open source developers are security s new front line a
play

Open Source Developers are Securitys new front line A shifting - PowerPoint PPT Presentation

Open Source Developers are Securitys new front line A shifting landscape of attacks Ilkka Turunen Global Director, Sonatype @llkkaT 20XX: Software has eaten the world It used open source to chew it up Everyone has a software supply


  1. Open Source Developers are Security’s new front line A shifting landscape of attacks Ilkka Turunen Global Director, Sonatype @llkkaT

  2. 20XX: Software has eaten the world… It used open source to chew it up

  3. Everyone has a software supply chain. (including open source projects)

  4. 4

  5. 5

  6. 85% of your code is sourced from external suppliers @llkkaT

  7. Open source helps us release value faster source: 2019 DevSecOps Community Survey

  8. Faster is better in the enterprise.

  9. …faster is better for adversaries?

  10. Source: xkcd

  11. 313,000 java component downloads annually 27,704 2,778 8.8% with known Component suppliers vulnerabilities 8,200 Component release

  12. 60,660 30,330 JavaScript packages 51% with known downloaded annually vulnerabilities per developer

  13. Widespread Compromise post disclosure

  14. 2015 COMMONS COLLECTIONS CWE-502 23,476,966 total downloads in 2016 18,330,958 78% downloads were vulnerable https://wvusoldier.wordpress.com/2016/09/05/some-extra-details-on-hospital-ransomware-you-probably-didnt-know/

  15. 2017 Struts 2: Wait and Prey March 7 Apache Struts releases March ’18 March 13 updated version to India’s AADHAAR thwart vulnerability Okinawa Power Japan Post CVE-2017-5638 March 9 April 13 Cisco observes "a high number of exploitation events." India Post 3 Days in March The Rest of the Story March 10 March 8 December ’17 Today NSA reveals Pentagon Equifax servers scanned by Monero Crypto Mining 65% of the Fortune 100 nation-states for download vulnerable Canada Revenue Agency vulnerable Struts versions instances Canada Statistics Struts exploit published GMO Payment Gateway to Exploit-DB.

  16. Breaches increased 71% 14% 24% suspect or have verified a suspect or have verified a breach related to open source breach related to open source components in the 2014 survey components in the 2019 survey source: DevSecOps Community Survey 2014 and 2019

  17. DevSecOps Challenge: Automate Faster than Evil. Average Days to Exploit 45 3

  18. Late 2010’s - straight to the source

  19. July 2017 Credentials to 79,000 packages found online, a ff ecting publishing access to 14% of npm repository.

  20. November 2018 npm event-stream attack on CoPay. 2 million downloads per week.

  21. March 2019 Gems bootstrap-sass RCE backdoor (1.6K Direct dependencies)

  22. Crypto Currency: Cybercrime’s new best friend. “I have nothing of value in my application” Your server has CPU cycles Your visitors have CPU cycles Your build infra has CPU cycles Crypto Currency allows the attack to be directly monetized.

  23. Jenkins under attack “So far, $3.4 million has been mined.”

  24. It affects all of us. How do we fight it?

  25. …faster is better in the enterprise

  26. …faster is better for open source.

  27. Attributes Measure Popularity Avg. daily Central Repository downloads Size of Team Avg. unique monthly contributors Development Speed Avg. commits per month Release Speed Avg. period between releases Presence of CI Presence of popular cloud CI systems Foundation Support Associated with an open source foundation Security More complicated Update Speed More complicated

  28. Assumption # 1 Projects that release frequently have better outcomes.

  29. 1945: W. Edwards Deming

  30. The Key Metrics: Time to Remediate Time to Update Stale Dependencies

  31. Time to Remediate Vulnerabilities

  32. Time to Remediate Vulnerabilities Do these update quickly in general?

  33. Time to Remediate (TRR) vs. Time to Update (TTU) Most projects stay secure by staying up to date.

  34. Projects that release frequently: are 5x more popular. attract 79% more developers. have 12% greater foundation support rates.

  35. Assumption 2 Projects with fewer dependencies will stay more up to date.

  36. More dependencies correlate with larger development teams. Larger development teams have 50% faster MTTU and release 2.6x more frequently.

  37. More dependencies correlate with larger development teams. Larger development teams have 50% faster MTTU and release 2.6x more frequently.

  38. Projects with fewer dependencies will stay more up to date. (REJECTED) Components with more dependencies actually have better MTTU.

  39. Assumption 3 More popular projects will be better about staying up to date.

  40. 5 Behavioral Clusters Small Exemplar Large Exemplar Laggards Features First Cautious (606) (595) (521) (280) (429) Small development Large development teams Poor MTTU, high Frequent releases, Good TTU, teams (1.6 devs), (8.9 devs), exemplary stale dependency but poor TTU. but seldom exemplary MTTU. MTTU, very likely to be count, more likely to Still reasonably completely up foundation supported, be commercially popular. to date. 11x more popular. supported. Rest of the population: 8,142

  41. Exemplars release fast and tend to be more popular. Pick suppliers from here.

  42. Not all popular projects are exemplary and release fast Don’t pick suppliers from here.

  43. Assumption 3 More popular projects will be better about staying up to date. (REJECTED) There are plenty of popular components with poor MTTU. Popularity does not correlate with MTTU.

  44. How do we stay fast?

  45. Enterprise Devs Manage Dependencies 50% 46% YES YES 38% 37% YES YES 30% YES n = 658 We schedule updating We strive to use the We use some We have a process to We have automated dependencies as part latest version (or process to add a new proactively remove tools to track, manage, of our daily work latest-N) of all our dependency (e.g., problematic or unused and/or ensure policy dependencies evaluate, approve, dependencies compliance of our standardize, etc.) dependencies

  46. When Devs climb the mountain every day, it’s easier.

  47. How are you informed of InfoSec and AppSec issues? Automating security enables faster DevOps feedback loops

  48. Do you have an open source policy and do you follow it? Automation continues to prove difficult to ignore.

  49. For organizations who tamed their supply chains, the rewards were impressive.

  50. Manage the 85% of your software

  51. Be faster than your adversaries

  52. Set standards for what you choose

  53. Automate it all.

  54. iturunen@sonatype.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend