SlideShare a Scribd company logo
1 of 15
Download to read offline
Open Source License
Management in the Black
Duck Hub
Hal Hearst – Principal Product Manager
hhearst@synopsys.com
What is this topic?
• A set of best practices
• Tips and Tricks
• How to …
Use all the features in Black Duck Hub to help
your teams build fast while maintaining license
compliance
What has 16 Years of Experience Taught Us?
2002 2008 2015
Situation:
• Limited OSS use and availability
• SCO-IBM lawsuit prompts inspection of code
snippets
• Security? Someone else’s problem
Best practices:
• Audit/scanning tools
• Match individual files
• Match code snippets
Situation:
• Increasing adoption of OSS
• GPL lawsuits prompts better governance
• Recognized need to consider security,
maintenance and other cost factors
Best practices:
• Formal OSS Policies
• Approval process
• Whitelist catalog
Situation:
• Package Management has lead to explosive
numbers of OSS components
• Software Freedom Law Center focuses on
education, not lawsuits
• Heartbleed vulnerability (2014) bring security
to the forefront.
Best practices:
• Automated ID of OSS
• Choose OSS that does not violate policy
• Integration into DevOps process
LESSONS LEARNED: RISK LANDSCAPE IS CHANGING, AGILITY IS KEY
20182004
• License Families
• Predefined License Groups primarily based upon reciprocity
• Range from permissive to reciprocal via network usage
• Editable with Professional Edition
• Project/Version Settings
• Distribution Type (Internal, External, SaaS, Open Source)
• Component Usage
• How is OSS Component Incorporated in a BOM
• Degree of Integration… or Linking… or isolation
• Affects license risks & obligations
• Hub Does not determine this, so when should you check or verify it?
Key Hub Functionality – Standard Edition
• License Risk
• Fixed Risk Model Based Upon:
• Project/Version - Distribution Type
• Component Usage (incorporation method)
• License Family (group)
• Can use for decision support & reporting
• Component Review Flag
• Typically used to verify accuracy of scan & make new components obvious
• Not used to approve the component
• Can be used in Policy Rules
Key Hub Functionality – Standard Edition
• Policy Management
• Controlled by Policy Manager Role
• Define the rules which govern license use (and security)
• Policy Violations create Notifications
• Policy Violations can be overridden – depending upon rules
• License Management
• Controlled by License Manager Role
• Create/Review/Annotate OSS Licenses
• Create White Lists / Black Lists via License Status
Key Hub Functionality - Professional
• Component Level License Text
• License Text associated with Component, not the license
• Important for Licenses that are modified for each component
• MIT, BSD, ISC, etc. - Typical modification is the copyright statement
• Notices Report Functionality*
• Attribution Statements
• Editable License Text
• Automated or Manual Creation
• Text, HTLM or JSON format
Key Hub Functionality - Professional
* A basic notices report is include in the Standard Edition
• Hub Alerts
• License policy violations can create Notifications
• Distribute Notifications thru a channel of choice
• Email / HipChat / Slack
• Realtime or Daily Digests
• Workflow Integration (Jira)
• License policy violations can create Jira tickets
• Capture additional info – track & route through a workflow
• Recommend doing this for “reviewed” components
Key Hub Functionality – Integrations
Fully Automated
• Speed to Market & scalable program
very important
• More concerned with security risks than
license risks
• Most applications internal
• Willing to trust external party license
assessments
How?
• Trust BD’s license family
• Simple policy rules based upon License
Family
What kind of program do you want?
Semi Automated
• Speed to Market & scalable program
important, but need more controls
• OSS License risk is material
• Applications Distributed
• Trust (but verify) external party license
assessments
How?
• License Review Process
• Policy Rules on license Status
• More complex policy rules
• Exception based reviews
What kind of program do you want?
Review Based
• OSS License risk is significant business risk
• Willing to sacrifice some convenience for more
control
• Applications distributed and/or redistributed by
partners
• Trust nothing….
How?
• License & Component Review Process
• Policy Rules fail all unapproved components
• Heavy use of External Workflow
What kind of program do you want?
The Problem with Review Based
Suggested License Management Workflow
Review Licenses in
Use
License Planning
Create Policy to
trigger violations
Create / Edit Custom &
KB Licenses in necessary
Review BOMs for
policy violations
Determine course of action
for OOP components
Research components with
Unknown Licenses / License
Not Found
Confirm usage of components
with license risk is correct
Generate Notices
File Report
Determine if any components
or subprojects should be
excluded from report
Add attribution statements
and edit license text if
necessary
License Planning
Distribution Model
License Family Usage External SaaS Internal Open Source
AGPL
Dynamically Linked No No OK Check
Dev Tool / Excluded OK Ok OK OK
Source Code No No OK Check
Statically Linked No No OK Check
Separate Work OK OK OK OK
Implementation of Standard OK OK OK OK
Reciprocal
Dynamically Linked No OK OK Check
Dev Tool / Excluded OK OK OK OK
Source Code No OK OK Check
Statically Linked No OK OK Check
Separate Work OK OK OK OK
Implementation of Standard OK OK OK OK
Weak
Reciprocal
Dynamically Linked Check OK OK Check
Dev Tool / Excluded OK OK OK OK
Source Code Check OK OK Check
Statically Linked Check OK OK Check
Separate Work OK OK OK OK
Implementation of Standard OK OK OK OK
Permissive
Dynamically Linked OK OK OK Check
Dev Tool / Excluded OK OK OK OK
Source Code OK OK OK Check
Statically Linked OK OK OK Check
Separate Work OK OK OK OK
Implementation of Standard OK OK OK OK
Unknown All No No No No
For a license group:
• What circumstances are OK?
• i.e. do not violate a policy rule
• What conditions are never ok?
• i.e. violate a policy rule that cannot be
overridden
• What conditions are OK, but need
verification?
• i.e. violate a policy rule that can be
overridden
Q & A
THANKS!!

