SlideShare a Scribd company logo
7 Reasons Your Applications are 
Attractive to Adversaries 
2014 Fall Cyber Security Forum and Expo 
Robins Air Force Base 
November 18, 2014 
1
2 3/19/14 
Modern software development 
HAS CHANGED 
Application security 
HASN’T CHANGED 
ENOUGH
3 3/19/14 
APPLICATIONS 
are assembled using 
third party “components,” 
most of which are open source 
In fact,90% 
of a typical application 
is open source 
Source: Sonatype, Inc. analysis based on Application Healthchecks used to determine component risk 
in applications.
1 
AS OPEN SOURCE USAGE EXPANDS, 
SO DOES OUR SHARED RISK
Open source usage is 
EXPLODING 
Yesterday’s source 
code is now replaced with 
OPEN SOURCE 
components 
2007 2008 2009 2010 2011 2012 2013 
500M 1B 2B 4B 6B 8B 13B 
5 Source: Sonatype, Inc. analysis of (Maven) Central Repository component requests.
OPEN SOURCE: 
PRODUCTIVITY 
INNOVATION 
SPEED 
6
7 
OPEN SOURCE: 
HACKER TARGETS 
NO VISIBILITY 
NO CONTROL
2 
SMALL EFFORT AND BIG GAINS
9 
Now that software is 
ASSEMBLED… 
Our shared value becomes 
our shared attack surface
One risky component, 
now affects thousands of victims 
ONE EASY 
TARGET 
10
3 
YOU USE A SOFTWARE SUPPLY CHAIN.
Use of components creates a 
SOFTWARE 
SUPPLY CHAIN 
Component 
Selection 
DEVELOPMENT BUILD AND DEPLOY PRODUCTION 
COMPONENT 
SELECTION 
12
13 
If you’re not using secure 
COMPONENTS 
you’re not building secure 
APPLICATIONS 
Component 
Selection 
DEVELOPMENT BUILD AND DEPLOY PRODUCTION 
COMPONENT 
SELECTION
Component 
Selection 
DEVELOPMENT BUILD AND DEPLOY PRODUCTION 
COMPONENT 
SELECTION 
Today’s security 
ISN’T 
WORKING 
58m 
vulnerable 
components 
downloaded 
! 
71% 
of apps 
have 1+ 
critical or 
severe 
vulnerability 
! 
90% 
of 
repositories 
have 1+ 
critical 
vulnerability 
! 
14 Source: Sonatype, Inc. analysis based on Repository Healthchecks and Application Healthchecks used 
to determine component risk in repositories and applications.
Components are like 
MOLECULES not atoms. 
There are massive dependencies. 
Diversity 
• 40,000 Projects 
• 200M Classes 
• 400K Components 
Complexity 
One component may 
rely on 100s of others 
Volume 
Typical enterprise 
consumes 1,000s of 
components monthly 
Change 
Typical component is 
updated 4X per year 
15 Source: Sonatype, Inc. analysis of (Maven) Central Repository.
4 
SECURITY BUDGETS ARE 
OUT OF SYNC WITH 
RISK AND REALITY
#1 ATTACK VECTOR LEADING TO BREACH
APPSEC GETS LEAST SPEND, YET MOST BREACHES 
spending 
18 
attack risk 
People Security ~$4B 
Data Security ~$5B 
Host Security ~$10B 
Network Security ~$20B 
Written code ~10% 
Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary 
Software 
Security 
~$0.5B 
~90% 
Open source 
components 
Most breached
Source: 2014 Sonatype Open Source Development and Application Security Survey 
1-IN-10 
had or suspected an 
open source related breach
5 
MANUAL POLICIES JUST DON’T WORK 
IN A SECURE DEVELOPMENT LIFECYCLE.
CHANGE 
Typical component is 
updated 4X per year. 
21 
795,220 OSS COMPONENTS 
11 MILLION DEVELOPERS 
Source: Components: (Maven) Central Repository; Users: IDC
CHANGE 
Typical component is 
updated 4X per year. 
22 
Unlike COTS, there is no clear, effective 
COMMUNICATION 
channel 
795,220 OSS COMPONENTS 
11 MILLION DEVELOPERS 
• Has a risk been identified? 
• What type of risk? 
• Is a better version available?
Manual processes 
DON’T WORK 
Automation should 
ENFORCE 
POLICIES 
Humans should 
manage exceptions 
23
Bouncy 
Castle 
CVE Date: 
11/10/2007 
Java Cryptography API 
CVSS v2 Base Score: 
10.0 HIGH 
Exploitability: 
10.0 
Since then 
11,236 organizations 
downloaded it 
214,484 times 
HttpClient 
CVE Date: 
11/04/2012 
Java HTTP implementation 
CVSS v2 Base Score: 
5.8 MEDIUM 
Exploitability: 
8.6 
Since then 
29,468 
organizations 
downloaded it 
3,749,193 times 
Apache 
Struts 2 
CVE Date: 
07/20/2013 
Web application framework 
CVSS v2 Base Score: 
9.3 HIGH 
Exploitability: 
10 
Since then 
4,076 
organizations 
downloaded it 
179,050 times 
24 Source: Sonatype, Inc. analysis of (Maven) Central downloads and NIST National Vulnerability Database
To reduce cost 
per defect 
! 
To achieve 
compliance 
! 
WHY 
is this important? 
To manage 
risk 
HttpClient 
Struts 
Bouncy 
Castle 
! 
25
What are you doing to ADDRESS THIS RISK? 
26
FOSS Review Board 
Scans post 
development 
Golden repository 
Approval workflow 
27
Time for a 
FRESH APPROACH? 
28 
Sonatype Component Lifecycle Management (CLM) 
• Precisely identify component 
and risks 
• Remediate early in development 
• Automate policy across the SLC 
• Manage risk with 
consolidated dashboard 
• Continuously monitor apps 
for new risks
Time for a 
FRESH APPROACH? 
29 
FOR ALL… 
COMPONENTS LANGUAGES < > REPOSITORIES DEV TOOLS 
Java Java Central 
NuGet .NET, C# NuGet Gallery 
NPM Javascript NPMJS.org 
Gems Ruby, jRuby Jruby.org 
Debian APT, OS - 
RPM RPM, Yum OS RedHat 
PyPi Python Pypi.python.org 
Cpan Perl Cpan.org 
Hudson 
Jenkins 
Eclipse 
Microsoft 
Bamboo 
IntelliJ 
Oracle 
Rundeck 
Electric Cloud
Time for a 
FRESH APPROACH? 
CURRENT METHODS SONATYPE CLM 
Problem discovery Problem remediation 
“Scan and scold” 
Source code scanning 
Approval-centric workflow 
Empower developers 
Component analysis 
Automated policy across lifecycle 
Policy enforcement throughout SLC 
Scans after development 
30
6 
EMPOWER YOUR DEVELOPERS 
ON THE FRONT LINE
How can we choose the best components 
FROM THE START? 
Analyze all components 
from within your IDE 
License, Security and Architecture data for each 
component, evaluated against your policy 
Shift Left= ZTTR (Zero Time to Remediation) 
@451wendy @joshcorman
How can we choose the best components 
FROM THE START? 
Analyze all components 
from within your IDE 
Single click migration 
speeds remediation 
33
7 
AGILE DEVELOPMENT REQUIRES 
AGILE SECURITY.
Defense in DEPTH and BREADTH 
Continuously monitor 
Bill of Materials for 
future violations 
Stage-appropriate 
actions govern the 
software lifecycle 
35 
Apply policies easily to 
groups of similar 
applications
KNOW and TRACK your components 
Get a precise, instant 
inventory of all open 
source components 
36 
Identify where every 
component lives
QUICKLY identify threats and manage enterprise RISK 
Prioritize fixes by 
risk and location 
37
38 
Never has anything 
with this much 
IMPACT 
been this 
EASY … 
It’s time to take 
ACTION 
Why? Because it is 
IMPERATIVE 
It’s FAST. It’s NOT EXPENSIVE. 
There is no possible down-side. 
5 
MINUTES
39 
in 
5 MINUTES 
accomplish these 
3 CRITICAL 
STEPS 
5 
MINUTES
40 
Download the 
APP 
HEALTH 
CHECK 
STEP 1 
5 
MINUTES 
http://bit.ly/AHC_USAF
41 
Discover the security, 
license and quality 
RISK LEVELS 
in each application 
STEP 2 
5 
MINUTES 
http://bit.ly/AHC_USAF
42 
See 
EVERY 
COMPONENT 
used in your applications 
STEP 3 
5 
MINUTES 
http://bit.ly/AHC_USAF
43 
See 
OZONE 
WIDGET 
FRAMEWORK 
http://bit.ly/AHC_USAF
44 
The 
DISTRIBUTED 
DATA 
FRAMEWORK 
http://bit.ly/AHC_USAF
LET’S GET STARTED 
5 
MINUTES 
http://bit.ly/AHC_USAF

More Related Content

What's hot

WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource Webinar What's New With WhiteSource in December 2018WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource Webinar What's New With WhiteSource in December 2018WhiteSource
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP LondonJeff Williams
 
Application Security in the Age of Open Source
Application Security in the Age of Open SourceApplication Security in the Age of Open Source
Application Security in the Age of Open SourceBlack Duck by Synopsys
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open SourceShane Coughlan
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Jeff Williams
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
 
Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge WhiteSource
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh ShregillAgileNetwork
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsSonatype
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOpsArchana Joshi
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilitySonatype
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon
 

What's hot (20)

WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource Webinar What's New With WhiteSource in December 2018WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource Webinar What's New With WhiteSource in December 2018
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London
 
Application Security in the Age of Open Source
Application Security in the Age of Open SourceApplication Security in the Age of Open Source
Application Security in the Age of Open Source
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open Source
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge Open Source Security at Scale- The DevOps Challenge 
Open Source Security at Scale- The DevOps Challenge 
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
 

Viewers also liked

Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Derek E. Weeks
 
Upping the Ante -- ECM Meets BPM
Upping the Ante -- ECM Meets BPMUpping the Ante -- ECM Meets BPM
Upping the Ante -- ECM Meets BPMDerek E. Weeks
 
Share Point Business Process Maturity
Share Point Business Process MaturityShare Point Business Process Maturity
Share Point Business Process MaturityDerek E. Weeks
 
La biblia preguntas sobre semana santa
La biblia preguntas sobre semana santaLa biblia preguntas sobre semana santa
La biblia preguntas sobre semana santaJulio Chuquipoma
 

Viewers also liked (6)

Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011
 
Upping the Ante -- ECM Meets BPM
Upping the Ante -- ECM Meets BPMUpping the Ante -- ECM Meets BPM
Upping the Ante -- ECM Meets BPM
 
Share Point Business Process Maturity
Share Point Business Process MaturityShare Point Business Process Maturity
Share Point Business Process Maturity
 
Juan el bautista
Juan el bautistaJuan el bautista
Juan el bautista
 
La biblia preguntas sobre semana santa
La biblia preguntas sobre semana santaLa biblia preguntas sobre semana santa
La biblia preguntas sobre semana santa
 
El Juego de la Pasión
El Juego de la PasiónEl Juego de la Pasión
El Juego de la Pasión
 

Similar to 7 Reasons Your Applications are Attractive to Adversaries

Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSonatype
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsBlack Duck by Synopsys
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdfVishwas N
 
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Sonatype
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
The Illusion of Control: Seven Deadly Wastes in Your Devops PracticeThe Illusion of Control: Seven Deadly Wastes in Your Devops Practice
The Illusion of Control: Seven Deadly Wastes in Your Devops Practicematthewabq
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015Minded Security
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
 

Similar to 7 Reasons Your Applications are Attractive to Adversaries (20)

Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software Development
 
Aliens in Your Apps!
Aliens in Your Apps!Aliens in Your Apps!
Aliens in Your Apps!
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdf
 
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
The Illusion of Control: Seven Deadly Wastes in Your Devops PracticeThe Illusion of Control: Seven Deadly Wastes in Your Devops Practice
The Illusion of Control: Seven Deadly Wastes in Your Devops Practice
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

7 Reasons Your Applications are Attractive to Adversaries

  • 1. 7 Reasons Your Applications are Attractive to Adversaries 2014 Fall Cyber Security Forum and Expo Robins Air Force Base November 18, 2014 1
  • 2. 2 3/19/14 Modern software development HAS CHANGED Application security HASN’T CHANGED ENOUGH
  • 3. 3 3/19/14 APPLICATIONS are assembled using third party “components,” most of which are open source In fact,90% of a typical application is open source Source: Sonatype, Inc. analysis based on Application Healthchecks used to determine component risk in applications.
  • 4. 1 AS OPEN SOURCE USAGE EXPANDS, SO DOES OUR SHARED RISK
  • 5. Open source usage is EXPLODING Yesterday’s source code is now replaced with OPEN SOURCE components 2007 2008 2009 2010 2011 2012 2013 500M 1B 2B 4B 6B 8B 13B 5 Source: Sonatype, Inc. analysis of (Maven) Central Repository component requests.
  • 6. OPEN SOURCE: PRODUCTIVITY INNOVATION SPEED 6
  • 7. 7 OPEN SOURCE: HACKER TARGETS NO VISIBILITY NO CONTROL
  • 8. 2 SMALL EFFORT AND BIG GAINS
  • 9. 9 Now that software is ASSEMBLED… Our shared value becomes our shared attack surface
  • 10. One risky component, now affects thousands of victims ONE EASY TARGET 10
  • 11. 3 YOU USE A SOFTWARE SUPPLY CHAIN.
  • 12. Use of components creates a SOFTWARE SUPPLY CHAIN Component Selection DEVELOPMENT BUILD AND DEPLOY PRODUCTION COMPONENT SELECTION 12
  • 13. 13 If you’re not using secure COMPONENTS you’re not building secure APPLICATIONS Component Selection DEVELOPMENT BUILD AND DEPLOY PRODUCTION COMPONENT SELECTION
  • 14. Component Selection DEVELOPMENT BUILD AND DEPLOY PRODUCTION COMPONENT SELECTION Today’s security ISN’T WORKING 58m vulnerable components downloaded ! 71% of apps have 1+ critical or severe vulnerability ! 90% of repositories have 1+ critical vulnerability ! 14 Source: Sonatype, Inc. analysis based on Repository Healthchecks and Application Healthchecks used to determine component risk in repositories and applications.
  • 15. Components are like MOLECULES not atoms. There are massive dependencies. Diversity • 40,000 Projects • 200M Classes • 400K Components Complexity One component may rely on 100s of others Volume Typical enterprise consumes 1,000s of components monthly Change Typical component is updated 4X per year 15 Source: Sonatype, Inc. analysis of (Maven) Central Repository.
  • 16. 4 SECURITY BUDGETS ARE OUT OF SYNC WITH RISK AND REALITY
  • 17. #1 ATTACK VECTOR LEADING TO BREACH
  • 18. APPSEC GETS LEAST SPEND, YET MOST BREACHES spending 18 attack risk People Security ~$4B Data Security ~$5B Host Security ~$10B Network Security ~$20B Written code ~10% Source: Normalized spending numbers from IDC, Gartner, The 451 Group ; since groupings vary Software Security ~$0.5B ~90% Open source components Most breached
  • 19. Source: 2014 Sonatype Open Source Development and Application Security Survey 1-IN-10 had or suspected an open source related breach
  • 20. 5 MANUAL POLICIES JUST DON’T WORK IN A SECURE DEVELOPMENT LIFECYCLE.
  • 21. CHANGE Typical component is updated 4X per year. 21 795,220 OSS COMPONENTS 11 MILLION DEVELOPERS Source: Components: (Maven) Central Repository; Users: IDC
  • 22. CHANGE Typical component is updated 4X per year. 22 Unlike COTS, there is no clear, effective COMMUNICATION channel 795,220 OSS COMPONENTS 11 MILLION DEVELOPERS • Has a risk been identified? • What type of risk? • Is a better version available?
  • 23. Manual processes DON’T WORK Automation should ENFORCE POLICIES Humans should manage exceptions 23
  • 24. Bouncy Castle CVE Date: 11/10/2007 Java Cryptography API CVSS v2 Base Score: 10.0 HIGH Exploitability: 10.0 Since then 11,236 organizations downloaded it 214,484 times HttpClient CVE Date: 11/04/2012 Java HTTP implementation CVSS v2 Base Score: 5.8 MEDIUM Exploitability: 8.6 Since then 29,468 organizations downloaded it 3,749,193 times Apache Struts 2 CVE Date: 07/20/2013 Web application framework CVSS v2 Base Score: 9.3 HIGH Exploitability: 10 Since then 4,076 organizations downloaded it 179,050 times 24 Source: Sonatype, Inc. analysis of (Maven) Central downloads and NIST National Vulnerability Database
  • 25. To reduce cost per defect ! To achieve compliance ! WHY is this important? To manage risk HttpClient Struts Bouncy Castle ! 25
  • 26. What are you doing to ADDRESS THIS RISK? 26
  • 27. FOSS Review Board Scans post development Golden repository Approval workflow 27
  • 28. Time for a FRESH APPROACH? 28 Sonatype Component Lifecycle Management (CLM) • Precisely identify component and risks • Remediate early in development • Automate policy across the SLC • Manage risk with consolidated dashboard • Continuously monitor apps for new risks
  • 29. Time for a FRESH APPROACH? 29 FOR ALL… COMPONENTS LANGUAGES < > REPOSITORIES DEV TOOLS Java Java Central NuGet .NET, C# NuGet Gallery NPM Javascript NPMJS.org Gems Ruby, jRuby Jruby.org Debian APT, OS - RPM RPM, Yum OS RedHat PyPi Python Pypi.python.org Cpan Perl Cpan.org Hudson Jenkins Eclipse Microsoft Bamboo IntelliJ Oracle Rundeck Electric Cloud
  • 30. Time for a FRESH APPROACH? CURRENT METHODS SONATYPE CLM Problem discovery Problem remediation “Scan and scold” Source code scanning Approval-centric workflow Empower developers Component analysis Automated policy across lifecycle Policy enforcement throughout SLC Scans after development 30
  • 31. 6 EMPOWER YOUR DEVELOPERS ON THE FRONT LINE
  • 32. How can we choose the best components FROM THE START? Analyze all components from within your IDE License, Security and Architecture data for each component, evaluated against your policy Shift Left= ZTTR (Zero Time to Remediation) @451wendy @joshcorman
  • 33. How can we choose the best components FROM THE START? Analyze all components from within your IDE Single click migration speeds remediation 33
  • 34. 7 AGILE DEVELOPMENT REQUIRES AGILE SECURITY.
  • 35. Defense in DEPTH and BREADTH Continuously monitor Bill of Materials for future violations Stage-appropriate actions govern the software lifecycle 35 Apply policies easily to groups of similar applications
  • 36. KNOW and TRACK your components Get a precise, instant inventory of all open source components 36 Identify where every component lives
  • 37. QUICKLY identify threats and manage enterprise RISK Prioritize fixes by risk and location 37
  • 38. 38 Never has anything with this much IMPACT been this EASY … It’s time to take ACTION Why? Because it is IMPERATIVE It’s FAST. It’s NOT EXPENSIVE. There is no possible down-side. 5 MINUTES
  • 39. 39 in 5 MINUTES accomplish these 3 CRITICAL STEPS 5 MINUTES
  • 40. 40 Download the APP HEALTH CHECK STEP 1 5 MINUTES http://bit.ly/AHC_USAF
  • 41. 41 Discover the security, license and quality RISK LEVELS in each application STEP 2 5 MINUTES http://bit.ly/AHC_USAF
  • 42. 42 See EVERY COMPONENT used in your applications STEP 3 5 MINUTES http://bit.ly/AHC_USAF
  • 43. 43 See OZONE WIDGET FRAMEWORK http://bit.ly/AHC_USAF
  • 44. 44 The DISTRIBUTED DATA FRAMEWORK http://bit.ly/AHC_USAF
  • 45. LET’S GET STARTED 5 MINUTES http://bit.ly/AHC_USAF

Editor's Notes

  1. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  2. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  3. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  4. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  5. Open source is absolutely essential There are a lot of huge benefits… and we are huge advocates. Sonatype software is built largely using open source. However one of the myths of open source is that, since it is used by so many organizations, it has been thoroughly tested and is safe. But there is another side of this story…
  6. Open source means open access. It is community driven and community supported. Without better open source management and visibility, vulnerable components are used even when newer, safer versions have been released. Worse yet, since components are shared among thousands of organizations, components are attractive to your adversaries. They hack one component and impact thousands of companies at once.
  7. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  8. From an attacker eye view… Source code at Bank XYZ Only that bank Our shared value becomes our shared attack surface
  9. …if an attacker finds a flaw in Struts… it can attack EVERY bank who uses it – which is most of them. Same reason Heartbleed was so far reaching … shared dependence == shared risk/attack surface As Dan Geer, CISO at In-Q-Tel, once mentioned, where there is enough prey, there will be predators
  10. Think like an attacker ----- Meeting Notes (11/16/14 16:24) ----- 8min
  11. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  12. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  13. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  14. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  15. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  16. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  17. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials
  18. Open source risk, Open source security, Open source management, Open source governance, Open source policy, Software supply chain management, Repository management, Component Lifecycle Management, OSS logistics, Software Bill of Materials