA November 2013 Copyright infringement Breach of contract Unjust enrichment Unfair competition $150 million + attorney fees "XML Parser" licensed under GPL v.2 Available on SourceForge.net 1st motion for preliminary injunction Denied because Versata represented no future sales of products including XML Parser 2nd motion for preliminary injunction Versata continued to sell products including XML Parser Motion was pending – Case Settled