More Related Content

What's hot

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 

What's hot (20)

Perforce on Tour 2015 - Grab Testing By the Horns and Move
Perforce on Tour 2015 - Grab Testing By the Horns and MovePerforce on Tour 2015 - Grab Testing By the Horns and Move
Perforce on Tour 2015 - Grab Testing By the Horns and Move
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
A Brief Insight into Penetration Testing
A Brief Insight into Penetration TestingA Brief Insight into Penetration Testing
A Brief Insight into Penetration Testing
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case Study
 
Primer: The top ten automotive cybersecurity vulnerabilities of 2015
Primer: The top ten automotive cybersecurity vulnerabilities of 2015Primer: The top ten automotive cybersecurity vulnerabilities of 2015
Primer: The top ten automotive cybersecurity vulnerabilities of 2015
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & LimitationsDAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 

Similar to FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub

Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
Nishkarsh Gupta
 
Agile testing for embedded software development
Agile testing for embedded software developmentAgile testing for embedded software development
Agile testing for embedded software development
Tom Stiehm
 
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptxAgile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
JennysWonders
 

Similar to FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub (20)

Integration strategies best practices- Mulesoft meetup April 2018
Integration strategies   best practices- Mulesoft meetup April 2018Integration strategies   best practices- Mulesoft meetup April 2018
Integration strategies best practices- Mulesoft meetup April 2018
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
How to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty SoftwareHow to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty Software
 
Kaseya Connect 2013: Templates and Policy: The Next Steps
Kaseya Connect 2013: Templates and Policy: The Next StepsKaseya Connect 2013: Templates and Policy: The Next Steps
Kaseya Connect 2013: Templates and Policy: The Next Steps
 
Software Standards
Software StandardsSoftware Standards
Software Standards
 
How To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty SoftwareHow To Avoid Continuously Delivering Faulty Software
How To Avoid Continuously Delivering Faulty Software
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Agile testing for embedded software development
Agile testing for embedded software developmentAgile testing for embedded software development
Agile testing for embedded software development
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
 
Software product development process
Software product development processSoftware product development process
Software product development process
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
Choosing right-automation-tool
Choosing right-automation-toolChoosing right-automation-tool
Choosing right-automation-tool
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
 
Test Policy and Practices
Test Policy and PracticesTest Policy and Practices
Test Policy and Practices
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks
 
Unit_5 and Unit 6.pptx
Unit_5 and Unit 6.pptxUnit_5 and Unit 6.pptx
Unit_5 and Unit 6.pptx
 
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptxAgile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
Agile Network Chennai 2023 - Leadership behaviours for new age empiricism.pptx
 

More from Black Duck by Synopsys

More from Black Duck by Synopsys (20)

Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 

Recently uploaded

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 

FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub

  • 1. Open Source License Management in the Black Duck Hub Hal Hearst – Principal Product Manager hhearst@synopsys.com
  • 2. What is this topic? • A set of best practices • Tips and Tricks • How to … Use all the features in Black Duck Hub to help your teams build fast while maintaining license compliance
  • 3. What has 16 Years of Experience Taught Us? 2002 2008 2015 Situation: • Limited OSS use and availability • SCO-IBM lawsuit prompts inspection of code snippets • Security? Someone else’s problem Best practices: • Audit/scanning tools • Match individual files • Match code snippets Situation: • Increasing adoption of OSS • GPL lawsuits prompts better governance • Recognized need to consider security, maintenance and other cost factors Best practices: • Formal OSS Policies • Approval process • Whitelist catalog Situation: • Package Management has lead to explosive numbers of OSS components • Software Freedom Law Center focuses on education, not lawsuits • Heartbleed vulnerability (2014) bring security to the forefront. Best practices: • Automated ID of OSS • Choose OSS that does not violate policy • Integration into DevOps process LESSONS LEARNED: RISK LANDSCAPE IS CHANGING, AGILITY IS KEY 20182004
  • 4. • License Families • Predefined License Groups primarily based upon reciprocity • Range from permissive to reciprocal via network usage • Editable with Professional Edition • Project/Version Settings • Distribution Type (Internal, External, SaaS, Open Source) • Component Usage • How is OSS Component Incorporated in a BOM • Degree of Integration… or Linking… or isolation • Affects license risks & obligations • Hub Does not determine this, so when should you check or verify it? Key Hub Functionality – Standard Edition
  • 5. • License Risk • Fixed Risk Model Based Upon: • Project/Version - Distribution Type • Component Usage (incorporation method) • License Family (group) • Can use for decision support & reporting • Component Review Flag • Typically used to verify accuracy of scan & make new components obvious • Not used to approve the component • Can be used in Policy Rules Key Hub Functionality – Standard Edition
  • 6. • Policy Management • Controlled by Policy Manager Role • Define the rules which govern license use (and security) • Policy Violations create Notifications • Policy Violations can be overridden – depending upon rules • License Management • Controlled by License Manager Role • Create/Review/Annotate OSS Licenses • Create White Lists / Black Lists via License Status Key Hub Functionality - Professional
  • 7. • Component Level License Text • License Text associated with Component, not the license • Important for Licenses that are modified for each component • MIT, BSD, ISC, etc. - Typical modification is the copyright statement • Notices Report Functionality* • Attribution Statements • Editable License Text • Automated or Manual Creation • Text, HTLM or JSON format Key Hub Functionality - Professional * A basic notices report is include in the Standard Edition
  • 8. • Hub Alerts • License policy violations can create Notifications • Distribute Notifications thru a channel of choice • Email / HipChat / Slack • Realtime or Daily Digests • Workflow Integration (Jira) • License policy violations can create Jira tickets • Capture additional info – track & route through a workflow • Recommend doing this for “reviewed” components Key Hub Functionality – Integrations
  • 9. Fully Automated • Speed to Market & scalable program very important • More concerned with security risks than license risks • Most applications internal • Willing to trust external party license assessments How? • Trust BD’s license family • Simple policy rules based upon License Family What kind of program do you want?
  • 10. Semi Automated • Speed to Market & scalable program important, but need more controls • OSS License risk is material • Applications Distributed • Trust (but verify) external party license assessments How? • License Review Process • Policy Rules on license Status • More complex policy rules • Exception based reviews What kind of program do you want?
  • 11. Review Based • OSS License risk is significant business risk • Willing to sacrifice some convenience for more control • Applications distributed and/or redistributed by partners • Trust nothing…. How? • License & Component Review Process • Policy Rules fail all unapproved components • Heavy use of External Workflow What kind of program do you want?
  • 12. The Problem with Review Based
  • 13. Suggested License Management Workflow Review Licenses in Use License Planning Create Policy to trigger violations Create / Edit Custom & KB Licenses in necessary Review BOMs for policy violations Determine course of action for OOP components Research components with Unknown Licenses / License Not Found Confirm usage of components with license risk is correct Generate Notices File Report Determine if any components or subprojects should be excluded from report Add attribution statements and edit license text if necessary
  • 14. License Planning Distribution Model License Family Usage External SaaS Internal Open Source AGPL Dynamically Linked No No OK Check Dev Tool / Excluded OK Ok OK OK Source Code No No OK Check Statically Linked No No OK Check Separate Work OK OK OK OK Implementation of Standard OK OK OK OK Reciprocal Dynamically Linked No OK OK Check Dev Tool / Excluded OK OK OK OK Source Code No OK OK Check Statically Linked No OK OK Check Separate Work OK OK OK OK Implementation of Standard OK OK OK OK Weak Reciprocal Dynamically Linked Check OK OK Check Dev Tool / Excluded OK OK OK OK Source Code Check OK OK Check Statically Linked Check OK OK Check Separate Work OK OK OK OK Implementation of Standard OK OK OK OK Permissive Dynamically Linked OK OK OK Check Dev Tool / Excluded OK OK OK OK Source Code OK OK OK Check Statically Linked OK OK OK Check Separate Work OK OK OK OK Implementation of Standard OK OK OK OK Unknown All No No No No For a license group: • What circumstances are OK? • i.e. do not violate a policy rule • What conditions are never ok? • i.e. violate a policy rule that cannot be overridden • What conditions are OK, but need verification? • i.e. violate a policy rule that can be overridden