DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Popular
  3. Open Source
  4. Trends in Open Source Security

Trends in Open Source Security

This recent Virtual Summit focused on open-source library use and risk. We may be at a fundamental turning point in terms of application security.

Suzanne Ciccone user avatar by
Suzanne Ciccone
·
Sep. 03, 18 · Presentation
Like (1)
Save
Tweet
Share
2.52K Views

Join the DZone community and get the full member experience.

Join For Free

We recently held a Virtual Summit centered on the topic of open-source library use and risk. Mark Curphey, CA Veracode's VP of Strategy, gave the keynote address on trends in this space. Curphey, who is also the founder of OWASP and previously CEO of SourceClear (recently acquired by CA Veracode), believes that we are at a fundamental turning point in application security. He sees this shift stemming from three major trends:

1. The cloud: Using the cloud will fundamentally change the way we think about security.

2. The use of open source: Similarly to the cloud, the shift to open source both creates greater security risks, but also an opportunity to change and improve security. When everyone is re-using one central resource, if we focus on securing that one resource - we have a big opportunity to change the security landscape.

3. DevOps: This model's focus on automation and continuous delivery will shift the way we think about security and how to embed it into developers' processes.

In terms of open source, Curphey emphasized that there are changing trends in both its production and consumption. In terms of consumption, you would be hard pressed to find a company that isn't building its products and services on open source code. He cited SourceClear data that up to 95 percent of their customers' code bases are open source. In addition, we've seen an uptick in the number of open source libraries being created, and they're also being distributed much more quickly, and in increasingly smaller chunks. This growth in number and pace ultimately means that it's harder to scrutinize what's safe and what's not. At the same time, the pace of development is increasing as well, meaning that any security checks that slow or interrupt developer workflows won't be effective. AppSec today needs to be frictionless and easy, which in large part means automated.

AppSec shift

The above trends are changing the AppSec game and require a mindset shift. It's no longer enough to focus only on your first-party code - making sure developers understand how to code securely and are scanning their code. This focus would leave a gaping hole in your security coverage. You also need to think about the open source libraries developers are pulling into their code. We need to shift our security thinking to accommodate this new reality, but we also shouldn't be afraid of it - open source is now the key to innovation, and there are effective ways to use it securely. And it will take a significant shift. For instance, much of the current AppSec landscape is built around public CVEs. But that list was created before DevOps, and before the explosion in open source. In today's world, waiting for a vulnerability to be added to a public list is simply unfeasible. We need to think differently.

Attacker shift

Just as we have to change our AppSec mindset, we need to be aware of the changing attacker mindset as well. The proliferation of open source has changed the economics of cybercrime for attackers. Rather than having to attack every app, they can create one attack that leads to many breaches. Curphey points out that not only are open source libraries increasingly targeted by cyberattackers, but that attackers have begun creating malicious open source code that organizations are unknowingly incorporating into their code bases. And we are starting to see ransomware used in this scenario.

The way forward: focus on prioritizing

In the good news column, using a vulnerable library doesn't necessarily make you vulnerable. Curphey points out that prioritization is key to getting open source security right. In many cases, when developers pull in an open source library, they are only using one small piece of it - one method or function. So even if the library is tagged as being vulnerable, your data might not be passing through the vulnerable part, or the method or function you are using might not be vulnerable. In this new landscape, security teams need to help development teams both determine acceptable risk and prioritize remediation and/or mitigation. A software composition analysis tool that can deliver this information in any automated way is a key part of effectively reducing open source library risk.

Listen to Mark Curphey's complete talk, and the other sessions on the topic, in the recording of our recent Virtual Summit, The Open Source Library Conundrum: Managing Your Risk.

Open source security trends Library

Published at DZone with permission of Suzanne Ciccone. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Best Practices for Writing Clean and Maintainable Code
  • Specification by Example Is Not a Test Framework
  • 7 Ways for Better Collaboration Among Your Testers and Developers
  • Testing Repository Adapters With Hexagonal Architecture

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: