SlideShare a Scribd company logo
OWASP
Dependency-Track
https://dependencytrack.org
Sergey Sotnikov1@epam.com
OWASP Dependency-Track Promo
2
Reduce Open Source Risk
Steve Springett
Built for DevOps – API first, API everything
OWASP Dependency-Track
Continuous Component Analysis Platform to reduce Open Source Risk (aka Software Composition Analysis)
Continuous analysis of third-party and open source components provides greater visibility on inherited risk.
It integrates with multiple vulnerability databases including the National Vulnerability Database (NVD), NPM Public Advisories, Sonatype OSS Index,
and VulnDB from Risk Based Security. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in
components that are placing your applications at risk.
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested
during CI/CD. Use of the Dependency-Track Jenkins Plugin is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such
an environment, Dependency-Track enables DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.
Bill-of-Material (BOM)
In supply-chains, a bill of material (BOM) defines and
describes the contents of what is used in the
manufacturing and packaging of the deliverable. In
software supply chains, this refers to the contents of all
components bundled with the software including, authors,
publishers, names, versions, licenses, and copyrights.
4
Dependency-Track Features
• Dashboard - Provides high-level metrics and trends on the inherited risk for all projects and components in the portfolio
• Auditing Workflow - Quickly review findings for accuracy and make analysis decisions and comments on a per-project basis, or globally
• Supply Chain Risk - Expands traditional Software Composition Analysis (SCA) by recognizing hardware/IoT as components with potential
vulnerabilities
• Vulnerability Aggregation - Native integration with multiple application risk platforms providing organizations a consolidated view of prioritized
findings
• Out-of-Date Detection - Identifies components that are not the most recent available which indirectly impact project health and risk
• API and Integration - Well documented API-first design integrates easily with other systems providing endless possibilities
• Bill of Materials - Promotes Software Transparency with support for the automatic ingestion of CycloneDX, SPDX BOM formats and Dependency-
Check XML
• Notifications - Supports notifications to Slack, Microsoft Teams, outbound webhooks (respond, create Jira tickets, etc), and email, enabling new
levels of collaboration and automation
• Vulnerability Data Sources - Mirrors data from multiple sources of vulnerability intelligence providing more coverage on a wider range of
components
• Enterprise Integrations - Supports Active Directory/LDAP authentication and multiple commercial and open source database engines
5
Dependency-Track Features
• Flexible data model supporting an unlimited number of projects and components
• Tracks vulnerabilities and inherited risk
• by component
• by project
• across entire portfolio
• Tracks usage of out-of-date components
• Supports standardized SPDX license ID’s and tracks license use by component
• Easy to read metrics for components, projects, and portfolio
• Provides a reliable mirror of the NVD data feed
• API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)
6
Dependency-Track Integrations
7
• Ingest BoM during CI/CD
• Analyzes Continuously
• Notifications on
• New vulnerability
• New vulnerable dependency
• Audit decision changes
• Outdated versions
• Monitor Activity (Slack, Teams)
• Automate response (webhooks)
• Part of organizations risk metrics
Dependency-Track Analysis Types
• Known Vulnerabilities
• National Vulnerability Database (NVD)
• NPM Public Advisories NPM Audit API
• Sonatype OSSIndex
• VulnDB (Risk Based Security)
• Outdated Components
• Ruby Gems
• Maven
• NPM
• Nuget
8
CycloneDX
CycloneDX is a lightweight software bill-of-material (BOM) specification designed for use in application security contexts and software
composition analysis (SCA).
CycloneDX was originally designed for use with OWASP Dependency-Track. Research into existing specifications such as SWID and SPDX
revealed that neither specification was robust enough for application security contexts nor did these projects meet the basic
requirements for wide-spread adoption within both enterprise build systems and the open source community.
CycloneDX incorporated SPDX license IDs as they were widely adopted and recognized within the community. Adoption for the emerging
Package URL (purl) specification was also included to provide CycloneDX a reference to the native ecosystem metadata about the
component.
https://cyclonedx.org
CycloneDX
Project Goals
• Define a vendor agnostic specification independent of language or ecosystem
• Specification should be simultaneously human and machine readable
• Specification should be simple to implement with minimal effort
• Specification should provide lightweight schema definitions for JSON and XML
• Specification should reuse parts of existing specs where beneficial
• Specification should be decentralized, authoritative, and security focused
• Specification should promote continuous component analysis
• Specification should support hardware, libraries, frameworks, applications, and operating systems
10
CycloneDX
Achievable Use Cases
• Vulnerability analysis (software and hardware)
• Outdated component analysis
• License identification and compliance
• File verification
• Track component usage and risk with optional hierarchical representation
• Generate automatically from multiple development ecosystems
• Portable, single file which can be supplied by development teams, business partners, and vendors
Coming Soon
• Document a components pedigree including ancestors, descendants, and variants, representing a components lineage from
any viewpoint
• Analyze modified open source libraries without any loss of fidelity
CycloneDX: Example BOM
12
CycloneDX: Implementations
Build plugins for a number of ecosystems have been created which support the automatic identification of all project dependencies and automatically
generate CycloneDX BOMs. The resulting BOMs may contain many of the elements above including group, name, version, description, file hashes,
license, and PackageURL. Additionally, a standalone Java API was created for the programmatic creation and validation of CycloneDX BOMs.
• CycloneDX .NET Core
• CycloneDX Node.js Module
• CycloneDX Maven Plugin
• CycloneDX Python Module
• CycloneDX Java API
• Additional build plugins are planned…
13
Package URL (purl)
Package URL was created to standardize how software package metadata is represented so that packages could universally be located regardless of
what vendor, project, or ecosystem the packages belong. Package URL conforms to RFC-3986.
The syntax of Package URL is:
• Scheme: Will always be ‘pkg’ to indicate a Package URL (required)
• Type: The package “type” or package “protocol” such as maven, npm, nuget, gem, pypi, etc. Required.
• Namespace: Some name prefix such as a Maven groupid, a Docker image owner, a GitHub user or organization. Optional and type-
specific.
• Name: The name of the package. Required.
• Version: The version of the package. Optional.
• Qualifiers: Extra qualifying data for a package such as an OS, architecture, a distro, etc. Optional and type-specific.
• Subpath: Extra subpath within a package, relative to the package root. Optional.
14
Package URL (purl)
• Decentralized URI describing component and its place within ecosystem
• Support virtually unlimited number of ecosystems
• Maven, Docker, NPM, RPM, etc.
• Identifies all relevant component metadata
• Ecosystem type (type)
• Group (namespace)
• Name
• Version
• Key/Value pairs (qualifiers)
15
CycloneDX Execution Flow
2 Steps process:
• Generate Bill of Material file (bom.xml)
• Manually, running a command
cyclonedx-bom –o bom.xml
• Use Jenkins plugin
• Example: Maven plugin
mvn -Dmaven.test.skip=true clean install org.cyclonedx:cyclonedx-maven-plugin:makeAggregateBom
• Upload bom.xml to Dependency-Track project
• From Dependency-Track front-end or
• Using Dependency-Track Jenkins plugin
16
Dependency-Track Project Dependencies
17
Dependency-Track Results in Jenkins
• Synchronous publishing mode option enabled in Dependency-Track plugin
18
Dependency-Track Analysis (Triage)
19
CycloneDX + Dependency-Track on Jenking
20
DEMO
21

More Related Content

What's hot

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
BATbern
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
Archana Joshi
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
Farouk2nd
 
eBPF - Observability In Deep
eBPF - Observability In DeepeBPF - Observability In Deep
eBPF - Observability In Deep
Mydbops
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Joel Divekar
 
DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
MohammadSaif904342
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
Matt Tesauro
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP Switzerland
Matt Tesauro
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
James Wickett
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
abhimanyubhogwan
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Spv Reddy
 
Introduction to Nexus Repository Manager.pdf
Introduction to Nexus Repository Manager.pdfIntroduction to Nexus Repository Manager.pdf
Introduction to Nexus Repository Manager.pdf
Knoldus Inc.
 
CICD Using CircleCI
CICD Using CircleCICICD Using CircleCI
CICD Using CircleCI
Knoldus Inc.
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
Amazon Web Services
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
Container Runtime Security with Falco
Container Runtime Security with FalcoContainer Runtime Security with Falco
Container Runtime Security with Falco
Michael Ducy
 
Docker and the Linux Kernel
Docker and the Linux KernelDocker and the Linux Kernel
Docker and the Linux Kernel
Docker, Inc.
 
infrastructure as code
infrastructure as codeinfrastructure as code
infrastructure as code
Amazon Web Services
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
Amazon Web Services
 

What's hot (20)

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
 
eBPF - Observability In Deep
eBPF - Observability In DeepeBPF - Observability In Deep
eBPF - Observability In Deep
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP Switzerland
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Introduction to Nexus Repository Manager.pdf
Introduction to Nexus Repository Manager.pdfIntroduction to Nexus Repository Manager.pdf
Introduction to Nexus Repository Manager.pdf
 
CICD Using CircleCI
CICD Using CircleCICICD Using CircleCI
CICD Using CircleCI
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
 
Container Runtime Security with Falco
Container Runtime Security with FalcoContainer Runtime Security with Falco
Container Runtime Security with Falco
 
Docker and the Linux Kernel
Docker and the Linux KernelDocker and the Linux Kernel
Docker and the Linux Kernel
 
infrastructure as code
infrastructure as codeinfrastructure as code
infrastructure as code
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 

Similar to OWASP Dependency-Track Introduction

Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
sparkfabrik
 
Preventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source SoftwarePreventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
Animesh Singh
 
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP EcosystemWhat is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
sparkfabrik
 
Open shift and docker - october,2014
Open shift and docker - october,2014Open shift and docker - october,2014
Open shift and docker - october,2014
Hojoong Kim
 
Continous delivvery devops Tools Technologies.pptx
Continous delivvery devops Tools  Technologies.pptxContinous delivvery devops Tools  Technologies.pptx
Continous delivvery devops Tools Technologies.pptx
projectsasd125
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
John ILIADIS
 
OSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdfOSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdf
Marcus Meissner
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
OWASP
 
12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions
Kashif Ali Siddiqui
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
All Things Open
 
Perforce on Tour 2015 - Optimising the Developer Pipeline: Deliver Faster & ...
Perforce on Tour 2015 -  Optimising the Developer Pipeline: Deliver Faster & ...Perforce on Tour 2015 -  Optimising the Developer Pipeline: Deliver Faster & ...
Perforce on Tour 2015 - Optimising the Developer Pipeline: Deliver Faster & ...
Perforce
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Emerasoft, solutions to collaborate
 
Enabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOpsEnabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOps
Josh Boyd
 
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource WebinarFind Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
WhiteSource
 
How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?
Ksenia Peguero
 
15-factor-apps.pdf
15-factor-apps.pdf15-factor-apps.pdf
15-factor-apps.pdf
Nilesh Gule
 
Analysis of-quality-of-pkgs-in-packagist-univ-20171024
Analysis of-quality-of-pkgs-in-packagist-univ-20171024Analysis of-quality-of-pkgs-in-packagist-univ-20171024
Analysis of-quality-of-pkgs-in-packagist-univ-20171024
Clark Everetts
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 

Similar to OWASP Dependency-Track Introduction (20)

Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
 
Preventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source SoftwarePreventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source Software
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
 
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP EcosystemWhat is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
 
Open shift and docker - october,2014
Open shift and docker - october,2014Open shift and docker - october,2014
Open shift and docker - october,2014
 
Continous delivvery devops Tools Technologies.pptx
Continous delivvery devops Tools  Technologies.pptxContinous delivvery devops Tools  Technologies.pptx
Continous delivvery devops Tools Technologies.pptx
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
OSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdfOSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdf
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
 
12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions12 factor app - Core Guidelines To Cloud Ready Solutions
12 factor app - Core Guidelines To Cloud Ready Solutions
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Perforce on Tour 2015 - Optimising the Developer Pipeline: Deliver Faster & ...
Perforce on Tour 2015 -  Optimising the Developer Pipeline: Deliver Faster & ...Perforce on Tour 2015 -  Optimising the Developer Pipeline: Deliver Faster & ...
Perforce on Tour 2015 - Optimising the Developer Pipeline: Deliver Faster & ...
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Enabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOpsEnabling multicloud in the enterprise with DevSecOps
Enabling multicloud in the enterprise with DevSecOps
 
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource WebinarFind Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
 
How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?
 
15-factor-apps.pdf
15-factor-apps.pdf15-factor-apps.pdf
15-factor-apps.pdf
 
Analysis of-quality-of-pkgs-in-packagist-univ-20171024
Analysis of-quality-of-pkgs-in-packagist-univ-20171024Analysis of-quality-of-pkgs-in-packagist-univ-20171024
Analysis of-quality-of-pkgs-in-packagist-univ-20171024
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 

Recently uploaded

Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
aisafed42
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 

Recently uploaded (20)

Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 

OWASP Dependency-Track Introduction

  • 2. OWASP Dependency-Track Promo 2 Reduce Open Source Risk Steve Springett Built for DevOps – API first, API everything
  • 3. OWASP Dependency-Track Continuous Component Analysis Platform to reduce Open Source Risk (aka Software Composition Analysis) Continuous analysis of third-party and open source components provides greater visibility on inherited risk. It integrates with multiple vulnerability databases including the National Vulnerability Database (NVD), NPM Public Advisories, Sonatype OSS Index, and VulnDB from Risk Based Security. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the Dependency-Track Jenkins Plugin is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.
  • 4. Bill-of-Material (BOM) In supply-chains, a bill of material (BOM) defines and describes the contents of what is used in the manufacturing and packaging of the deliverable. In software supply chains, this refers to the contents of all components bundled with the software including, authors, publishers, names, versions, licenses, and copyrights. 4
  • 5. Dependency-Track Features • Dashboard - Provides high-level metrics and trends on the inherited risk for all projects and components in the portfolio • Auditing Workflow - Quickly review findings for accuracy and make analysis decisions and comments on a per-project basis, or globally • Supply Chain Risk - Expands traditional Software Composition Analysis (SCA) by recognizing hardware/IoT as components with potential vulnerabilities • Vulnerability Aggregation - Native integration with multiple application risk platforms providing organizations a consolidated view of prioritized findings • Out-of-Date Detection - Identifies components that are not the most recent available which indirectly impact project health and risk • API and Integration - Well documented API-first design integrates easily with other systems providing endless possibilities • Bill of Materials - Promotes Software Transparency with support for the automatic ingestion of CycloneDX, SPDX BOM formats and Dependency- Check XML • Notifications - Supports notifications to Slack, Microsoft Teams, outbound webhooks (respond, create Jira tickets, etc), and email, enabling new levels of collaboration and automation • Vulnerability Data Sources - Mirrors data from multiple sources of vulnerability intelligence providing more coverage on a wider range of components • Enterprise Integrations - Supports Active Directory/LDAP authentication and multiple commercial and open source database engines 5
  • 6. Dependency-Track Features • Flexible data model supporting an unlimited number of projects and components • Tracks vulnerabilities and inherited risk • by component • by project • across entire portfolio • Tracks usage of out-of-date components • Supports standardized SPDX license ID’s and tracks license use by component • Easy to read metrics for components, projects, and portfolio • Provides a reliable mirror of the NVD data feed • API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon) 6
  • 7. Dependency-Track Integrations 7 • Ingest BoM during CI/CD • Analyzes Continuously • Notifications on • New vulnerability • New vulnerable dependency • Audit decision changes • Outdated versions • Monitor Activity (Slack, Teams) • Automate response (webhooks) • Part of organizations risk metrics
  • 8. Dependency-Track Analysis Types • Known Vulnerabilities • National Vulnerability Database (NVD) • NPM Public Advisories NPM Audit API • Sonatype OSSIndex • VulnDB (Risk Based Security) • Outdated Components • Ruby Gems • Maven • NPM • Nuget 8
  • 9. CycloneDX CycloneDX is a lightweight software bill-of-material (BOM) specification designed for use in application security contexts and software composition analysis (SCA). CycloneDX was originally designed for use with OWASP Dependency-Track. Research into existing specifications such as SWID and SPDX revealed that neither specification was robust enough for application security contexts nor did these projects meet the basic requirements for wide-spread adoption within both enterprise build systems and the open source community. CycloneDX incorporated SPDX license IDs as they were widely adopted and recognized within the community. Adoption for the emerging Package URL (purl) specification was also included to provide CycloneDX a reference to the native ecosystem metadata about the component. https://cyclonedx.org
  • 10. CycloneDX Project Goals • Define a vendor agnostic specification independent of language or ecosystem • Specification should be simultaneously human and machine readable • Specification should be simple to implement with minimal effort • Specification should provide lightweight schema definitions for JSON and XML • Specification should reuse parts of existing specs where beneficial • Specification should be decentralized, authoritative, and security focused • Specification should promote continuous component analysis • Specification should support hardware, libraries, frameworks, applications, and operating systems 10
  • 11. CycloneDX Achievable Use Cases • Vulnerability analysis (software and hardware) • Outdated component analysis • License identification and compliance • File verification • Track component usage and risk with optional hierarchical representation • Generate automatically from multiple development ecosystems • Portable, single file which can be supplied by development teams, business partners, and vendors Coming Soon • Document a components pedigree including ancestors, descendants, and variants, representing a components lineage from any viewpoint • Analyze modified open source libraries without any loss of fidelity
  • 13. CycloneDX: Implementations Build plugins for a number of ecosystems have been created which support the automatic identification of all project dependencies and automatically generate CycloneDX BOMs. The resulting BOMs may contain many of the elements above including group, name, version, description, file hashes, license, and PackageURL. Additionally, a standalone Java API was created for the programmatic creation and validation of CycloneDX BOMs. • CycloneDX .NET Core • CycloneDX Node.js Module • CycloneDX Maven Plugin • CycloneDX Python Module • CycloneDX Java API • Additional build plugins are planned… 13
  • 14. Package URL (purl) Package URL was created to standardize how software package metadata is represented so that packages could universally be located regardless of what vendor, project, or ecosystem the packages belong. Package URL conforms to RFC-3986. The syntax of Package URL is: • Scheme: Will always be ‘pkg’ to indicate a Package URL (required) • Type: The package “type” or package “protocol” such as maven, npm, nuget, gem, pypi, etc. Required. • Namespace: Some name prefix such as a Maven groupid, a Docker image owner, a GitHub user or organization. Optional and type- specific. • Name: The name of the package. Required. • Version: The version of the package. Optional. • Qualifiers: Extra qualifying data for a package such as an OS, architecture, a distro, etc. Optional and type-specific. • Subpath: Extra subpath within a package, relative to the package root. Optional. 14
  • 15. Package URL (purl) • Decentralized URI describing component and its place within ecosystem • Support virtually unlimited number of ecosystems • Maven, Docker, NPM, RPM, etc. • Identifies all relevant component metadata • Ecosystem type (type) • Group (namespace) • Name • Version • Key/Value pairs (qualifiers) 15
  • 16. CycloneDX Execution Flow 2 Steps process: • Generate Bill of Material file (bom.xml) • Manually, running a command cyclonedx-bom –o bom.xml • Use Jenkins plugin • Example: Maven plugin mvn -Dmaven.test.skip=true clean install org.cyclonedx:cyclonedx-maven-plugin:makeAggregateBom • Upload bom.xml to Dependency-Track project • From Dependency-Track front-end or • Using Dependency-Track Jenkins plugin 16
  • 18. Dependency-Track Results in Jenkins • Synchronous publishing mode option enabled in Dependency-Track plugin 18