SlideShare a Scribd company logo
Securing Modern Applications: The Data Behind
DevSecOps
Ilkka Turunen, Global Director - Solutions Architecture
@llkkaT
Large Scale Exploit
March 10
Equifax
applications
breached through
Struts2 vulnerability
AprMar May Jun Jul Aug Sept
March 7
Apache Struts releases
updated version to
thwart vulnerability
CVE-2017-5638
July 29
Breach is discovered
by Equifax.
Probe Crisis Management
@llkkaT
Say Hello to Your Software Supply Chain…
1,096 new projects per day
10,000 new versions per day
14x releases per year
• 3M npm components
• 2M Java components
• 900K NuGet components
• 870K PyPI components
Securing Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOps
80% to 90% of
modern apps
consist of
assembled
components.
Securing Modern Applications: The Data Behind DevSecOps
80% to 90% of
modern
operations
consist of
assembled
containers.
Containers
Hand-built
applications
and
infrastructure
NOT ALL PARTS ARE CREATED
EQUAL
@devstefops
233 days
MeanTTR
119 days
MedianTTR
122,802
components with
known vulnerabilities
19,445
15.8% fixed the
vulnerability
TIME TO REPAIR OSS COMPONENTS
0 days
MeanTTR
CVE ID: CVE-2017-
5638
March 7
Apache fixed the
vulnerability
March 7
APACHE STRUTS2 MEAN TIME TO REPAIR
170,000
Java component
downloads annually
3,500
unique
18,870
11.1% with known
vulnerabilities
7,500 ORGANIZATIONS ANALYZED
@devstefops
March 7
Apache Struts releases
updated version to
thwart vulnerability
CVE-2017-5638
Today
8,780 continue to
download vulnerable
versions of Struts
57% of the Fortune 100
3 Days in March
March 8
NSA reveals Pentagon
servers scanned by
nation-states for
vulnerable Struts
instances
Struts exploit published
to Exploit-DB.
March 10
Equifax
Canada Revenue Agency
Canada Statistics
GMO Payment Gateway
The Rest of the Story
March 13
Okinawa Power
Japan Post
March 9
Cisco observes "a high number
of exploitation events."
March ’18
India’s AADHAAR
EQUIFAX WAS NOT ALONE
April 13
India Post
December ’17
Monero Cryptomining
6-IN-10 HAVE OPEN SOURCE POLICIES
@devstefops
@weekstweets
CYBERSECURITY HYGIENE RATIO IS 1 IN 8
Laurie Voss, npm and the furture of JavaScript, 2018-10-10
DEFECT PERCENTAGES FOR JAVASCRIPT
@llkkaT
Securing Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOps
9 years later, vulnerable
versions of Bouncy Castle
were downloaded…
11M
CVE-2007-6721
CVSS Base Score: 10.0 HIGH
Exploitability Subscore: 10.0
23M
2007 2016
BOUNCY CASTLE
18,330,958
78% downloads were vulnerable
COMMONS COLLECTION
CWE-502
23,476,966
total downloads in 2016
commons-fileupload
STRUTS 2
CVE 2016- 1000031
Securing Modern Applications: The Data Behind DevSecOps
Source : Maven Central Repository, Maaliskuu 2018
Spring Framework RCE ”Spring Break”
- CVE-2017-8046
Download
statistic for
components
affected in the
Spring
“Break”
vulnerability
AVERAGE DAYS BEFORE VULNERABILITY IS EXPLOITED
“Emphasize performance of the entire system
and never pass a defect downstream.”
Gene Kim
The Phoenix Project
2013
100:1developers outnumber application security
DevCDCI
Pro
d
QA
UATCI Server
Public OSS
repositories
Version
Control
Deployment
Process
Nexus
Repository
Developer
Nexus Lifecycle
IDE / maven
Weeks to approve
Relying solely on
penetration tests is
too late
“You cannot inspect quality into a product.”
W. Edwards Deming
Out of the Crisis
1982
31
REDUCE DOWNSTREAM DEFECTS
THE REWARDS ARE IMPRESSIVE
90%
improvement in time to
deploy
34,000
hours saved in
90 days
48%
increase in application
quality
1. Have a Software BoM for each application so you know what OSS you are using
2. Shift Left! Empower developers by giving them information into their IDEs and Source Control
3. Add checks at every stage to ensure you don’t pass defects downstream
Three Takeaways
Securing Modern Applications: The Data Behind DevSecOps

More Related Content

What's hot (16)

PPTX
Computing DevOps Summit, London, July 5, 2016
Splunk
 
PDF
Elastic and Google: Observability for multicloud and hybrid environments
Elasticsearch
 
PPTX
Monitoring OpenStack? Piece of cake!
Dirk Wallerstorfer
 
PPTX
Using splunk to manage aws – gaining transparency into cloud computing aws su...
Splunk
 
PPTX
OpenStack Full Stack Monitoring and Troubleshooting
Dirk Wallerstorfer
 
PDF
Argo Workflows 3.0, a detailed look at what’s new from the Argo Team
LibbySchulze
 
PDF
Combinação de logs, métricas e rastreamentos para observabilidade unificada
Elasticsearch
 
