SlideShare une entreprise Scribd logo
1  sur  45
© 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
OPEN SOURCE HYGIENE – MITIGATING SECURITY RISKS FROM
DEVELOPMENT, INTEGRATION, DISTRIBUTION AND DEPLOYMENT OF
OPEN SOURCE SOFTWARE
Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software
RVAsec – June 5, 2015
2 © 2015 Black Duck Software, Inc. All Rights Reserved.
PRESENTATION ABSTRACT
OSS Hygiene – Mitigating Security Risks from Development, Integration,
Distribution and Deployment of Open Source Software
Across the landscape of IT, Open Source Software (OSS) is pervasive and
ubiquitous. From the cloud and web to data centers; from the desktop to
mobile devices; and across a range of embedded and IoT applications, OSS
commands an ever-increasing, dominant share of the system software stack
and provides equally substantial swathes of enabling application middleware,
applications themselves, and tooling.
While rapid adoption of OSS demonstrably offers a range of advantages, the
community development model presents developers, integrators and
deployers with a set of accompanying challenges related to security,
operational, and legal risk. Historically, foremost among these concerns stood
license compliance and IP protection; however, with recent highly publicized
threats to OSS, security has joined these concerns and today dominates the
OSS adoption conversation.
This presentation will explore the role of and requirements for secure
development of and deployment with OSS.
3 © 2015 Black Duck Software, Inc. All Rights Reserved.
YOUR SPEAKER
Bill Weinberg, Senior Director, Open Source Strategy – Black Duck
Software
Bill helps Fortune 1000 clients create sound approaches to enable, build,
and deploy software for intelligent devices, enterprise data centers, and
cloud infrastructure.
Working with FOSS since 1997, Bill also boasts more than thirty years
of experience in embedded and open systems, telecommunications,
and enterprise software. As a founding team-member at MontaVista
Software, Bill pioneered Linux as leading platform for intelligent and mobile
devices. During his tenure as Senior Analyst at OSDL (today, the Linux
Foundation), Bill ran Carrier Grade and Mobile Linux initiatives and worked
closely with foundation members, analyst firms, and the press. As General
Manager of the Linux Phone Standards Forum, he worked tireless to
establish standards for mobile telephony middleware.
Bill is also a prolific author and busy speaker on topics spanning
global FOSS adoption to real-time computing, IoT, legacy migration,
licensing, standardization, telecoms infrastructure, and mobile
applications. Learn more at http://www.linuxpundit.com/.
4 © 2015 Black Duck Software, Inc. All Rights Reserved.
AGENDA
• Open Source – Present and Future
• The Open Source Vulnerability Landscape
• The Open Source Development Model
• Open Source Hygiene
• Q&A
5 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
OPEN SOURCE IS
UNSTOPPABLE
The 2015 Future of Open Source Survey
78% OF COMPANIES
RUN ON OPEN SOURCE
LESS THAN 3%
DON’T USE OSS IN ANY WAY
CORPORATEUSE
@FUTUREOFOSS
#FUTUREOSS
CORPORATEUSE
2XSINCE 2010
USE OF OPEN SOURCE TO RUN
BUSINESS IT ENVIRONMENTS HAS GONE UP
@FUTUREOFOSS
#FUTUREOSS
INCREASING ABUNDANCE
Open Source Projects
Source: Black Duck Software
BLACK DUCK
KNOWLEDGEBASE
0
200000
400000
600000
800000
1000000
1200000
1400000
2007 2009 2011 2013 2015
CORPORATEUSE
@FUTUREOFOSS
#FUTUREOSS
OSS IMPACTS TECHNOLOGY
CLOUD BIG DATA OPERATING
SYSTEMS
CONNECTED
PRODUCT/IoT
TECHNOLOGY
@FUTUREOFOSS
#FUTUREOSS
OPEN SOURCE IS SO PERVASIVE THAT ALL SOFTWARE
CATEGORIES USE IT OR HAVE DEPENDENCIES ON IT
THE SECURITY OF
OPEN SOURCE
55%SAID OPEN SOURCE
DELIVERS SUPERIOR
SECURITY
46%GIVE OSS FIRST
CONSIDERATION
AMONG SECURITY
TECHNOLOGIES
HOWEVER,
67%DON’T MONITOR OPEN
SOURCE CODE FOR SECURITY
VULNERABILITIES.
SECURITY
@FUTUREOFOSS
#FUTUREOSS
11 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
THE OPEN SOURCE
VULNERABILITY LANDSCAPE
No worse (actually somewhat better) than
other types of software
12 © 2015 Black Duck Software, Inc. All Rights Reserved.
WORRIED ABOUT OPEN SOURCE SECURITY?
“Through 2020, security and quality defects
publicly attributed to OSS projects will
increase significantly, driven by a growing
presence within high-profile, mission-critical
and mainstream IT workloads.”
Gartner, Road Map for Open-Source Success: Understanding
Quality and Security, Mark Driver, 3 March 2014.
13 © 2015 Black Duck Software, Inc. All Rights Reserved.
Based on the National Vulnerability Database published by the National Institute of Standards and Technology (a repository by the U.S. government)
THE GROWTH IN SECURITY VULNERABILITIES
0
1,000
2,000
3,000
4,000
5,000
6,000
7,000
8,000
9,000
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
CVEs (Vulnernabilities) by Year
Jan 1, 2000 - May 11, 2015
14 © 2015 Black Duck Software, Inc. All Rights Reserved.
OSS VULNERABILITY LANDSCAPE
Of 9,200 security vulnerabilities reported in
