SlideShare a Scribd company logo
You’ve got your open
source audit report, now
what? Best practices for
companies of all sizes.
Tony Decicco, Shareholder, GTC Law Group & Affiliates
Leon Schwartz, Associate, GTC Law Group & Affiliates
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Speakers
Leon Schwartz
Associate,
GTC Law Group &
Affiliates
Tony Decicco
Shareholder,
GTC Law Group &
Affiliates
2
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Agenda
• How do you conduct an open source / third-party software audit?
• How do you select and prepare the code base?
• How do you get the most out of your Black Duck code scan?
• How do you implement a third party software policy?
• How do you contribute to the open source community?
• Q&A
3
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
How do you conduct
an open source / third-party software audit?
4
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Review process: getting started
Realize this applies to you
• Scope
• Identify all your software
Define goals
Select initial code bases for
review
Line up your internal team
• Celebrity endorsements
• Set milestones
5
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 6
Review process overview
OVERALL GOAL: identify, quantify, mitigate and allocate third party software-related risks
Bill of materials
Notice and
attribution files
Reps and
schedules
OUTPUTS
Identify Plan / Remediate
Select code base
Define goals
SELECT
CODE
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 7
Identify
• All third party software (both
commercial and open source),
data/content and hardware
embedded in or used in the
development, maintenance,
support and offering of
products, along with the
applicable licenses and usage
facts
How?
• Self-disclosure
• Package managers
(e.g. npm, Maven, bower, etc.)
• Manual string/keyword searching
• Procurement records
• Manual check of repositories /
development machines
• Code scans (including BOM,
vulnerabilities and web services)
Review phase 1: identify
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Review phase 2: analyze
Analyze
• Understand incompatibilities between the
described
or proposed use of a given third party
component and the license terms for that
component
• Analyze license terms which may be incompatible
with current or proposed business practices
• Assess security vulnerabilities
• Consider:
• Internal use
• Distribution
• Hosting and allowing others to host
• Modification
• Linking
• Use as a code generator
8
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Review phase 3: plan / remediate
Plan / Remediate / Mitigate / Allocate
• Create a remediation plan to address identified issues
• Code remediation:
- Removing, rewriting or replacing code
- Addressing security vulnerabilities
- Costs: engineering, time
• Legal remediation:
- Amending/terminating agreements, seeking
clarifications,
seeking waivers of past liability, re-licensing
components
and obtaining new licenses
- Costs: Legal, time, fees to licensors
• Notice and attribution:
- Does not remedy past non-compliance
• Risk allocation through contract terms:
- Additional representations and warranties
- Remediation-focused closing conditions and best
efforts covenants 9
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
How do you select and prepare the code base?
10
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 11
Initial steps for companies of all
sizes:
• Select a code base to scan
• Importance
• Size
• Likely variety of components
• Number of developers
• Prepare code base for scan
• Remove known-unused
components
• Exclude known third-party
components?
Smaller Companies focus items:
• Biggest “bang” for the buck
• Code base with most shared code
• Likeliest to get done
• Code base with less busy / nicest developers
• Smaller code base
• Code bases with fewer release cycles
• Most important code base
• Which code base are acquirers / investors likely to worry
about most?
• Which code bases are customers asking about?
Preparing for a code scan
Larger companies focus items:
• Code base with most exposure
• Management interest
• Widest distribution/most customers
• Highest revenue
• Highest risk
• Most established product, with fewest anticipated changes
• Newest product
• Next generation of existing product
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
How do you get the most
out of your Black Duck code scan?
12
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 13
• Most of the time it is difficult
to review everything
• The review process can be time
consuming, labor intensive and
difficult
• Very important to focus on likely
riskiest areas first
• Goal should be to run out of
time/energy on the least risky
items
Prioritize, prioritize, prioritize
Never
Later
Tomorro
w
Today
NOW
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Strategies for prioritization
Identify/eliminate false-positives
• Components no longer in use/obsolete
• Misidentified components/other
explanation
14
License categories
• Unknown license
• Less commercially friendly licenses
• Patent non-enforcement
• Public Domain
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Strategies for prioritization
15
Components with dual-license models
• iTextPDF
• Qt
• RabbitMQ
• AmCharts
• CKEditor
• Highcharts
• TinyMCE
• MySQL
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Strategies for prioritization
Components with known enforcement
or other potential issues
16
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 17
Smaller Companies focus items:
• All the items above
• License collection for “generic” licenses
• Strategic usage information collection
• Lower-risk usage scenarios
• Lower-risk licenses
Additional “cheat codes” for prioritization
Larger companies focus items:
• Review of “fourth party” components
• Easy-to-remediate components
• Industry practice / well-known components
• Linux
• Hibernate
• Commercial components
• How familiar is the list?
• “Microsoft Content”
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Security vulnerabilities
Rank vulnerabilities by order of:
• Severity of risk
• Complexity of exploiting the risk
• Complexity of fixing the risk
Create a process for evaluating security fixes and applying them
The process does not have to be perfect (none are), but it should be
reasonable
• Following NIST guidelines
• GDPR Article 32
“implement appropriate technical and organizational measures to
ensure a level of security appropriate to the risk, including…. (d) a
process for regularly testing, assessing and evaluating the
effectiveness of technical and organizational measures for ensuring
the security of the processing.”
18
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Web services
External services used by your applications
• Usually through an API
• Can be “free”
• Can be hard to identify / quantify
Prioritization
• Examine how used
• Separate API agreement?
• Not common; usually morass of terms (ToU, EULA, Privacy Policy, Data Policy)
• Importance of external service to product
• Who is the licensor?
• Competitors, “frenemies”
How to review
• Review is same as code: confirm you have rights and using within scope
19
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Overall Calibration
Much of the details are in the eye of the
beholder
Important to keep in mind:
• Your goals
• Context of the review
20
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
How do you implement a third party software policy?
21
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Third party software policy
What is it?
• High-level guidelines for use of Third Party Software
• Processes for review of Third Party Software
• Consider privilege
How is it created?
• Best when collaborative effort, not edict from mountaintop
• Identify stakeholders and highly-opinionated influencers (key people)
• Draft policy and solicit input
• Listen to the stakeholders’ feedback
When should it be written?
• Ideally after initial review, when you know your risk tolerance
• As soon as possible, so less remediation will be required in the future
What does it cover?
• Broad, but not so broad as to capture software present on fax machines
What makes a good one?
• Brevity; avoid overly complicated policies and covering every “corner case”
• Balancing act between strict compliance and practicality
• Ironclad policies that don’t work in the real world won’t be followed
• Living document
22
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 23
Smaller Companies focus items:
• More informal policy and review process
• Train developers to use easier-to-approve
components
• Mandate use of package managers?
• Update policy as new licenses are encountered
Third party software policy considerations
Larger companies focus items:
• Diverse approval committee
• Automatic approval / rejection?
• Record-keeping
• Available tracking tools
• Black Duck Hub
• Code Center
• Auditing mechanism
• Periodic code scans
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Third party software policy substance
How is guidance on preferred licenses provided?
• Broad-terms guidance in the policy itself
• More detailed guidance, including “corner cases” through training
Auto-approve certain licenses?
• Tempting, because permissive licenses can be approved for virtually any use
• Beware the “hidden patent license”
• Train developers early and often
• Continue to keep records
Auto-reject certain licenses?
• World is not absolute; almost every license can be approved under certain conditions
• Except maybe the CCA-NonCommercial licenses
How will the policy be enforced?
• Consider having employees sign the policy
• Perform future code scans
• Perform spot-checks
• KGB-style encouragement of tattling on your neighbor
Final thoughts
• Make sure policy matches practice
• Do not treat policy as set in stone
24
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Third party software policy mechanics
Who initiates review?
• Developer
• Tech lead
Who is on the review committee?
• Representatives from all areas of company
• Legal, Business, Development, SecOps
Who reviews first?
• Obtain technical “pre-review?”
How to kick off review?
• Use the tools the developers already use
• Jira, slack, BlackDuck, email
• Use easy-to-follow forms for initial information
Where are records kept?
• Use the tools the developers already use
• Make sure to provide access of prior decisions to developers to avoid duplicate requests
25
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 26
Third party software approval sample flow-chart
START
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
How do you contribute to the open source community?
27
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Contributing to the open source community
Define goals for contributing to existing projects
• Publicity (reputation, goodwill, visibility)
• “Good citizen” – believe in giving back to the community
• Make it easier to maintain your code (contribute back patches / bug fixes)
Define goals for running your own projects
• Recruiting tool
• Develop relationships with open source developers
• Attract talent
• Crowdsource development
• Non-core ideas implemented for “free”
• Reduce development costs and time
• Drive adoption of platform / eco-system
• Create a new line of business (support, apps / plug-ins)
Recognize risks
• Competitors / competitive issues
• Loss of control over contributed code (forking)
• Contributor License Agreements (CLAs)
• Material changes
• Unintended patent licenses
• Over-share (accidental/malicious contribution of trade secrets)
• Cost and resources to support open source contributions
• Contributing to “ghost towns” (orphaned projects)
28
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Contributor License Agreement (CLA)
• Typically based on the Apache Software Foundation
form agreements
• Two forms: individual and corporate
• Usually slightly modified, but sometimes materially
• Really broad license grants
• Copyright
• Covers the contribution and derivative works,
sublicensable, perpetual
• Granted to anyone who receives software from the
Foundation that includes the contribution (not just the
Work to which it was submitted)
• Patent
• Covers the contribution and the combination of the
contribution and the Work to which it was submitted,
irrevocable
• No temporal restriction
• Does contain defensive termination clause
• Contributor has no control over direction of project
29
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018 30
Smaller Companies focus items:
• Protect the “crown jewels”
• Think about future investors / acquirers and
what they would want
• Beware of project scope creep
• Keep in mind potential future markets
• Revise policies to match company’s growth
Contributing to open source projects considerations
Larger companies focus items:
• Review all code prior to submission
• Policy should match employment agreements
• Even code written outside business hours / not
using Company resources?
• Consider sponsorship without code submission
Considerations for companies
of all sizes:
• Beware the Corporate CLA
• Individual submissions versus
corporate submissions
• Beware the rogue CLA
• Not all CLAs are created equal
• Know your competitors
• Decide whether to contribute
to their projects
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Some Takeaways
31
• It’s not as hard as it looks, but need to start somewhere
• Performing a code scan is an easy way to get started
• Always finds previously unknown components
• Hard to undo the impact of poor practices
• Don’t have to do everything we discussed
• Start small, scale up as needed
• Get initial list of third party components, licenses, usage
© Synopsys, Inc. 2018 © Synopsys, Inc. 2018
Q&A
32
This material is provided for your convenience and does not constitute legal advice or create an attorney-client relationship. Prior results do not guarantee similar
outcomes. Attorney Advertising

More Related Content

What's hot

Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
lior mazor
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Notable Legal Developments in Open Source
Notable Legal Developments in Open SourceNotable Legal Developments in Open Source
Notable Legal Developments in Open Source
Black Duck by Synopsys
 
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Black Duck by Synopsys
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
Synopsys Software Integrity Group
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Black Duck by Synopsys
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
Cigital
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
Network Intelligence India
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
Cigital
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Synopsys Software Integrity Group
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for Consultants
Dilum Bandara
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
Digital Bond
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
Synopsys Software Integrity Group
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
Tony DeGonia (LION)
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
 

What's hot (20)

Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Notable Legal Developments in Open Source
Notable Legal Developments in Open SourceNotable Legal Developments in Open Source
Notable Legal Developments in Open Source
 
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for Consultants
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 

Similar to Flight East 2018 Presentation–You've got your open source audit report, now what?

Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys Software Integrity Group
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
Black Duck by Synopsys
 
Financial Services Open Source Participation
Financial Services Open Source ParticipationFinancial Services Open Source Participation
Financial Services Open Source Participation
FINOS
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
Martin Thompson
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
Martin Thompson
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
All Things Open
 
SAST in the SDLC: Building a plan for 'going left'
SAST in the SDLC:  Building a plan for 'going left'SAST in the SDLC:  Building a plan for 'going left'
SAST in the SDLC: Building a plan for 'going left'
WHSZachJones
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
iasaglobal
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
 
Software License Audit Preparation
Software License Audit PreparationSoftware License Audit Preparation
Software License Audit Preparation
NPI_Spend_Mgmt
 
BRMS – Power of Business Agility
BRMS – Power of Business Agility BRMS – Power of Business Agility
BRMS – Power of Business Agility
JK Tech
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit?
Tiberius Forrester
 
Enabling Agility Through DevOps
Enabling Agility Through DevOpsEnabling Agility Through DevOps
Enabling Agility Through DevOps
Leland Newsom CSP-SM, SPC5, SDP
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
Flexera
 
Rich Mironov - Product Management Auckland Talk Slides
Rich Mironov - Product Management Auckland Talk SlidesRich Mironov - Product Management Auckland Talk Slides
Rich Mironov - Product Management Auckland Talk Slides
Anthony Marter
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
Great Wide Open
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Mindtrek
 

Similar to Flight East 2018 Presentation–You've got your open source audit report, now what? (20)

Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
Financial Services Open Source Participation
Financial Services Open Source ParticipationFinancial Services Open Source Participation
Financial Services Open Source Participation
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
 
SAST in the SDLC: Building a plan for 'going left'
SAST in the SDLC:  Building a plan for 'going left'SAST in the SDLC:  Building a plan for 'going left'
SAST in the SDLC: Building a plan for 'going left'
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
Software License Audit Preparation
Software License Audit PreparationSoftware License Audit Preparation
Software License Audit Preparation
 
BRMS – Power of Business Agility
BRMS – Power of Business Agility BRMS – Power of Business Agility
BRMS – Power of Business Agility
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit?
 
Enabling Agility Through DevOps
Enabling Agility Through DevOpsEnabling Agility Through DevOps
Enabling Agility Through DevOps
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Rich Mironov - Product Management Auckland Talk Slides
Rich Mironov - Product Management Auckland Talk SlidesRich Mironov - Product Management Auckland Talk Slides
Rich Mironov - Product Management Auckland Talk Slides
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 

More from Synopsys Software Integrity Group

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
Synopsys Software Integrity Group
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
Synopsys Software Integrity Group
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
Synopsys Software Integrity Group
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Synopsys Software Integrity Group
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
Synopsys Software Integrity Group
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
Synopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Synopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Synopsys Software Integrity Group
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Synopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
Synopsys Software Integrity Group
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
Synopsys Software Integrity Group
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
Synopsys Software Integrity Group
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
Synopsys Software Integrity Group
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 

More from Synopsys Software Integrity Group (20)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 

Recently uploaded

socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 

Recently uploaded (20)

socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 

Flight East 2018 Presentation–You've got your open source audit report, now what?

  • 1. You’ve got your open source audit report, now what? Best practices for companies of all sizes. Tony Decicco, Shareholder, GTC Law Group & Affiliates Leon Schwartz, Associate, GTC Law Group & Affiliates
  • 2. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Speakers Leon Schwartz Associate, GTC Law Group & Affiliates Tony Decicco Shareholder, GTC Law Group & Affiliates 2
  • 3. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Agenda • How do you conduct an open source / third-party software audit? • How do you select and prepare the code base? • How do you get the most out of your Black Duck code scan? • How do you implement a third party software policy? • How do you contribute to the open source community? • Q&A 3
  • 4. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 How do you conduct an open source / third-party software audit? 4
  • 5. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Review process: getting started Realize this applies to you • Scope • Identify all your software Define goals Select initial code bases for review Line up your internal team • Celebrity endorsements • Set milestones 5
  • 6. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 6 Review process overview OVERALL GOAL: identify, quantify, mitigate and allocate third party software-related risks Bill of materials Notice and attribution files Reps and schedules OUTPUTS Identify Plan / Remediate Select code base Define goals SELECT CODE
  • 7. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 7 Identify • All third party software (both commercial and open source), data/content and hardware embedded in or used in the development, maintenance, support and offering of products, along with the applicable licenses and usage facts How? • Self-disclosure • Package managers (e.g. npm, Maven, bower, etc.) • Manual string/keyword searching • Procurement records • Manual check of repositories / development machines • Code scans (including BOM, vulnerabilities and web services) Review phase 1: identify
  • 8. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Review phase 2: analyze Analyze • Understand incompatibilities between the described or proposed use of a given third party component and the license terms for that component • Analyze license terms which may be incompatible with current or proposed business practices • Assess security vulnerabilities • Consider: • Internal use • Distribution • Hosting and allowing others to host • Modification • Linking • Use as a code generator 8
  • 9. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Review phase 3: plan / remediate Plan / Remediate / Mitigate / Allocate • Create a remediation plan to address identified issues • Code remediation: - Removing, rewriting or replacing code - Addressing security vulnerabilities - Costs: engineering, time • Legal remediation: - Amending/terminating agreements, seeking clarifications, seeking waivers of past liability, re-licensing components and obtaining new licenses - Costs: Legal, time, fees to licensors • Notice and attribution: - Does not remedy past non-compliance • Risk allocation through contract terms: - Additional representations and warranties - Remediation-focused closing conditions and best efforts covenants 9
  • 10. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 How do you select and prepare the code base? 10
  • 11. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 11 Initial steps for companies of all sizes: • Select a code base to scan • Importance • Size • Likely variety of components • Number of developers • Prepare code base for scan • Remove known-unused components • Exclude known third-party components? Smaller Companies focus items: • Biggest “bang” for the buck • Code base with most shared code • Likeliest to get done • Code base with less busy / nicest developers • Smaller code base • Code bases with fewer release cycles • Most important code base • Which code base are acquirers / investors likely to worry about most? • Which code bases are customers asking about? Preparing for a code scan Larger companies focus items: • Code base with most exposure • Management interest • Widest distribution/most customers • Highest revenue • Highest risk • Most established product, with fewest anticipated changes • Newest product • Next generation of existing product
  • 12. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 How do you get the most out of your Black Duck code scan? 12
  • 13. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 13 • Most of the time it is difficult to review everything • The review process can be time consuming, labor intensive and difficult • Very important to focus on likely riskiest areas first • Goal should be to run out of time/energy on the least risky items Prioritize, prioritize, prioritize Never Later Tomorro w Today NOW
  • 14. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Strategies for prioritization Identify/eliminate false-positives • Components no longer in use/obsolete • Misidentified components/other explanation 14 License categories • Unknown license • Less commercially friendly licenses • Patent non-enforcement • Public Domain
  • 15. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Strategies for prioritization 15 Components with dual-license models • iTextPDF • Qt • RabbitMQ • AmCharts • CKEditor • Highcharts • TinyMCE • MySQL
  • 16. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Strategies for prioritization Components with known enforcement or other potential issues 16
  • 17. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 17 Smaller Companies focus items: • All the items above • License collection for “generic” licenses • Strategic usage information collection • Lower-risk usage scenarios • Lower-risk licenses Additional “cheat codes” for prioritization Larger companies focus items: • Review of “fourth party” components • Easy-to-remediate components • Industry practice / well-known components • Linux • Hibernate • Commercial components • How familiar is the list? • “Microsoft Content”
  • 18. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Security vulnerabilities Rank vulnerabilities by order of: • Severity of risk • Complexity of exploiting the risk • Complexity of fixing the risk Create a process for evaluating security fixes and applying them The process does not have to be perfect (none are), but it should be reasonable • Following NIST guidelines • GDPR Article 32 “implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including…. (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.” 18
  • 19. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Web services External services used by your applications • Usually through an API • Can be “free” • Can be hard to identify / quantify Prioritization • Examine how used • Separate API agreement? • Not common; usually morass of terms (ToU, EULA, Privacy Policy, Data Policy) • Importance of external service to product • Who is the licensor? • Competitors, “frenemies” How to review • Review is same as code: confirm you have rights and using within scope 19
  • 20. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Overall Calibration Much of the details are in the eye of the beholder Important to keep in mind: • Your goals • Context of the review 20
  • 21. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 How do you implement a third party software policy? 21
  • 22. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Third party software policy What is it? • High-level guidelines for use of Third Party Software • Processes for review of Third Party Software • Consider privilege How is it created? • Best when collaborative effort, not edict from mountaintop • Identify stakeholders and highly-opinionated influencers (key people) • Draft policy and solicit input • Listen to the stakeholders’ feedback When should it be written? • Ideally after initial review, when you know your risk tolerance • As soon as possible, so less remediation will be required in the future What does it cover? • Broad, but not so broad as to capture software present on fax machines What makes a good one? • Brevity; avoid overly complicated policies and covering every “corner case” • Balancing act between strict compliance and practicality • Ironclad policies that don’t work in the real world won’t be followed • Living document 22
  • 23. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 23 Smaller Companies focus items: • More informal policy and review process • Train developers to use easier-to-approve components • Mandate use of package managers? • Update policy as new licenses are encountered Third party software policy considerations Larger companies focus items: • Diverse approval committee • Automatic approval / rejection? • Record-keeping • Available tracking tools • Black Duck Hub • Code Center • Auditing mechanism • Periodic code scans
  • 24. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Third party software policy substance How is guidance on preferred licenses provided? • Broad-terms guidance in the policy itself • More detailed guidance, including “corner cases” through training Auto-approve certain licenses? • Tempting, because permissive licenses can be approved for virtually any use • Beware the “hidden patent license” • Train developers early and often • Continue to keep records Auto-reject certain licenses? • World is not absolute; almost every license can be approved under certain conditions • Except maybe the CCA-NonCommercial licenses How will the policy be enforced? • Consider having employees sign the policy • Perform future code scans • Perform spot-checks • KGB-style encouragement of tattling on your neighbor Final thoughts • Make sure policy matches practice • Do not treat policy as set in stone 24
  • 25. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Third party software policy mechanics Who initiates review? • Developer • Tech lead Who is on the review committee? • Representatives from all areas of company • Legal, Business, Development, SecOps Who reviews first? • Obtain technical “pre-review?” How to kick off review? • Use the tools the developers already use • Jira, slack, BlackDuck, email • Use easy-to-follow forms for initial information Where are records kept? • Use the tools the developers already use • Make sure to provide access of prior decisions to developers to avoid duplicate requests 25
  • 26. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 26 Third party software approval sample flow-chart START
  • 27. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 How do you contribute to the open source community? 27
  • 28. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Contributing to the open source community Define goals for contributing to existing projects • Publicity (reputation, goodwill, visibility) • “Good citizen” – believe in giving back to the community • Make it easier to maintain your code (contribute back patches / bug fixes) Define goals for running your own projects • Recruiting tool • Develop relationships with open source developers • Attract talent • Crowdsource development • Non-core ideas implemented for “free” • Reduce development costs and time • Drive adoption of platform / eco-system • Create a new line of business (support, apps / plug-ins) Recognize risks • Competitors / competitive issues • Loss of control over contributed code (forking) • Contributor License Agreements (CLAs) • Material changes • Unintended patent licenses • Over-share (accidental/malicious contribution of trade secrets) • Cost and resources to support open source contributions • Contributing to “ghost towns” (orphaned projects) 28
  • 29. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Contributor License Agreement (CLA) • Typically based on the Apache Software Foundation form agreements • Two forms: individual and corporate • Usually slightly modified, but sometimes materially • Really broad license grants • Copyright • Covers the contribution and derivative works, sublicensable, perpetual • Granted to anyone who receives software from the Foundation that includes the contribution (not just the Work to which it was submitted) • Patent • Covers the contribution and the combination of the contribution and the Work to which it was submitted, irrevocable • No temporal restriction • Does contain defensive termination clause • Contributor has no control over direction of project 29
  • 30. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 30 Smaller Companies focus items: • Protect the “crown jewels” • Think about future investors / acquirers and what they would want • Beware of project scope creep • Keep in mind potential future markets • Revise policies to match company’s growth Contributing to open source projects considerations Larger companies focus items: • Review all code prior to submission • Policy should match employment agreements • Even code written outside business hours / not using Company resources? • Consider sponsorship without code submission Considerations for companies of all sizes: • Beware the Corporate CLA • Individual submissions versus corporate submissions • Beware the rogue CLA • Not all CLAs are created equal • Know your competitors • Decide whether to contribute to their projects
  • 31. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Some Takeaways 31 • It’s not as hard as it looks, but need to start somewhere • Performing a code scan is an easy way to get started • Always finds previously unknown components • Hard to undo the impact of poor practices • Don’t have to do everything we discussed • Start small, scale up as needed • Get initial list of third party components, licenses, usage
  • 32. © Synopsys, Inc. 2018 © Synopsys, Inc. 2018 Q&A 32
  • 33. This material is provided for your convenience and does not constitute legal advice or create an attorney-client relationship. Prior results do not guarantee similar outcomes. Attorney Advertising