SlideShare uma empresa Scribd logo
1 de 29
© 2019 Synopsys, Inc.1
2019 Open Source Risk Analysis Report
Open Source Risks Persist—But They Can Be Managed
Tim Mackey, Principle Security Strategist, Synopsys Cybersecurity Research Center
May 2019
© 2019 Synopsys, Inc.2
Agenda
1. Background—overview of open source
2. Understanding the data source for the report
3. Report analysis
4. Conclusions
© 2019 Synopsys, Inc.3
Synopsys Cybersecurity Research Center (CyRC)
• Showcase Synopsys’ culture of innovation
• Promotes core investments in AppSec programs
• Deliver tier one reports covering AppSec trends
• Support community development efforts
• Teams located in Belfast, Bloomington, Boston and Oulu Finland
© 2019 Synopsys, Inc.4
Synopsys CyRC – Mission
Advance the state of software security through
research, innovation, and evangelism to empower
security and development organizations with
insights and guidance that addresses the
identification, severity, exploitation, mitigation, and
defense against software vulnerabilities.
© 2019 Synopsys, Inc.5
Background—Overview of Open Source
Understanding why open source development and governance matters
© 2019 Synopsys, Inc.6
Modern application
=
Proprietary code
+
Open source components
+
API usage
+
Application
behavior and configuration
© 2019 Synopsys, Inc.7
Equifax breach focused attention on open source
© 2019 Synopsys, Inc.8
So what is “Open Source” anyway?
• Open Source Initiative Definition
– Open Source software is software that can be freely accessed, used, changed, and shared (in
modified or unmodified form) by anyone. Open source software is made by many people, and
distributed under licenses that comply with the Open Source Definition.
• Common Definition
– Open source software is software whose source code I have access to outside of a commercial
license agreement.
• What about commercial software?
– Commercial software can easily be created from open source components. Managing and securing
open source software is complicated, and open source within commercial software is even more so.
Note – Lots of legal nuance here so don’t take this as legal advice!
Obligations trigger when software is distributed or “ships”
There is no single open source vendor
© 2018 Synopsys, Inc.9
© 2019 Synopsys, Inc.10
Open source components are third-party components
© 2019 Synopsys, Inc.11
Example: complexity of OpenSSL
© 2019 Synopsys, Inc.12
Understanding the data source
© 2019 Synopsys, Inc.13
Billions are spent each year on tech acquisitions
Annual worldwide tech and telecom deal flow
Source: 451 Research's MSA KnowledgeBase.
Includes disclosed and estimated values
$573B
acquisitions in 2018
68%
growth from 2017 to 2018
Top 5 industries
software
© 2019 Synopsys, Inc.14
Tech due diligence often requires a trusted third party
Product / strategy
People
Process / tools
Architecture
Code
Acquirer DD team
or
Strategy consultant
Third-party audit:
Acquirers do not
typically get access
without a third party
Subjective
and qualitative
Objective
and quantitative
© 2019 Synopsys, Inc.15
Black Duck Audit Services supports tech due diligence
Three dimensions of risk in software acquisitions
1 Legal risk 2 Security risk 3 Quality risk
© 2019 Synopsys, Inc.16
Over 1200 codebases across all industries
Industry Distribution
Enterprise Software/SaaS 23%
Healthcare, Health Tech, Life Sciences 11%
Financial Services & FinTech 10%
Big Data, AI, BI, Machine Learning 9%
Retail & E-Commerce 7%
Aerospace, Aviation, Automotive, Transportation, Logistics 6%
Internet & Software Infrastructure 5%
Internet of Things 5%
Telecommunications & Wireless 4%
Cybersecurity 3%
Virtual Reality, Gaming, Entertainment, Media 3%
Manufacturing, Industrials, Robotics 3%
Internet and Mobile Apps 3%
Marketing Tech 2%
EdTech 2%
Computer Hardware & Semiconductors 2%
Energy & CleanTech 1%
© 2019 Synopsys, Inc.17
Key Report Analysis
© 2019 Synopsys, Inc.18
Declines reflective of
codebase variance
and feature diversity
Open source powers modern applications
Codebases with at least one open source component
© 2019 Synopsys, Inc.19
Open source is a strong foundation for innovation
Percentage of codebase which is open source
Average
open source
Codebases contained
open source
© 2019 Synopsys, Inc.20
Open source license compliance remains critical
Percentage of codebases with license conflicts
Contained
components with
license conflicts
Contained some
form of GPL conflict
© 2019 Synopsys, Inc.21
Indeterminate licenses are particularly challenging
Contained custom licenses
that had the potential to
cause conflict or needed
legal review
Contained components
that were “not licensed”
© 2019 Synopsys, Inc.22
Open source is all about responsible shared re-use
Percentage of code bases with common components
Contained components
that were more than four
years out-of-date or had
no development activity
in the last two years
© 2019 Synopsys, Inc.23
Open source requires a different approach to security
Contained
vulnerabilities
Contained
vulnerabilities
over 10 years old
© 2019 Synopsys, Inc.24
Vulnerability impact: Jackson-databind
Functionality
Provides a serialization/deserialization routine to bind data to Java objects
Core issue
Jackson-databind 2.7.0 and later implements a dynamic polymorphic binding model
for certain class types. Exploitation of the vulnerability could result in remote code execution.
Mitigation
Use an explicit polymorphic binding model with @JsonTypeInfo
Why multiple CVEs?
Each CVE addressed different class types. The final CVE refactored the implementation providing
support for full class paths
CVE-2018-7489, CVE-2017-7525 and CVE-2017-15095
© 2019 Synopsys, Inc.25
Impact of CVE-2000-0388
Reporting date
May 9, 1990
Impact
A buffer overflow when processing the TERMCAP environment variable in FreeBSD 3.4
and prior could result in a local exploit resulting in privilege escalation
Mitigation
Update the FreeBSD operating environment to a modern version
A vulnerability older than many developers, and found within the 2018 OSSRA dataset
© 2019 Synopsys, Inc.26
Improvements are being made
Open source
usage up 5%
Unpatched vulnerabilities
decline 23%
increase in components used
to 298 per codebase16%
most popular open source licenses
covered 98% of codebases20
Open source license conflicts
decreased in most industries
© 2019 Synopsys, Inc.27
Awareness key to future improvement
• Rule #1 – You can’t patch what you don’t know you have
– Patches must match source, so know your code’s origin
• Open source isn’t only about source, but about shared re-use
– Binary repositories simplify coding but exacerbate security
• There is no vendor known as “open source”
Contained obsolete or
unmaintained components
Components
per codebase
257
298
© 2019 Synopsys, Inc.28
Key takeaways
Open source usage is key to modern applications
• Create a robust strategy to benefit from it
• Train all development and operations teams to identify critical components
Engage with open source communities
• Awareness of new features, critical issues and patches occurs at the community level
• Foster a sense of engagement and shared ownership within your development teams
Open source governance starts with developers
• Train all developers to understand the license implications of the component selections
• Ensure that when a component version is cached for future use that it’s patched regularly
© 2019 Synopsys, Inc.29
Build secure, high-quality software faster

Mais conteúdo relacionado

Mais procurados

Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 

Mais procurados (20)

Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 

Semelhante a Webinar–2019 Open Source Risk Analysis Report

Semelhante a Webinar–2019 Open Source Risk Analysis Report (20)

Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Why open source is good for your economy
Why open source is good for your economyWhy open source is good for your economy
Why open source is good for your economy
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
Nokia Keynote presentation at OW2con'19, June 12-13, 2019, Paris
Nokia Keynote presentation at OW2con'19, June 12-13, 2019, ParisNokia Keynote presentation at OW2con'19, June 12-13, 2019, Paris
Nokia Keynote presentation at OW2con'19, June 12-13, 2019, Paris
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Analyst Resources for Chief Information Security Officers (CISOs)
Analyst Resources for Chief Information Security Officers (CISOs)Analyst Resources for Chief Information Security Officers (CISOs)
Analyst Resources for Chief Information Security Officers (CISOs)
 
Open source code
Open source codeOpen source code
Open source code
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
 
Software Change estimation
Software Change estimationSoftware Change estimation
Software Change estimation
 
MIPI DevCon 2020 | State of the Alliance
MIPI DevCon 2020 | State of the AllianceMIPI DevCon 2020 | State of the Alliance
MIPI DevCon 2020 | State of the Alliance
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 

Mais de Synopsys Software Integrity Group

Mais de Synopsys Software Integrity Group (14)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 

Último

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Último (20)

Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

Webinar–2019 Open Source Risk Analysis Report

  • 1. © 2019 Synopsys, Inc.1 2019 Open Source Risk Analysis Report Open Source Risks Persist—But They Can Be Managed Tim Mackey, Principle Security Strategist, Synopsys Cybersecurity Research Center May 2019
  • 2. © 2019 Synopsys, Inc.2 Agenda 1. Background—overview of open source 2. Understanding the data source for the report 3. Report analysis 4. Conclusions
  • 3. © 2019 Synopsys, Inc.3 Synopsys Cybersecurity Research Center (CyRC) • Showcase Synopsys’ culture of innovation • Promotes core investments in AppSec programs • Deliver tier one reports covering AppSec trends • Support community development efforts • Teams located in Belfast, Bloomington, Boston and Oulu Finland
  • 4. © 2019 Synopsys, Inc.4 Synopsys CyRC – Mission Advance the state of software security through research, innovation, and evangelism to empower security and development organizations with insights and guidance that addresses the identification, severity, exploitation, mitigation, and defense against software vulnerabilities.
  • 5. © 2019 Synopsys, Inc.5 Background—Overview of Open Source Understanding why open source development and governance matters
  • 6. © 2019 Synopsys, Inc.6 Modern application = Proprietary code + Open source components + API usage + Application behavior and configuration
  • 7. © 2019 Synopsys, Inc.7 Equifax breach focused attention on open source
  • 8. © 2019 Synopsys, Inc.8 So what is “Open Source” anyway? • Open Source Initiative Definition – Open Source software is software that can be freely accessed, used, changed, and shared (in modified or unmodified form) by anyone. Open source software is made by many people, and distributed under licenses that comply with the Open Source Definition. • Common Definition – Open source software is software whose source code I have access to outside of a commercial license agreement. • What about commercial software? – Commercial software can easily be created from open source components. Managing and securing open source software is complicated, and open source within commercial software is even more so. Note – Lots of legal nuance here so don’t take this as legal advice!
  • 9. Obligations trigger when software is distributed or “ships” There is no single open source vendor © 2018 Synopsys, Inc.9
  • 10. © 2019 Synopsys, Inc.10 Open source components are third-party components
  • 11. © 2019 Synopsys, Inc.11 Example: complexity of OpenSSL
  • 12. © 2019 Synopsys, Inc.12 Understanding the data source
  • 13. © 2019 Synopsys, Inc.13 Billions are spent each year on tech acquisitions Annual worldwide tech and telecom deal flow Source: 451 Research's MSA KnowledgeBase. Includes disclosed and estimated values $573B acquisitions in 2018 68% growth from 2017 to 2018 Top 5 industries software
  • 14. © 2019 Synopsys, Inc.14 Tech due diligence often requires a trusted third party Product / strategy People Process / tools Architecture Code Acquirer DD team or Strategy consultant Third-party audit: Acquirers do not typically get access without a third party Subjective and qualitative Objective and quantitative
  • 15. © 2019 Synopsys, Inc.15 Black Duck Audit Services supports tech due diligence Three dimensions of risk in software acquisitions 1 Legal risk 2 Security risk 3 Quality risk
  • 16. © 2019 Synopsys, Inc.16 Over 1200 codebases across all industries Industry Distribution Enterprise Software/SaaS 23% Healthcare, Health Tech, Life Sciences 11% Financial Services & FinTech 10% Big Data, AI, BI, Machine Learning 9% Retail & E-Commerce 7% Aerospace, Aviation, Automotive, Transportation, Logistics 6% Internet & Software Infrastructure 5% Internet of Things 5% Telecommunications & Wireless 4% Cybersecurity 3% Virtual Reality, Gaming, Entertainment, Media 3% Manufacturing, Industrials, Robotics 3% Internet and Mobile Apps 3% Marketing Tech 2% EdTech 2% Computer Hardware & Semiconductors 2% Energy & CleanTech 1%
  • 17. © 2019 Synopsys, Inc.17 Key Report Analysis
  • 18. © 2019 Synopsys, Inc.18 Declines reflective of codebase variance and feature diversity Open source powers modern applications Codebases with at least one open source component
  • 19. © 2019 Synopsys, Inc.19 Open source is a strong foundation for innovation Percentage of codebase which is open source Average open source Codebases contained open source
  • 20. © 2019 Synopsys, Inc.20 Open source license compliance remains critical Percentage of codebases with license conflicts Contained components with license conflicts Contained some form of GPL conflict
  • 21. © 2019 Synopsys, Inc.21 Indeterminate licenses are particularly challenging Contained custom licenses that had the potential to cause conflict or needed legal review Contained components that were “not licensed”
  • 22. © 2019 Synopsys, Inc.22 Open source is all about responsible shared re-use Percentage of code bases with common components Contained components that were more than four years out-of-date or had no development activity in the last two years
  • 23. © 2019 Synopsys, Inc.23 Open source requires a different approach to security Contained vulnerabilities Contained vulnerabilities over 10 years old
  • 24. © 2019 Synopsys, Inc.24 Vulnerability impact: Jackson-databind Functionality Provides a serialization/deserialization routine to bind data to Java objects Core issue Jackson-databind 2.7.0 and later implements a dynamic polymorphic binding model for certain class types. Exploitation of the vulnerability could result in remote code execution. Mitigation Use an explicit polymorphic binding model with @JsonTypeInfo Why multiple CVEs? Each CVE addressed different class types. The final CVE refactored the implementation providing support for full class paths CVE-2018-7489, CVE-2017-7525 and CVE-2017-15095
  • 25. © 2019 Synopsys, Inc.25 Impact of CVE-2000-0388 Reporting date May 9, 1990 Impact A buffer overflow when processing the TERMCAP environment variable in FreeBSD 3.4 and prior could result in a local exploit resulting in privilege escalation Mitigation Update the FreeBSD operating environment to a modern version A vulnerability older than many developers, and found within the 2018 OSSRA dataset
  • 26. © 2019 Synopsys, Inc.26 Improvements are being made Open source usage up 5% Unpatched vulnerabilities decline 23% increase in components used to 298 per codebase16% most popular open source licenses covered 98% of codebases20 Open source license conflicts decreased in most industries
  • 27. © 2019 Synopsys, Inc.27 Awareness key to future improvement • Rule #1 – You can’t patch what you don’t know you have – Patches must match source, so know your code’s origin • Open source isn’t only about source, but about shared re-use – Binary repositories simplify coding but exacerbate security • There is no vendor known as “open source” Contained obsolete or unmaintained components Components per codebase 257 298
  • 28. © 2019 Synopsys, Inc.28 Key takeaways Open source usage is key to modern applications • Create a robust strategy to benefit from it • Train all development and operations teams to identify critical components Engage with open source communities • Awareness of new features, critical issues and patches occurs at the community level • Foster a sense of engagement and shared ownership within your development teams Open source governance starts with developers • Train all developers to understand the license implications of the component selections • Ensure that when a component version is cached for future use that it’s patched regularly
  • 29. © 2019 Synopsys, Inc.29 Build secure, high-quality software faster