2014, 4,000 affected open source code.
– National Vulnerability Database & IBM X-Force
15 © 2015 Black Duck Software, Inc. All Rights Reserved.
THE RISE OF “NAMED” VULNERABILITIES IN OSS
16 © 2015 Black Duck Software, Inc. All Rights Reserved.
PENDING LEGISLATION – H.R. 5793 THE CYBER SUPPLY
CHAIN TRANSPARENCY AND REMEDIATION ACT (“THE
ROYCE BILL”)
3 Key Provisions:
• Vendors must provide a Bill of Materials of 3rd-Party and Open
Source Components (including versions)
• Vendors cannot use known vulnerable components if there is a
less vulnerable component available
• Software must be patchable/updateable (to address new
vulnerabilities when they are discovered)
17 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
THE OPEN SOURCE
DEVELOPMENT MODEL
Inherently (in)secure?
18 © 2015 Black Duck Software, Inc. All Rights Reserved.
LINUS’ LAW
Given enough eyeballs, all bugs are shallow
19 © 2015 Black Duck Software, Inc. All Rights Reserved.
User Community & Ecosystem
Developer Community
Core Developers
OPEN SOURCE DEVELOPMENT MODEL
• Core project developers create, maintain, curate code base
• Vet contributions from larger communities
• Focus on project goals – features, performance, etc.
Code
20 © 2015 Black Duck Software, Inc. All Rights Reserved.
User Community & Ecosystem
Developer Community
Core Developers
OPEN SOURCE CODE CURATION MODEL
Code v1 Code v2 Code vN
CONTINUOUS INCREMENTAL IMPROVEMENT
21 © 2015 Black Duck Software, Inc. All Rights Reserved.
OPEN SOURCE CODE QUALITY ASSURANCE
CODE
unterminated strings
unchecked function returns
Indices out of bounds memory leaks
faulty logic misconfigurationregressions
stray pointersback doors parameter reversal
improper type castsincorrect permissions
debug coderace conditions deprecated versions
priority inversion unitialized variablesprivilege violations
COMMUNITY
Maintainers,
developers, users
exercise, debug & improve code
22 © 2015 Black Duck Software, Inc. All Rights Reserved.
THEORETICAL “TRIPLE FENCE” OF OSS SECURITY
Enterprise / OEM Integration
Distribution / Platform Creation
OSS Project Purview
Production
Code
23 © 2015 Black Duck Software, Inc. All Rights Reserved.
OPEN SOURCE CODE SECURITY GAP
• Majority of eyes occupied elsewhere
• Minority of community is security-savvy
CODE
unterminated strings
unchecked function returns
Indices out of bounds memory leaks
faulty logic misconfigurationregressions
stray pointersback doors parameter reversal
improper type castsincorrect permissions
debug coderace conditions deprecated versions
priority inversion unitialized variablesprivilege violations
COMMUNITY
24 © 2015 Black Duck Software, Inc. All Rights Reserved.
• Use-case specific errors
• Local misconfiguration
• LAN-based vulnerabilities
• Deployed deprecated s/w
versions
• Weak encryption
• Bad authentication
• Stolen credentials
• Viruses, Trojans & other
malware
• Denial of service attacks
• Weak passwords
• Unenforced security policy
• Phishing
• Man-in-the-middle attacks
• Forged certificates
• Spoofed MACs and IP
addresses
• Latent zero-day exploits
• Brute force decryption
THREATS RESISTANT TO COMMUNITY OVERSIGHT
25 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
OPEN SOURCE HYGIENE
Component-level best practices for
securing open source software
26 © 2015 Black Duck Software, Inc. All Rights Reserved.
HYGIENE?
hy·giene /ˈhīˌjēn/ [‘hai dji:n]
conditions or practices conducive to maintaining health and
preventing disease, especially through cleanliness.
synonyms: cleanliness, sanitation, sterility, purity,
disinfection
27 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
Open Source Hygiene?
28 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved.
Open Source Hygiene is the
practice of cross referencing the
open source content of a company or
product software stack, module by
module, version by version, with
databases of known vulnerabilities of
those software components.
29 © 2015 Black Duck Software, Inc. All Rights Reserved.
SECURITY TECHNOLOGIES – WHERE DOES OSS HYGIENE
FIT?
Intrusion
Detection
End-point
Security
Network
Security
Certifiable
Systems
Formal
Verification
Authentication
Code Quality
Tools
Binary
Obfuscation
Encryption
Capabilities &
Access Control
Policy
Enforcement
Patch/Update
Management
Configuration
Management
Auditing
& Logging
Physical
Security
Hardware
Mechanisms
30 © 2015 Black Duck Software, Inc. All Rights Reserved.
OSS HYGIENE - VULNERABILITY DETECTION AND
REMEDIATION
Intrusion
Detection
End-point
Security
Network
Security
Certifiable
Systems
Formal
Verification
Authentication
Code Quality
Tools
Binary
Obfuscation
Encryption
Capabilities &
Access Control
Policy
Enforcement
Patch/Update
Management
Configuration
Management
Auditing
& Logging
Physical
Security
Hardware
Mechanisms
Open
Source
Hygiene
31 © 2015 Black Duck Software, Inc. All Rights Reserved.
Software Composition Analysis (SCA)
YET ANOTHER SECURITY TECHNOLOGY
TERM
32 © 2015 Black Duck Software, Inc. All Rights Reserved.
VERSIONS AND VULNERABILITIES
Component Version
Component Version
Component Version
Component Version
Component Version
BOM
Newer =
More
Secure
33 © 2015 Black Duck Software, Inc. All Rights Reserved.
EXAMPLE ENTERPRISE SOFTWARE BUILD (CI)
WORKFLOW
Developer
Source Code
Artifact Repository
1. Request
Build
2. Fetch
Sources
3. Resolve
Dependen-
cies
5. Publish
Artifacts,
Build
Metadata
6. Build
Results
4. Perform
Build
34 © 2015 Black Duck Software, Inc. All Rights Reserved.
EXAMPLE ENTERPRISE SOFTWARE BUILD (CI)
WORKFLOW
Developer
Source Code
Artifact Repository
1. Request
Build
2. Fetch
Sources
3. Resolve
Dependen-
cies
5. Publish
Artifacts,
Build
Metadata
6. Build
Results
4. Perform
Build
OSS
35 © 2015 Black Duck Software, Inc. All Rights Reserved.
OSS HYGIENE COMPLEMENTS SECURITY
TESTING
ANALYZE DESIGN CODE TEST MAINTAIN
Static
Analysis
Dynamic
Analysis
Penetration
Testing
Rule-based
Vulnerability Testing
OSS POLICIES OSS SELECTION OSS DETECTION OSS ALERTING OSS MONITORING
OPEN SOURCE HYGIENE
SOFTWARE DEVELOPMENT LIFE-CYCLE
RELEASE
36 © 2015 Black Duck Software, Inc. All Rights Reserved.
Technical
• Vulnerability db schemas
• Integration in workflows
• Build tools, manifests
• Scan cycle time/speed
• 100s build/day
• DevOps
• Comprehensive scanning
• Sheer volume
• Repo locations
• Language support
• Modified OSS & snippets
• Missing versioning
• Source and Binary
Social / Managerial
• OSS management policy
• “Organic” OSS selection,
ingress and integration
• Industry norms
• Can’t/won’t remediate
• Architecture issues
• Version dependencies
• Using forked versions
• Warning fatigue
• Hundreds or thousands
of OSS components
OSS HYGIENE CHALLENGES
37 © 2015 Black Duck Software, Inc. All Rights Reserved.
Extenuating Factors
• Regulated/Unregulated (cuts both ways)
• Dependence on CVSS in triage (simplistic / misleading)
• Impact of social media (Tweets correlate with exploits)
REMEDIATION TIMES BY INDUSTRY
0
50
100
150
200
Cloud
Infrastructure
Education Financial
Services
Healthcare
Daystoremediate Source: NopSec
38 © 2015 Black Duck Software, Inc. All Rights Reserved.
THE ROAD TO SECURE OSS USE – BEST PRACTICES
 Identify OSS in use
 Map known vulnerabilities
 ID and assess risk
 Monitor for new
vulnerabilities
 Review vuln details
 Assess CVE impact
 Rank / tier app risk
 Triage and develop
remediation plan
 Track remediation
 Inventory & track usage
 Configure risk policies
and actions
 Determine approval
request workflow and
management
39 © 2015 Black Duck Software, Inc. All Rights Reserved.
OSS REMEDIATION / TRIAGE
CONSIDERATIONS
Comparable to other types of software
• Severity of vulnerability (CVSS and other rankings)
• Number of vulnerabilities / component
• Existence/availability of exploits (if known)
• Context of vulnerability (internet/customer facing vs. internal)
• Availability of patches or other remediation
• Existence of comparable functionality in alternate OSS tech
• Willingness / capability to patch / maintain OSS forks
40 © 2015 Black Duck Software, Inc. All Rights Reserved.
Manual Procedure Automated Process
Speed Slow Faster
Timeliness Seldom Automatic
Accuracy Low High
Comprehensiveness With Difficulty Configurable
Latency Weeks / Months Hours
Workflow Impact Disruptive Transparent
Repeatable / Traceable Almost Never Always
Remediation Subjective Policy-based
Cost FTEs CapEx / OpEx
OSS HYGIENE – THE NEED FOR
AUTOMATION
41 © 2015 Black Duck Software, Inc. All Rights Reserved.
• Scan code to automatically identify
open source in use
• Map known security vulnerabilities
• Assess licenses, versions,
community activity (operational risk)
• Identify open source in use with
potential high-risk
IDENTIFY VULNERABILITIES IN OSS SOFTWARE
PORTFOLIOS
42 © 2015 Black Duck Software, Inc. All Rights Reserved.
REMEDIATION DASHBOARDS
• Review CVSS and its impact on
each project
• Assess, triage and prioritize
vulnerabilities
• Schedule and track planned
and actual remediation dates
43 © 2015 Black Duck Software, Inc. All Rights Reserved.
Benefits
• Brings OSS components
up to date
• Breaks open 3rd party
code box
• Also fights version
proliferation
Limitations
• Only effective as current
version / patch set
• Effective for OSS only
• Primary focus on source
code (cf. BAT)
OSS HYGIENE – PROS AND CONS
44 © 2015 Black Duck Software, Inc. All Rights Reserved.
CONCLUSION
OSS Hygiene addresses a critical function in application security
• Focus on version deprecation as a source of vulnerabilities
• Streamlines identification and remediation of exploitable OSS components
OSS Hygiene is NOT
• Source code analysis tool or method (it uses community resources)
• A replacement for other security tools (it complements them)
• A marketing gimmick (real organizations present real requirements)
OSS Hygiene is an actionable methodology
• Can be implemented manually and/or with tools/mechanisms in place
• Benefits from fast and accurate scanning of software portfolios
• Best when employed as part of disciplined OSS management practices
CONCLUSIONS AND Q&A

Contenu connexe

Tendances

2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results2015 Future of Open Source Survey Results
2015 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...Black Duck by Synopsys
 
2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results2014 Future of Open Source Survey Results
2014 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey ResultsTim Mackey
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Jerika Phelps
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackTim Mackey
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarJerika Phelps
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarBlack Duck by Synopsys
 
Keynote - Lou Shipley
Keynote - Lou ShipleyKeynote - Lou Shipley
Keynote - Lou ShipleyJerika Phelps
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitchi7
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Black Duck by Synopsys
 

Tendances (20)

2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
 
2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey Results
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Open Source in Application Security
Open Source in Application SecurityOpen Source in Application Security
Open Source in Application Security
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected Car
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected Car
 
Keynote - Lou Shipley
Keynote - Lou ShipleyKeynote - Lou Shipley
Keynote - Lou Shipley
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
 

En vedette

Hermosas Imágenes Navideñas
Hermosas Imágenes NavideñasHermosas Imágenes Navideñas
Hermosas Imágenes Navideñasramirohelmeyer
 
apresentaçao audiolight
apresentaçao audiolightapresentaçao audiolight
apresentaçao audiolightAudiolight Lda
 
Resume Sujit Sinha
Resume Sujit SinhaResume Sujit Sinha
Resume Sujit SinhaSujit Sinha
 
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011Sunseeker YachtClub
 
Presentatie Lezing Insolventie Advies Emss MP Industries Management & Advies
Presentatie Lezing Insolventie Advies Emss MP Industries Management & AdviesPresentatie Lezing Insolventie Advies Emss MP Industries Management & Advies
Presentatie Lezing Insolventie Advies Emss MP Industries Management & AdviesRuud van der Poel
 
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)guest9b4c7bc
 
Biografia
BiografiaBiografia
Biografiacuysito
 
Electrical measuring instruments
Electrical measuring instrumentsElectrical measuring instruments
Electrical measuring instrumentsMinka Grdesic
 
SolucióN Practica 1
SolucióN Practica 1SolucióN Practica 1
SolucióN Practica 1justayrufina
 
Perspectivas de la demanda de electricidad en el sector minero
Perspectivas de la demanda de electricidad en el sector mineroPerspectivas de la demanda de electricidad en el sector minero
Perspectivas de la demanda de electricidad en el sector mineroLuis Reymer Mullizaca
 
Programa festividades emufec 2012
Programa festividades emufec 2012Programa festividades emufec 2012
Programa festividades emufec 2012Darwin
 
Internet, Búsqueda de empleo y Redes Sociales
Internet, Búsqueda de empleo y Redes SocialesInternet, Búsqueda de empleo y Redes Sociales
Internet, Búsqueda de empleo y Redes SocialesFrancisco Romero
 
Clase de hipotermia 2014
Clase de hipotermia 2014Clase de hipotermia 2014
Clase de hipotermia 2014Sergio Butman
 

En vedette (20)

Hermosas Imágenes Navideñas
Hermosas Imágenes NavideñasHermosas Imágenes Navideñas
Hermosas Imágenes Navideñas
 
apresentaçao audiolight
apresentaçao audiolightapresentaçao audiolight
apresentaçao audiolight
 
Resume Sujit Sinha
Resume Sujit SinhaResume Sujit Sinha
Resume Sujit Sinha
 
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011
Carine Yachts - Sunseeker Yachts Brokerage - catalog October 2011
 
Open Source in der Schweiz
Open Source in der SchweizOpen Source in der Schweiz
Open Source in der Schweiz
 
Presentatie Lezing Insolventie Advies Emss MP Industries Management & Advies
Presentatie Lezing Insolventie Advies Emss MP Industries Management & AdviesPresentatie Lezing Insolventie Advies Emss MP Industries Management & Advies
Presentatie Lezing Insolventie Advies Emss MP Industries Management & Advies
 
2do parcial
2do parcial 2do parcial
2do parcial
 
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)
C:\Documents And Settings\Sala309\Escritorio\Tren De La Sabana De Bogota(Tdf)
 
asiSMS: plateforme d'envoi de SMS
asiSMS: plateforme d'envoi de SMSasiSMS: plateforme d'envoi de SMS
asiSMS: plateforme d'envoi de SMS
 
Maravillado Estoy
Maravillado EstoyMaravillado Estoy
Maravillado Estoy
 
Biografia
BiografiaBiografia
Biografia
 
Electrical measuring instruments
Electrical measuring instrumentsElectrical measuring instruments
Electrical measuring instruments
 
Planta pasteurizadora[1]
Planta pasteurizadora[1]Planta pasteurizadora[1]
Planta pasteurizadora[1]
 
SolucióN Practica 1
SolucióN Practica 1SolucióN Practica 1
SolucióN Practica 1
 
Perspectivas de la demanda de electricidad en el sector minero
Perspectivas de la demanda de electricidad en el sector mineroPerspectivas de la demanda de electricidad en el sector minero
Perspectivas de la demanda de electricidad en el sector minero
 
Fuerza
Fuerza Fuerza
Fuerza
 
Programa festividades emufec 2012
Programa festividades emufec 2012Programa festividades emufec 2012
Programa festividades emufec 2012
 
FIBRA DIETARIA EN LA NUTRICIÓN
FIBRA DIETARIA EN LA NUTRICIÓNFIBRA DIETARIA EN LA NUTRICIÓN
FIBRA DIETARIA EN LA NUTRICIÓN
 
Internet, Búsqueda de empleo y Redes Sociales
Internet, Búsqueda de empleo y Redes SocialesInternet, Búsqueda de empleo y Redes Sociales
Internet, Búsqueda de empleo y Redes Sociales
 
Clase de hipotermia 2014
Clase de hipotermia 2014Clase de hipotermia 2014
Clase de hipotermia 2014
 

Similaire à RVAsec Bill Weinberg Open Source Hygiene Presentation

OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of ThingsBlack Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Denim Group
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckBlack Duck by Synopsys
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Aggregage
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxUsamaAli119043
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!TechWell
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The ThingsAll Things Open
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg Tunde Ogunkoya
 

Similaire à RVAsec Bill Weinberg Open Source Hygiene Presentation (20)

OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptx
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
 

Plus de Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

Plus de Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

RVAsec Bill Weinberg Open Source Hygiene Presentation

  • 1. © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. OPEN SOURCE HYGIENE – MITIGATING SECURITY RISKS FROM DEVELOPMENT, INTEGRATION, DISTRIBUTION AND DEPLOYMENT OF OPEN SOURCE SOFTWARE Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software RVAsec – June 5, 2015
  • 2. 2 © 2015 Black Duck Software, Inc. All Rights Reserved. PRESENTATION ABSTRACT OSS Hygiene – Mitigating Security Risks from Development, Integration, Distribution and Deployment of Open Source Software Across the landscape of IT, Open Source Software (OSS) is pervasive and ubiquitous. From the cloud and web to data centers; from the desktop to mobile devices; and across a range of embedded and IoT applications, OSS commands an ever-increasing, dominant share of the system software stack and provides equally substantial swathes of enabling application middleware, applications themselves, and tooling. While rapid adoption of OSS demonstrably offers a range of advantages, the community development model presents developers, integrators and deployers with a set of accompanying challenges related to security, operational, and legal risk. Historically, foremost among these concerns stood license compliance and IP protection; however, with recent highly publicized threats to OSS, security has joined these concerns and today dominates the OSS adoption conversation. This presentation will explore the role of and requirements for secure development of and deployment with OSS.
  • 3. 3 © 2015 Black Duck Software, Inc. All Rights Reserved. YOUR SPEAKER Bill Weinberg, Senior Director, Open Source Strategy – Black Duck Software Bill helps Fortune 1000 clients create sound approaches to enable, build, and deploy software for intelligent devices, enterprise data centers, and cloud infrastructure. Working with FOSS since 1997, Bill also boasts more than thirty years of experience in embedded and open systems, telecommunications, and enterprise software. As a founding team-member at MontaVista Software, Bill pioneered Linux as leading platform for intelligent and mobile devices. During his tenure as Senior Analyst at OSDL (today, the Linux Foundation), Bill ran Carrier Grade and Mobile Linux initiatives and worked closely with foundation members, analyst firms, and the press. As General Manager of the Linux Phone Standards Forum, he worked tireless to establish standards for mobile telephony middleware. Bill is also a prolific author and busy speaker on topics spanning global FOSS adoption to real-time computing, IoT, legacy migration, licensing, standardization, telecoms infrastructure, and mobile applications. Learn more at http://www.linuxpundit.com/.
  • 4. 4 © 2015 Black Duck Software, Inc. All Rights Reserved. AGENDA • Open Source – Present and Future • The Open Source Vulnerability Landscape • The Open Source Development Model • Open Source Hygiene • Q&A
  • 5. 5 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. OPEN SOURCE IS UNSTOPPABLE The 2015 Future of Open Source Survey
  • 6. 78% OF COMPANIES RUN ON OPEN SOURCE LESS THAN 3% DON’T USE OSS IN ANY WAY CORPORATEUSE @FUTUREOFOSS #FUTUREOSS
  • 7. CORPORATEUSE 2XSINCE 2010 USE OF OPEN SOURCE TO RUN BUSINESS IT ENVIRONMENTS HAS GONE UP @FUTUREOFOSS #FUTUREOSS
  • 8. INCREASING ABUNDANCE Open Source Projects Source: Black Duck Software BLACK DUCK KNOWLEDGEBASE 0 200000 400000 600000 800000 1000000 1200000 1400000 2007 2009 2011 2013 2015 CORPORATEUSE @FUTUREOFOSS #FUTUREOSS
  • 9. OSS IMPACTS TECHNOLOGY CLOUD BIG DATA OPERATING SYSTEMS CONNECTED PRODUCT/IoT TECHNOLOGY @FUTUREOFOSS #FUTUREOSS OPEN SOURCE IS SO PERVASIVE THAT ALL SOFTWARE CATEGORIES USE IT OR HAVE DEPENDENCIES ON IT
  • 10. THE SECURITY OF OPEN SOURCE 55%SAID OPEN SOURCE DELIVERS SUPERIOR SECURITY 46%GIVE OSS FIRST CONSIDERATION AMONG SECURITY TECHNOLOGIES HOWEVER, 67%DON’T MONITOR OPEN SOURCE CODE FOR SECURITY VULNERABILITIES. SECURITY @FUTUREOFOSS #FUTUREOSS
  • 11. 11 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. THE OPEN SOURCE VULNERABILITY LANDSCAPE No worse (actually somewhat better) than other types of software
  • 12. 12 © 2015 Black Duck Software, Inc. All Rights Reserved. WORRIED ABOUT OPEN SOURCE SECURITY? “Through 2020, security and quality defects publicly attributed to OSS projects will increase significantly, driven by a growing presence within high-profile, mission-critical and mainstream IT workloads.” Gartner, Road Map for Open-Source Success: Understanding Quality and Security, Mark Driver, 3 March 2014.
  • 13. 13 © 2015 Black Duck Software, Inc. All Rights Reserved. Based on the National Vulnerability Database published by the National Institute of Standards and Technology (a repository by the U.S. government) THE GROWTH IN SECURITY VULNERABILITIES 0 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 9,000 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 CVEs (Vulnernabilities) by Year Jan 1, 2000 - May 11, 2015
  • 14. 14 © 2015 Black Duck Software, Inc. All Rights Reserved. OSS VULNERABILITY LANDSCAPE Of 9,200 security vulnerabilities reported in 2014, 4,000 affected open source code. – National Vulnerability Database & IBM X-Force
  • 15. 15 © 2015 Black Duck Software, Inc. All Rights Reserved. THE RISE OF “NAMED” VULNERABILITIES IN OSS
  • 16. 16 © 2015 Black Duck Software, Inc. All Rights Reserved. PENDING LEGISLATION – H.R. 5793 THE CYBER SUPPLY CHAIN TRANSPARENCY AND REMEDIATION ACT (“THE ROYCE BILL”) 3 Key Provisions: • Vendors must provide a Bill of Materials of 3rd-Party and Open Source Components (including versions) • Vendors cannot use known vulnerable components if there is a less vulnerable component available • Software must be patchable/updateable (to address new vulnerabilities when they are discovered)
  • 17. 17 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. THE OPEN SOURCE DEVELOPMENT MODEL Inherently (in)secure?
  • 18. 18 © 2015 Black Duck Software, Inc. All Rights Reserved. LINUS’ LAW Given enough eyeballs, all bugs are shallow
  • 19. 19 © 2015 Black Duck Software, Inc. All Rights Reserved. User Community & Ecosystem Developer Community Core Developers OPEN SOURCE DEVELOPMENT MODEL • Core project developers create, maintain, curate code base • Vet contributions from larger communities • Focus on project goals – features, performance, etc. Code
  • 20. 20 © 2015 Black Duck Software, Inc. All Rights Reserved. User Community & Ecosystem Developer Community Core Developers OPEN SOURCE CODE CURATION MODEL Code v1 Code v2 Code vN CONTINUOUS INCREMENTAL IMPROVEMENT
  • 21. 21 © 2015 Black Duck Software, Inc. All Rights Reserved. OPEN SOURCE CODE QUALITY ASSURANCE CODE unterminated strings unchecked function returns Indices out of bounds memory leaks faulty logic misconfigurationregressions stray pointersback doors parameter reversal improper type castsincorrect permissions debug coderace conditions deprecated versions priority inversion unitialized variablesprivilege violations COMMUNITY Maintainers, developers, users exercise, debug & improve code
  • 22. 22 © 2015 Black Duck Software, Inc. All Rights Reserved. THEORETICAL “TRIPLE FENCE” OF OSS SECURITY Enterprise / OEM Integration Distribution / Platform Creation OSS Project Purview Production Code
  • 23. 23 © 2015 Black Duck Software, Inc. All Rights Reserved. OPEN SOURCE CODE SECURITY GAP • Majority of eyes occupied elsewhere • Minority of community is security-savvy CODE unterminated strings unchecked function returns Indices out of bounds memory leaks faulty logic misconfigurationregressions stray pointersback doors parameter reversal improper type castsincorrect permissions debug coderace conditions deprecated versions priority inversion unitialized variablesprivilege violations COMMUNITY
  • 24. 24 © 2015 Black Duck Software, Inc. All Rights Reserved. • Use-case specific errors • Local misconfiguration • LAN-based vulnerabilities • Deployed deprecated s/w versions • Weak encryption • Bad authentication • Stolen credentials • Viruses, Trojans & other malware • Denial of service attacks • Weak passwords • Unenforced security policy • Phishing • Man-in-the-middle attacks • Forged certificates • Spoofed MACs and IP addresses • Latent zero-day exploits • Brute force decryption THREATS RESISTANT TO COMMUNITY OVERSIGHT
  • 25. 25 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. OPEN SOURCE HYGIENE Component-level best practices for securing open source software
  • 26. 26 © 2015 Black Duck Software, Inc. All Rights Reserved. HYGIENE? hy·giene /ˈhīˌjēn/ [‘hai dji:n] conditions or practices conducive to maintaining health and preventing disease, especially through cleanliness. synonyms: cleanliness, sanitation, sterility, purity, disinfection
  • 27. 27 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. Open Source Hygiene?
  • 28. 28 © 2014 Black Duck Software, Inc. Proprietary & Confidential All Rights Reserved. Open Source Hygiene is the practice of cross referencing the open source content of a company or product software stack, module by module, version by version, with databases of known vulnerabilities of those software components.
  • 29. 29 © 2015 Black Duck Software, Inc. All Rights Reserved. SECURITY TECHNOLOGIES – WHERE DOES OSS HYGIENE FIT? Intrusion Detection End-point Security Network Security Certifiable Systems Formal Verification Authentication Code Quality Tools Binary Obfuscation Encryption Capabilities & Access Control Policy Enforcement Patch/Update Management Configuration Management Auditing & Logging Physical Security Hardware Mechanisms
  • 30. 30 © 2015 Black Duck Software, Inc. All Rights Reserved. OSS HYGIENE - VULNERABILITY DETECTION AND REMEDIATION Intrusion Detection End-point Security Network Security Certifiable Systems Formal Verification Authentication Code Quality Tools Binary Obfuscation Encryption Capabilities & Access Control Policy Enforcement Patch/Update Management Configuration Management Auditing & Logging Physical Security Hardware Mechanisms Open Source Hygiene
  • 31. 31 © 2015 Black Duck Software, Inc. All Rights Reserved. Software Composition Analysis (SCA) YET ANOTHER SECURITY TECHNOLOGY TERM
  • 32. 32 © 2015 Black Duck Software, Inc. All Rights Reserved. VERSIONS AND VULNERABILITIES Component Version Component Version Component Version Component Version Component Version BOM Newer = More Secure
  • 33. 33 © 2015 Black Duck Software, Inc. All Rights Reserved. EXAMPLE ENTERPRISE SOFTWARE BUILD (CI) WORKFLOW Developer Source Code Artifact Repository 1. Request Build 2. Fetch Sources 3. Resolve Dependen- cies 5. Publish Artifacts, Build Metadata 6. Build Results 4. Perform Build
  • 34. 34 © 2015 Black Duck Software, Inc. All Rights Reserved. EXAMPLE ENTERPRISE SOFTWARE BUILD (CI) WORKFLOW Developer Source Code Artifact Repository 1. Request Build 2. Fetch Sources 3. Resolve Dependen- cies 5. Publish Artifacts, Build Metadata 6. Build Results 4. Perform Build OSS
  • 35. 35 © 2015 Black Duck Software, Inc. All Rights Reserved. OSS HYGIENE COMPLEMENTS SECURITY TESTING ANALYZE DESIGN CODE TEST MAINTAIN Static Analysis Dynamic Analysis Penetration Testing Rule-based Vulnerability Testing OSS POLICIES OSS SELECTION OSS DETECTION OSS ALERTING OSS MONITORING OPEN SOURCE HYGIENE SOFTWARE DEVELOPMENT LIFE-CYCLE RELEASE
  • 36. 36 © 2015 Black Duck Software, Inc. All Rights Reserved. Technical • Vulnerability db schemas • Integration in workflows • Build tools, manifests • Scan cycle time/speed • 100s build/day • DevOps • Comprehensive scanning • Sheer volume • Repo locations • Language support • Modified OSS & snippets • Missing versioning • Source and Binary Social / Managerial • OSS management policy • “Organic” OSS selection, ingress and integration • Industry norms • Can’t/won’t remediate • Architecture issues • Version dependencies • Using forked versions • Warning fatigue • Hundreds or thousands of OSS components OSS HYGIENE CHALLENGES
  • 37. 37 © 2015 Black Duck Software, Inc. All Rights Reserved. Extenuating Factors • Regulated/Unregulated (cuts both ways) • Dependence on CVSS in triage (simplistic / misleading) • Impact of social media (Tweets correlate with exploits) REMEDIATION TIMES BY INDUSTRY 0 50 100 150 200 Cloud Infrastructure Education Financial Services Healthcare Daystoremediate Source: NopSec
  • 38. 38 © 2015 Black Duck Software, Inc. All Rights Reserved. THE ROAD TO SECURE OSS USE – BEST PRACTICES  Identify OSS in use  Map known vulnerabilities  ID and assess risk  Monitor for new vulnerabilities  Review vuln details  Assess CVE impact  Rank / tier app risk  Triage and develop remediation plan  Track remediation  Inventory & track usage  Configure risk policies and actions  Determine approval request workflow and management
  • 39. 39 © 2015 Black Duck Software, Inc. All Rights Reserved. OSS REMEDIATION / TRIAGE CONSIDERATIONS Comparable to other types of software • Severity of vulnerability (CVSS and other rankings) • Number of vulnerabilities / component • Existence/availability of exploits (if known) • Context of vulnerability (internet/customer facing vs. internal) • Availability of patches or other remediation • Existence of comparable functionality in alternate OSS tech • Willingness / capability to patch / maintain OSS forks
  • 40. 40 © 2015 Black Duck Software, Inc. All Rights Reserved. Manual Procedure Automated Process Speed Slow Faster Timeliness Seldom Automatic Accuracy Low High Comprehensiveness With Difficulty Configurable Latency Weeks / Months Hours Workflow Impact Disruptive Transparent Repeatable / Traceable Almost Never Always Remediation Subjective Policy-based Cost FTEs CapEx / OpEx OSS HYGIENE – THE NEED FOR AUTOMATION
  • 41. 41 © 2015 Black Duck Software, Inc. All Rights Reserved. • Scan code to automatically identify open source in use • Map known security vulnerabilities • Assess licenses, versions, community activity (operational risk) • Identify open source in use with potential high-risk IDENTIFY VULNERABILITIES IN OSS SOFTWARE PORTFOLIOS
  • 42. 42 © 2015 Black Duck Software, Inc. All Rights Reserved. REMEDIATION DASHBOARDS • Review CVSS and its impact on each project • Assess, triage and prioritize vulnerabilities • Schedule and track planned and actual remediation dates
  • 43. 43 © 2015 Black Duck Software, Inc. All Rights Reserved. Benefits • Brings OSS components up to date • Breaks open 3rd party code box • Also fights version proliferation Limitations • Only effective as current version / patch set • Effective for OSS only • Primary focus on source code (cf. BAT) OSS HYGIENE – PROS AND CONS
  • 44. 44 © 2015 Black Duck Software, Inc. All Rights Reserved. CONCLUSION OSS Hygiene addresses a critical function in application security • Focus on version deprecation as a source of vulnerabilities • Streamlines identification and remediation of exploitable OSS components OSS Hygiene is NOT • Source code analysis tool or method (it uses community resources) • A replacement for other security tools (it complements them) • A marketing gimmick (real organizations present real requirements) OSS Hygiene is an actionable methodology • Can be implemented manually and/or with tools/mechanisms in place • Benefits from fast and accurate scanning of software portfolios • Best when employed as part of disciplined OSS management practices

Notes de l'éditeur

  1. Good morning. Today we will be discussing some of the key trends, challenges and considerations in managing Open Source Software. I will present for you an introduction to OSS Logistics – Black Duck’s framework for managing OSS within an organization. We will leave time for questions at the end of the presentation, but please feel free to interrupt me if you have questions as we go along.
  2. Hot off the press: 2015 Future Of Open Source Study results! #futureOSS http://bit.ly/FOOS2015@north_bridge @black_duck_sw
  3. “Every motivation that makes a person do something can be classified under "survival", "social life" or "entertainment”. As a result, progress is defined as reaching a higher category; that is, not doing a thing merely for survival, but for social reasons, and then, even better, just for fun – Linus Torlvald, The Hacker Ethic and the Spirit of the Information Ag
  4. Code Quality Tools Over half of all vulnerabilities come from basic programming errors and s/w faults Black Duck OSS security participates in code quality by highlighting need to update to newer, higher-quality versions of OSS projects Patch / Update Management Modern enterprise and embedded systems and applications include field update capabilities Black Duck OSS security helps OEMs, SPs and end-users integrate the latest and most secure versions of OSS technologies in patch sets and updates Configuration Management - Many vulnerabilities and exploits leverage poorly configured systems and applications Black Duck OSS security helps integrators and others ensure that current configurations include the most up-to-date OSS s/w components Policy Enforcement Security policy extends from production systems back to development and build Black Duck OSS security ensures that only policy-compliant versions of OSS components are integrated into production software
  5. walkthrough of Build Flow diagram which factors are most important to T.Rowe Price in choosing a build automation platform?
  6. walkthrough of Build Flow diagram which factors are most important to T.Rowe Price in choosing a build automation platform?
  7. This slide demonstrates that BDS can be used across all stages of the SDL, including after release w/o additional testing, while other testing tools are limited to specific phases of the SDL The next slide shows details
  8. Identify the open source code your company has in use. Before you can begin remediating vulnerabilities, you have to gather and maintain a knowledge of what components you have in use and where. Automated code scanning tools that produce a software BoM or “Bill of Materials” – i.e. a listing of open source components and versions contained in an application – are the best approach for organizations seeking a thorough evaluation of their code bases. Discover known vulnerabilities present in your open source code. There are resources, like the U.S. Government’s National Vulnerability Database (NVD), that track and publically report on security vulnerabilities for all types of software. Yet, more comprehensive and timely notifications can be provided through automated tools that can map vulnerabilities from sources like the NVD and VulnDB, directly to the code your company is using in its applications via the BoM. Assess and remediate components with vulnerabilities. Every organization is going to have a different approach to assessing potential threats and determining those that require immediate remediation. Developing a triage model can help security teams quickly prioritize vulnerabilities based on criteria such as the severity or exploitability of the vulnerability in conjunction with the sensitivity of the applications impacted. Monitor for new vulnerabilities. A security professional’s work is never done. Once a vulnerability is quickly and properly patched and remediated, another is likely on the horizon posing a potentially more damaging threat. Continuous, automated scans of applications under development can identify open source entering the code base and ensure that vulnerabilities aren’t being unknowingly introduced along with it. In addition, by monitoring for newly disclosed vulnerabilities and having the ability to immediately assess their impact across your code base will help your company’s security, compliance, and development teams gain peace of mind knowing they are actively managing security threats.