DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Popular
  3. Open Source
  4. DevSecOps: Eat Carrots, Not Cupcakes

DevSecOps: Eat Carrots, Not Cupcakes

When it comes to carrots and cupcakes, the right choices can offer great short-term and long-term benefits. Making good choices will benefit your DevSecOps practice.

Derek Weeks user avatar by
Derek Weeks
·
Mar. 28, 17 · Opinion
Like (3)
Save
Tweet
Share
3.76K Views

Join the DZone community and get the full member experience.

Join For Free

you are what you eat.

when it comes to food, we all know what’s considered “good” and what’s “bad.”

for fried, battered, buttery, or creamy, the category of cupcakes, and such — just say no. when fresh, grilled, steamed, or baked — of course, you should eat your veggies and other fine foods — bon appetite.

we can all understand this simple rule when eating. but when it comes to software development, simple rules and advice from nutritional labels aren’t always there for us. simple rules like use “good” open source components, not “bad” ones (i.e., vulnerable, outdated, risky licenses) when building and deploying your next app.

evidence of gluttony

to meet the need for speed, virtually all modern development organizations are using open-source and third-party components to assemble applications rather than build every function from scratch. according to the 2016 state of the software supply chain report, the average development organization feasts on over 229,000 open source java components each year, but we’re seeing similar consumption practices in the javascript, python, ruby, and .net development realms. while the upside of this gluttony is improved productivity, there is a downside to consuming components without the proper insight into their quality.

beyond the consumption of open source and third-party software components in development, the same guidance holds true for containers used by devops teams. today, over 100,000 free apps are available on docker hub, and consumption of those applications into devops tool chains and infrastructure often go unchecked.

the downside of efficiency

while sourcing components and containers can accelerate development efforts, many organizations do not apply sufficient scrutiny to assessing their quality or security. the 2016 software supply chain report also indicates that 1 in 15 of the components used in applications contains at least one known security vulnerability.

what this means is that not all components and containers are created equal. it also means that blind consumption practices can have both immediate and long-term consequences for the organization consuming the open source software components or containerized applications.

according to the 2017 devsecops community survey, 57% of organizations looking to improve the quality of components used in their development practices have implemented an open-source governance practice. this is up only slightly from the 2014 survey, which showed 57% of organizations with open source policies in place.

for those without a policy, there are no rules in place when it comes to “good” vs. “bad” consumption practices. having policies in place can help improve the quality of applications being produced, reduce vulnerabilities to attack, and eliminate the use of components with risky license types.

screen shot 2017-03-17 at 2.14.17 pm.png

breaking bad

to further emphasize the need for evaluating component quality and security, let’s take a look at one of the findings from our 2014 survey. at the time, over 2,700 survey participants indicated that more than 1 in 10 organizations (14%) had experienced or suspected a breach in their applications related to an open source software component. because that survey took place in the same month that the notorious openssl software component (a.k.a. “heartbleed”) vulnerability was announced, i felt like it might have inflated the number of breach related responses.

to my surprise, the 2017 survey shows that 20% of organizations (1 in 5) had or suspected a breach related to open source software components in their applications. in the past three years, as the rate of confirmed or suspected breaches related to vulnerable open source components increased by 50%, the number of organizations having rules in place to govern the use of secure components remained the same.

carrotscupcakes2.jpg

across the devops community, we are seeing much more attention being paid to security concerns and more organizations finding news ways to automate practices early in the sdlc. automating the evaluation of open source and third-party components against rules designated in open source governance policies is one the approaches being adopted. while not the only answer to devsecops requirements, having an automated policy in place to enforce governance and guide remediation can pay off handsomely if it also helps prevent a breach.

when it comes to carrots and cupcakes, the right choices can offer great short-term and long-term benefits. in the realm of components and containers, making “good” choices will also benefit your devsecops practice.

this blog is one of seven in a series providing expert commentary and analysis on the results from sonatype’s 2017 devsecops community survey. for access to all of the blogs in this series and the survey report, please see here . this blog first appeared on devopsdigest on march 21st.

Open source

Published at DZone with permission of Derek Weeks, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • HTTP vs Messaging for Microservices Communications
  • Reliability Is Slowing You Down
  • The Path From APIs to Containers
  • Spring Boot vs Eclipse MicroProfile: Resident Set Size (RSS) and Time to First Request (TFR) Comparative

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: