SlideShare a Scribd company logo
1 of 8
Download to read offline
WHITEPAPER
7 Security Gaps in the
Neglected 90% of your
Applications
Introduction by Sonatype CTO Josh Corman
Page 2
7 Security Gaps in the Neglected 90% of Your Applications
about Joshua Corman
In his capacity as CTO, Joshua researches new technologies and software development
trends to help evolve Sonatype’s product strategy. Additionally, Joshua is working with
the broader IT community as well as policy and standards bodies to improve software
development security standards and best practices.
Prior to Sonatype, Joshua served as a security researcher and executive at Akamai Tech-
nologies, The 451 Group, and IBM Internet Security Systems, among other firms. A well-
regarded innovator, he co-founded Rugged Software and IamTheCavalry to encourage
the development of new cyber security solutions in response to the world’s increasing
reliance on digital infrastructure. Joshua's unique approach to addressing cyber security
in the context of human factors and social impact has helped position him as one of the
most trusted names in IT security. He also serves as adjunct faculty for Carnegie Mellon’s
Heinz College, IANS Research, and as a Fellow at the Ponemon Institute.
Joshua received his bachelor's degree in philosophy, graduating summa cum laude, from
the University of New Hampshire.
INTRODUCTION
Software applications need to be delivered faster and across more platforms than ever. To
build high quality software in short order, we’ve seen a dramatic shift from source code to
component-based development, with open source and third party components providing
the innovation and efficiency that developers need.
Unfortunately, our dependence on components is growing faster than our ability to secure
them. These shared components are not top-of-mind when considering application risk.
Worse yet, components are increasingly the preferred attack surface in today’s applications.
The combination of growing component usage, coupled with lack of security, requires us to
urgently re-evaluate traditional application security approaches and identify practical next
steps for closing this security gap.
So what’s the“neglected 90%,”why is it attractive to your adversaries and what can you do
about it? Plenty. Here are 7 key points, for starters.
Joshua Corman
Chief Technology Officer
Page 3
7 Security Gaps in the Neglected 90% of Your Applications
In this context, we are not talking about open
source infrastructure, software or tools. We’re talking
about open source components that are used to
build today’s applications, most of which are down-
loaded from public repositories such as the (Maven)
Central Repository. After all, why create your own
web framework, or logging mechanism, when you
can turn to proven components and frameworks
from open source projects? These can be basic com-
ponents, such as the SLF4J logging framework, or a
major framework like Struts or Spring.
When considering that 80-90% of a typical appli-
cation is comprised of open source or third party
components, and 71% of these applications have
at least one critical or severe vulnerability, there is a
clear motivation to stop neglecting this risk.
What’s more, since a single component is likely to be used across many thousands of applications, an adver-
sary’s job gets even easier—and their effort multiplied—since attacking single component vulnerability can
simultaneously impact many applications across many organizations around the globe.
In response to this growing issue, the OWASP (Open Web Application Security Project) recently updated their
Top 10 list of the most critical security risks, stating that developers should“avoid using components with
known vulnerabilities.”
While exact statistics vary, it is widely accepted that
application security gets the smallest proportion of
an overall security budget, with vastly higher expen-
ditures made on network, data and other defenses.
In fact, application security receives less than 1 per-
cent of total security spending—yet most experts
agree that applications are now the number one
attack target.1
1
Source: The Verizon Business Data Breach Investigations Report
(DBIR) 2014.
As Open Source Usage
Expands, So Do the Risks
Security Budgets Are
Out of Sync with Risk
and Reality
RiskBudget
Page 4
7 Security Gaps in the Neglected 90% of Your Applications
A foundation of component governance coupled
with Static Application Security Testing (SAST) and
Dynamic Application Security Testing (DAST) pro-
vides the most holistic view of your application risk
and the most defensible starting points.
Together, these technologies factor for 100% of
your application, including the source code that is
written and compiled (10%) and the components
that are downloaded and assembled (90%).
Furthermore, when known to be vulnerable com-
ponents are eliminated early in the development
process, your DAST scans will yield significantly
more focused and manageable results.
Pareto’s Principle, or the 80-20 Rule, helps you manage those small things that really make the biggest differ-
ence to your results. So, in this case, instead of spending 90% of your time on 10% of your attack surface, you
can focus just 10% of your time to protect 90% of your attack surface.
Start with critical or severe component vulnerabilities, which are easy to identify and remediate. Once your
component security is underway, you can then move to SAST on the 10% of your application comprised of
source code and more efficiently manage and leverage your DAST scans.
Since software is assembled with components
coming in from a wide variety of sources, you’re
basically inheriting a software supply chain. But,
unlike mature industries like automobile manu-
facturing, you probably don’t (yet) manage or
govern this supply chain. Imagine driving a car
manufactured with parts from unknown vendors
who have no requirements for quality or security.
Your software is that car.
It’s imperative that your supplier-provided assets
are properly identified, tracked and quality-checked.
Without it, you really don’t know what’s in your
car or who built it. If a“part”is faulty, you wouldn’t
even know if you’re using that part, much less
exactly which car models might be impacted.
Pareto Principle 2.0?
(the “90/10” Rule):
Low Effort and Big Gains
You Use a Software
Supply Chain. How Well
Do You Manage It?
Page 5
7 Security Gaps in the Neglected 90% of Your Applications
Developers are happy to avoid risky components
if better options are easily available. However,
with the pressure to develop faster, it’s just not
possible for them to research if each component
is outdated or has known vulnerabilities or risky
“copyleft” license obligations.
Fixing problems (or better yet, avoiding the risks of
known bad components) early in development costs
vastly less than fixing issues later in production.
For component-based development, that means
making it easy for your developers to select the
safest component from the start, directly in the
tools that they use everyday. With decision support
built into their work environments (IDE), it is just as easy to build a safe application as a vulnerable one. If their
favorite component doesn’t meet your organization’s risk policy, developers will be guided toward a preferred
component replacement.
Since code ages more like milk than like a fine wine, risk management should be ongoing. New vulnerabilities
are frequently discovered in components previously thought to be safe, so to keep your applications from go-
ing sour, you should rely on automation to alert you when new risks are discovered in existing applications.
In this scenario, security doesn’t lag behind development. It is seamless and in-sync with development and
production as well.
Just when you thought you had a headache, it gets worse. There are often hundreds, if not thousands, of
components used by a typical development team, and each component has tens, if not hundreds of depen-
dencies as well as multiple versions.
Just like a traditional supply chain, it has become impossible to manually manage the selection, tracking and
inventorying of these supplier-provided components. Your software supply chain needs the same type of
automated visibility and management that has been a lifesaver to other industries for years. The good news is:
it costs far less and is far easier to implement than you might think.
Empower Your
Developers. They’re
Your Front Line Defense.
Page 6
7 Security Gaps in the Neglected 90% of Your Applications
In many organizations, the traditional waterfall
development and delivery approach has been re-
placed by Agile—and increasingly DevOps. This ap-
proach reduces the cycle time between the incep-
tion of an idea and delivery of that idea in reliable
software. This requires that application security is
also agile and re-thought in the context of modern
development methods, continuous integration, and
continuous delivery. If not, then application secu-
rity will be even more out of step with the pace of
development and associated risk.
And, just as decision support should be integrated
into developer tools, there should also be better
integration between application stakeholders in the
organization. A great opportunity is to do this in the context of Development Operations, known as“DevOps”,
“Rugged DevOps”or“DevOpsSec.”Leaders in the DevOps movement seek to reduce friction between develop-
ment and operations teams by focusing on business value, efficiency and velocity. For many, automating the
SDLC with built-in processes to minimize quality, security and license risk early in development is definitely a step
in the right direction. The result? A secure blanket over your neglected 90%—and trusted software that stays that
way over time.
The creation of an“open source review board”or
even a so-called“golden repository”may feel com-
forting. The reality is that, even if you believe that
every developer in every instance is using only“ap-
proved”components, the manual effort to keep that
“white list”up to date is enormous and endless.
Plus, how do you track components as they move
through the development lifecycle? And since new
vulnerabilities are constantly being discovered, how
do you track which applications are newly vulnerable?
The bottom line is that manual policies or“workflow”
efforts just can’t keep up with the volume, complex-
ity and change in the component supply chain.
The fact is, there is already a better alternative to manual policy management. One that is integrated into devel-
oper tools—and is as easy to use as a spell checker. What if you could define policies that are then automated
along the entire development lifecycle? And what if policy violations not only identified the vulnerability—but
the recommended replacement as well?
Manual Policies Just
Don’t Work in a Secure
Development Lifecycle.
Agile Development
Requires Agile Security.
Page 7
7 Security Gaps in the Neglected 90% of Your Applications
Applications have become the number one attack
target, yet less than 1% of security spending address-
es applications. And of that budget, the vast majority
addresses the code an organization writes, which
comprises only 10% of a typical application. So, there
is virtually no money being spent on the 90% of an
application that is the bulk of the exploit surface.
Furthermore, adversaries are getting smarter by the
day. With shared component vulnerabilities, the force
multiplication effect is stunning. Why launch a single
attack on a single application, when you can target a
vulnerable component and potentially compromise
thousands of applications at once?
The good news is that addressing component secu-
rity is the easiest and least expensive of all applica-
tion security methods. A little effort reduces a lot of
exploit risk. And when you begin with component
governance, easier issues with the biggest impact
can be resolved quickly while the harder and re-
maining issues can be addressed with DAST/SAST
later in development.
Sonatype’s Nexus platform applies proven sup-
ply chain best practices to the software industry so
organizations can use fewer and better components,
reduce variety and variability and track known vulner-
abilities. . Developers are empowered to choose the
better components from the start to avoid unneces-
sary risk and the costs associated with downstream
fixes. Policies can be automated through the entire
SDLC. When new vulnerabilities are discovered, you’ll
know which applications are impacted and which
components are now preferred.
When component risk is considered along with DAST
and SAST approaches, application security expands
to be more holistic and effective. Start now because
even a little component governance goes a long way.
SUMMARY
If You’re Not Using Secure Components, You’re Not Building Secure Software.
It’s Not Your Fault, But it’s Still Your Problem.
Why launch a single attack on a single application, when
you can target a vulnerable component and potentially
compromise thousands of applications at once?
Page 8
Sonatype Inc. • 8161 Maple Lawn Drive, Suite 250 • Fulton, MD 20759 • 1.877.866.2836 • www.sonatype.com
2015. Sonatype Inc. All Rights Reserved.
Sonatype helps organizations build better software, even faster. Like a traditional supply chain, software applications
are built by assembling open source and third party components streaming in from a wide variety of public and internal
sources. While re-use is far faster than custom code, the flow of components into and through an organization remains
complex and inefficient. Sonatype’s Nexus platform applies proven supply chain principles to increase speed, efficiency
and quality by optimizing the component supply chain. Sonatype has been on the forefront of creating tools to to
improve developer efficiency and quality since the inception of the Central Repository and Apache Maven in 2001, and
the company continues to serve as the steward of the Central Repository serving 17.2 Billion component download
requests in 2014 alone. Sonatype is privately held with investments from New Enterprise Associates (NEA), Accel Partners,
Bay Partners, Hummer Winblad Venture Partners and Morgenthaler Ventures. Visit: www.sonatype.com
Understand your current component
usage – Use a“bill of materials”to identify
the suppliers in your“software supply chain.”
This report lists all components you use
along with any known vulnerabilities.
Design your Open Source Software (OSS)
governance to be frictionless, scalable
and automated – Your organization must
not only define your policies, but also find
practical ways to enforce them without slow-
ing down development and without encour-
aging“work-arounds.”Policies must be agile
enough to keep pace with modern develop-
ment. Strive to automate policy enforcement
and minimize drag on developers.
Enable developer decision support –
Provide information on component vulner-
abilities (and licensing risk) within the IDE
to make it easy for developers to pick the
best components from the start. By avoiding
problems early you will improve developer
productivity and reduce costs.
Provide continuous and rapid feedback –
Policies that are enforced across the entire
software life cycle ensure a secure life cycle.
And since security isn’t a point-in-time event,
continuous monitoring should be used to
alert you when you are about to use a vul-
nerable component and as new vulnerabili-
ties are discovered in components you’ve
already used.
NEXT STEPS
As you consider the role of application security in your organization, consider these four things:
For more information about any of these steps, please visit www.sonatype.com

More Related Content

What's hot

Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Jeff Williams
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleJeff Williams
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP LondonJeff Williams
 
7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to AdversariesDerek E. Weeks
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesSonatype
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Sonatype
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsLarry Suto
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 

What's hot (20)

Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London
 
7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad Binaries
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application Firewalls
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 

Viewers also liked

Can you be remotely agile? (Agile2015)
Can you be remotely agile? (Agile2015)Can you be remotely agile? (Agile2015)
Can you be remotely agile? (Agile2015)Mark Kilby
 
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...EclipseDayParis
 
Accelerating innovation with software supply chain management
Accelerating innovation with  software supply chain management    Accelerating innovation with  software supply chain management
Accelerating innovation with software supply chain management matthewabq
 
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...Sonatype
 
White Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementWhite Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementSonatype
 
Continuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves SecurityContinuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves SecuritySonatype
 
20160929 android taipei Sonatype nexus on amazon ec2
20160929 android taipei Sonatype nexus on amazon ec2 20160929 android taipei Sonatype nexus on amazon ec2
20160929 android taipei Sonatype nexus on amazon ec2 TSE-JU LIN(Louis)
 
Software supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlSoftware supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlmatthewabq
 
CloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUpCloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUpRavi Lachhman
 
Enterprise Docker Requires a Private Registry
Enterprise Docker Requires a Private RegistryEnterprise Docker Requires a Private Registry
Enterprise Docker Requires a Private RegistryChris Riley ☁
 
DOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeDOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeGene Kim
 
Continuous Integration (Jenkins/Hudson)
Continuous Integration (Jenkins/Hudson)Continuous Integration (Jenkins/Hudson)
Continuous Integration (Jenkins/Hudson)Dennys Hsieh
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerSonatype
 
DevOps and Continuous Delivery Reference Architectures - Volume 2
DevOps and Continuous Delivery Reference Architectures - Volume 2DevOps and Continuous Delivery Reference Architectures - Volume 2
DevOps and Continuous Delivery Reference Architectures - Volume 2Sonatype
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...Sonatype
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (17)

Can you be remotely agile? (Agile2015)
Can you be remotely agile? (Agile2015)Can you be remotely agile? (Agile2015)
Can you be remotely agile? (Agile2015)
 
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
 
Accelerating innovation with software supply chain management
Accelerating innovation with  software supply chain management    Accelerating innovation with  software supply chain management
Accelerating innovation with software supply chain management
 
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...
White Paper: Software Supply Chain Automation: Going Beyond Agile, Lean and D...
 
Discovering the p2 API
Discovering the p2 APIDiscovering the p2 API
Discovering the p2 API
 
White Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementWhite Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository Management
 
Continuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves SecurityContinuous Security: 5 Ways DevOps Improves Security
Continuous Security: 5 Ways DevOps Improves Security
 
20160929 android taipei Sonatype nexus on amazon ec2
20160929 android taipei Sonatype nexus on amazon ec2 20160929 android taipei Sonatype nexus on amazon ec2
20160929 android taipei Sonatype nexus on amazon ec2
 
Software supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlSoftware supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing control
 
CloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUpCloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUp
 
Enterprise Docker Requires a Private Registry
Enterprise Docker Requires a Private RegistryEnterprise Docker Requires a Private Registry
Enterprise Docker Requires a Private Registry
 
DOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeDOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - Sonatype
 
Continuous Integration (Jenkins/Hudson)
Continuous Integration (Jenkins/Hudson)Continuous Integration (Jenkins/Hudson)
Continuous Integration (Jenkins/Hudson)
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for Docker
 
DevOps and Continuous Delivery Reference Architectures - Volume 2
DevOps and Continuous Delivery Reference Architectures - Volume 2DevOps and Continuous Delivery Reference Architectures - Volume 2
DevOps and Continuous Delivery Reference Architectures - Volume 2
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to White Paper: 7 Security Gaps in the Neglected 90% of your Applications

Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023SofiaCarter4
 
Software risk management
Software risk managementSoftware risk management
Software risk managementJose Javier M
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the CloudtCell
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous DeliveryMainstay
 
Software composition analysis in business 3.pdf
Software composition analysis in business  3.pdfSoftware composition analysis in business  3.pdf
Software composition analysis in business 3.pdfCiente
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020developeronrents
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 

Similar to White Paper: 7 Security Gaps in the Neglected 90% of your Applications (20)

VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Software risk management
Software risk managementSoftware risk management
Software risk management
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
Software composition analysis in business 3.pdf
Software composition analysis in business  3.pdfSoftware composition analysis in business  3.pdf
Software composition analysis in business 3.pdf
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 

More from Sonatype

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019Sonatype
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference ArchitecturesSonatype
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxSonatype
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018Sonatype
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOpsSonatype
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps SurveySonatype
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseSonatype
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesSonatype
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandSonatype
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealSonatype
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way ForwardSonatype
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizSonatype
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanSonatype
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsSonatype
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsSonatype
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSSonatype
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsSonatype
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure AutomationSonatype
 

More from Sonatype (20)

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all Equifax
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the Enterprise
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & Microservices
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen Beal
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way Forward
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward Ruiz
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris Swan
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin Collins
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with Jenkins
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure Automation
 

Recently uploaded

Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 

White Paper: 7 Security Gaps in the Neglected 90% of your Applications

  • 1. WHITEPAPER 7 Security Gaps in the Neglected 90% of your Applications Introduction by Sonatype CTO Josh Corman
  • 2. Page 2 7 Security Gaps in the Neglected 90% of Your Applications about Joshua Corman In his capacity as CTO, Joshua researches new technologies and software development trends to help evolve Sonatype’s product strategy. Additionally, Joshua is working with the broader IT community as well as policy and standards bodies to improve software development security standards and best practices. Prior to Sonatype, Joshua served as a security researcher and executive at Akamai Tech- nologies, The 451 Group, and IBM Internet Security Systems, among other firms. A well- regarded innovator, he co-founded Rugged Software and IamTheCavalry to encourage the development of new cyber security solutions in response to the world’s increasing reliance on digital infrastructure. Joshua's unique approach to addressing cyber security in the context of human factors and social impact has helped position him as one of the most trusted names in IT security. He also serves as adjunct faculty for Carnegie Mellon’s Heinz College, IANS Research, and as a Fellow at the Ponemon Institute. Joshua received his bachelor's degree in philosophy, graduating summa cum laude, from the University of New Hampshire. INTRODUCTION Software applications need to be delivered faster and across more platforms than ever. To build high quality software in short order, we’ve seen a dramatic shift from source code to component-based development, with open source and third party components providing the innovation and efficiency that developers need. Unfortunately, our dependence on components is growing faster than our ability to secure them. These shared components are not top-of-mind when considering application risk. Worse yet, components are increasingly the preferred attack surface in today’s applications. The combination of growing component usage, coupled with lack of security, requires us to urgently re-evaluate traditional application security approaches and identify practical next steps for closing this security gap. So what’s the“neglected 90%,”why is it attractive to your adversaries and what can you do about it? Plenty. Here are 7 key points, for starters. Joshua Corman Chief Technology Officer
  • 3. Page 3 7 Security Gaps in the Neglected 90% of Your Applications In this context, we are not talking about open source infrastructure, software or tools. We’re talking about open source components that are used to build today’s applications, most of which are down- loaded from public repositories such as the (Maven) Central Repository. After all, why create your own web framework, or logging mechanism, when you can turn to proven components and frameworks from open source projects? These can be basic com- ponents, such as the SLF4J logging framework, or a major framework like Struts or Spring. When considering that 80-90% of a typical appli- cation is comprised of open source or third party components, and 71% of these applications have at least one critical or severe vulnerability, there is a clear motivation to stop neglecting this risk. What’s more, since a single component is likely to be used across many thousands of applications, an adver- sary’s job gets even easier—and their effort multiplied—since attacking single component vulnerability can simultaneously impact many applications across many organizations around the globe. In response to this growing issue, the OWASP (Open Web Application Security Project) recently updated their Top 10 list of the most critical security risks, stating that developers should“avoid using components with known vulnerabilities.” While exact statistics vary, it is widely accepted that application security gets the smallest proportion of an overall security budget, with vastly higher expen- ditures made on network, data and other defenses. In fact, application security receives less than 1 per- cent of total security spending—yet most experts agree that applications are now the number one attack target.1 1 Source: The Verizon Business Data Breach Investigations Report (DBIR) 2014. As Open Source Usage Expands, So Do the Risks Security Budgets Are Out of Sync with Risk and Reality RiskBudget
  • 4. Page 4 7 Security Gaps in the Neglected 90% of Your Applications A foundation of component governance coupled with Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) pro- vides the most holistic view of your application risk and the most defensible starting points. Together, these technologies factor for 100% of your application, including the source code that is written and compiled (10%) and the components that are downloaded and assembled (90%). Furthermore, when known to be vulnerable com- ponents are eliminated early in the development process, your DAST scans will yield significantly more focused and manageable results. Pareto’s Principle, or the 80-20 Rule, helps you manage those small things that really make the biggest differ- ence to your results. So, in this case, instead of spending 90% of your time on 10% of your attack surface, you can focus just 10% of your time to protect 90% of your attack surface. Start with critical or severe component vulnerabilities, which are easy to identify and remediate. Once your component security is underway, you can then move to SAST on the 10% of your application comprised of source code and more efficiently manage and leverage your DAST scans. Since software is assembled with components coming in from a wide variety of sources, you’re basically inheriting a software supply chain. But, unlike mature industries like automobile manu- facturing, you probably don’t (yet) manage or govern this supply chain. Imagine driving a car manufactured with parts from unknown vendors who have no requirements for quality or security. Your software is that car. It’s imperative that your supplier-provided assets are properly identified, tracked and quality-checked. Without it, you really don’t know what’s in your car or who built it. If a“part”is faulty, you wouldn’t even know if you’re using that part, much less exactly which car models might be impacted. Pareto Principle 2.0? (the “90/10” Rule): Low Effort and Big Gains You Use a Software Supply Chain. How Well Do You Manage It?
  • 5. Page 5 7 Security Gaps in the Neglected 90% of Your Applications Developers are happy to avoid risky components if better options are easily available. However, with the pressure to develop faster, it’s just not possible for them to research if each component is outdated or has known vulnerabilities or risky “copyleft” license obligations. Fixing problems (or better yet, avoiding the risks of known bad components) early in development costs vastly less than fixing issues later in production. For component-based development, that means making it easy for your developers to select the safest component from the start, directly in the tools that they use everyday. With decision support built into their work environments (IDE), it is just as easy to build a safe application as a vulnerable one. If their favorite component doesn’t meet your organization’s risk policy, developers will be guided toward a preferred component replacement. Since code ages more like milk than like a fine wine, risk management should be ongoing. New vulnerabilities are frequently discovered in components previously thought to be safe, so to keep your applications from go- ing sour, you should rely on automation to alert you when new risks are discovered in existing applications. In this scenario, security doesn’t lag behind development. It is seamless and in-sync with development and production as well. Just when you thought you had a headache, it gets worse. There are often hundreds, if not thousands, of components used by a typical development team, and each component has tens, if not hundreds of depen- dencies as well as multiple versions. Just like a traditional supply chain, it has become impossible to manually manage the selection, tracking and inventorying of these supplier-provided components. Your software supply chain needs the same type of automated visibility and management that has been a lifesaver to other industries for years. The good news is: it costs far less and is far easier to implement than you might think. Empower Your Developers. They’re Your Front Line Defense.
  • 6. Page 6 7 Security Gaps in the Neglected 90% of Your Applications In many organizations, the traditional waterfall development and delivery approach has been re- placed by Agile—and increasingly DevOps. This ap- proach reduces the cycle time between the incep- tion of an idea and delivery of that idea in reliable software. This requires that application security is also agile and re-thought in the context of modern development methods, continuous integration, and continuous delivery. If not, then application secu- rity will be even more out of step with the pace of development and associated risk. And, just as decision support should be integrated into developer tools, there should also be better integration between application stakeholders in the organization. A great opportunity is to do this in the context of Development Operations, known as“DevOps”, “Rugged DevOps”or“DevOpsSec.”Leaders in the DevOps movement seek to reduce friction between develop- ment and operations teams by focusing on business value, efficiency and velocity. For many, automating the SDLC with built-in processes to minimize quality, security and license risk early in development is definitely a step in the right direction. The result? A secure blanket over your neglected 90%—and trusted software that stays that way over time. The creation of an“open source review board”or even a so-called“golden repository”may feel com- forting. The reality is that, even if you believe that every developer in every instance is using only“ap- proved”components, the manual effort to keep that “white list”up to date is enormous and endless. Plus, how do you track components as they move through the development lifecycle? And since new vulnerabilities are constantly being discovered, how do you track which applications are newly vulnerable? The bottom line is that manual policies or“workflow” efforts just can’t keep up with the volume, complex- ity and change in the component supply chain. The fact is, there is already a better alternative to manual policy management. One that is integrated into devel- oper tools—and is as easy to use as a spell checker. What if you could define policies that are then automated along the entire development lifecycle? And what if policy violations not only identified the vulnerability—but the recommended replacement as well? Manual Policies Just Don’t Work in a Secure Development Lifecycle. Agile Development Requires Agile Security.
  • 7. Page 7 7 Security Gaps in the Neglected 90% of Your Applications Applications have become the number one attack target, yet less than 1% of security spending address- es applications. And of that budget, the vast majority addresses the code an organization writes, which comprises only 10% of a typical application. So, there is virtually no money being spent on the 90% of an application that is the bulk of the exploit surface. Furthermore, adversaries are getting smarter by the day. With shared component vulnerabilities, the force multiplication effect is stunning. Why launch a single attack on a single application, when you can target a vulnerable component and potentially compromise thousands of applications at once? The good news is that addressing component secu- rity is the easiest and least expensive of all applica- tion security methods. A little effort reduces a lot of exploit risk. And when you begin with component governance, easier issues with the biggest impact can be resolved quickly while the harder and re- maining issues can be addressed with DAST/SAST later in development. Sonatype’s Nexus platform applies proven sup- ply chain best practices to the software industry so organizations can use fewer and better components, reduce variety and variability and track known vulner- abilities. . Developers are empowered to choose the better components from the start to avoid unneces- sary risk and the costs associated with downstream fixes. Policies can be automated through the entire SDLC. When new vulnerabilities are discovered, you’ll know which applications are impacted and which components are now preferred. When component risk is considered along with DAST and SAST approaches, application security expands to be more holistic and effective. Start now because even a little component governance goes a long way. SUMMARY If You’re Not Using Secure Components, You’re Not Building Secure Software. It’s Not Your Fault, But it’s Still Your Problem. Why launch a single attack on a single application, when you can target a vulnerable component and potentially compromise thousands of applications at once?
  • 8. Page 8 Sonatype Inc. • 8161 Maple Lawn Drive, Suite 250 • Fulton, MD 20759 • 1.877.866.2836 • www.sonatype.com 2015. Sonatype Inc. All Rights Reserved. Sonatype helps organizations build better software, even faster. Like a traditional supply chain, software applications are built by assembling open source and third party components streaming in from a wide variety of public and internal sources. While re-use is far faster than custom code, the flow of components into and through an organization remains complex and inefficient. Sonatype’s Nexus platform applies proven supply chain principles to increase speed, efficiency and quality by optimizing the component supply chain. Sonatype has been on the forefront of creating tools to to improve developer efficiency and quality since the inception of the Central Repository and Apache Maven in 2001, and the company continues to serve as the steward of the Central Repository serving 17.2 Billion component download requests in 2014 alone. Sonatype is privately held with investments from New Enterprise Associates (NEA), Accel Partners, Bay Partners, Hummer Winblad Venture Partners and Morgenthaler Ventures. Visit: www.sonatype.com Understand your current component usage – Use a“bill of materials”to identify the suppliers in your“software supply chain.” This report lists all components you use along with any known vulnerabilities. Design your Open Source Software (OSS) governance to be frictionless, scalable and automated – Your organization must not only define your policies, but also find practical ways to enforce them without slow- ing down development and without encour- aging“work-arounds.”Policies must be agile enough to keep pace with modern develop- ment. Strive to automate policy enforcement and minimize drag on developers. Enable developer decision support – Provide information on component vulner- abilities (and licensing risk) within the IDE to make it easy for developers to pick the best components from the start. By avoiding problems early you will improve developer productivity and reduce costs. Provide continuous and rapid feedback – Policies that are enforced across the entire software life cycle ensure a secure life cycle. And since security isn’t a point-in-time event, continuous monitoring should be used to alert you when you are about to use a vul- nerable component and as new vulnerabili- ties are discovered in components you’ve already used. NEXT STEPS As you consider the role of application security in your organization, consider these four things: For more information about any of these steps, please visit www.sonatype.com