PDF
Reactive microservices
Eduardo Spinelli de Lima
 
PDF
Metadata service
Joel Teo
 
PPTX
300k messages/min in an IoT serverless system
Alex Pshul
 
PDF
Combining logs, metrics, and traces for unified observability
Elasticsearch
 
PDF
Build a cloud native app with OpenWhisk
Daniel Krook
 
PDF
Elastic APM : développez vos logs et vos indicateurs pour obtenir une vue com...
Elasticsearch
 
PPTX
Build Serverless applications with Azure Event Grid
vsriram
 
PDF
In the Eventual Consistency of Succeeding at Microservices
Kenny Bastani
 
Computing DevOps Summit, London, July 5, 2016
Splunk
 
Elastic and Google: Observability for multicloud and hybrid environments
Elasticsearch
 
Monitoring OpenStack? Piece of cake!
Dirk Wallerstorfer
 
Using splunk to manage aws – gaining transparency into cloud computing aws su...
Splunk
 
OpenStack Full Stack Monitoring and Troubleshooting
Dirk Wallerstorfer
 
Argo Workflows 3.0, a detailed look at what’s new from the Argo Team
LibbySchulze
 
Combinação de logs, métricas e rastreamentos para observabilidade unificada
Elasticsearch
 
Reactive microservices
Eduardo Spinelli de Lima
 
Metadata service
Joel Teo
 
300k messages/min in an IoT serverless system
Alex Pshul
 
Combining logs, metrics, and traces for unified observability
Elasticsearch
 
Build a cloud native app with OpenWhisk
Daniel Krook
 
Elastic APM : développez vos logs et vos indicateurs pour obtenir une vue com...
Elasticsearch
 
Build Serverless applications with Azure Event Grid
vsriram
 
In the Eventual Consistency of Succeeding at Microservices
Kenny Bastani
 

Similar to Securing Modern Applications: The Data Behind DevSecOps (20)

PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
Sonatype
 
PDF
Post-Equifax: How to Trust But Verify Your Software Supply Chain
DevOps.com
 
PDF
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
PPTX
Embracing DevSecOps: A Changing Security Landscape for the US Government
DJ Schleen
 
PDF
Vulnerability Exploitation in Docker Container Environments
FlawCheck
 
PDF
FOSDEM 2020 Presentation: Comparing dependency management issues across packa...
Fasten Project
 
PPTX
Deploy Secure Cloud-Native Apps Fast
Codefresh
 
PDF
The Unexpected Attack Vector: Software Updaters
Priyanka Aash
 
PDF
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Brian Vermeer
 
PPTX
Dependency check
David Karlsen
 
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
PPTX
Webinar: "Il software: la strategia vincente sta nella qualità"
Emerasoft, solutions to collaborate
 
PPTX
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
PPTX
Is my software ecosystem healthy? It depends!
Tom Mens
 
PDF
Security Testing ModernApps_v1.0
Neelu Tripathy
 
PDF
Industrial Threats Landscape, H2'2017
Kaspersky
 
PPTX
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
PDF
Open source cloud native security with threat mapper
LibbySchulze
 
PPTX
On the health of the npm packaging ecosystem
Tom Mens
 
RSAC DevSecOpsDays 2018 - We are all Equifax
Sonatype
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
DevOps.com
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
Embracing DevSecOps: A Changing Security Landscape for the US Government
DJ Schleen
 
Vulnerability Exploitation in Docker Container Environments
FlawCheck
 
FOSDEM 2020 Presentation: Comparing dependency management issues across packa...
Fasten Project
 
Deploy Secure Cloud-Native Apps Fast
Codefresh
 
The Unexpected Attack Vector: Software Updaters
Priyanka Aash
 
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Brian Vermeer
 
Dependency check
David Karlsen
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
Webinar: "Il software: la strategia vincente sta nella qualità"
Emerasoft, solutions to collaborate
 
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
Is my software ecosystem healthy? It depends!
Tom Mens
 
Security Testing ModernApps_v1.0
Neelu Tripathy
 
Industrial Threats Landscape, H2'2017
Kaspersky
 
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
Open source cloud native security with threat mapper
LibbySchulze
 
On the health of the npm packaging ecosystem
Tom Mens
 
Ad

More from Eficode (20)

PPTX
Saving money with Consolidations
Eficode
 
PDF
DevOps Automation with Puppet Bolt & Puppet Enterprise
Eficode
 
PDF
Scaling DevOps: Pitfalls to avoid
Eficode
 
PDF
Microservices, IoT, DevOps: A Case Study
Eficode
 
PPTX
Building a Knowledge Graph at Zalando
Eficode
 
PPTX
How to build the Cloud Native applications the way you want – not the way the...
Eficode
 
PPTX
The Future of Enterprise Applications is Serverless
Eficode
 
PPTX
Why Serverless is scary without DevSecOps and Observability
Eficode
 
PDF
Secure your Azure and DevOps in a smart way
Eficode
 
PDF
Can I Contain This?
Eficode
 
PDF
The Mono-repo – a contradiction with Microservices
Eficode
 
PDF
Using Go in DevOps
Eficode
 
PDF
Why Should You Be Thinking About DesignOps?
Eficode
 
PDF
A beginners guide to scaling DevOps
Eficode
 
PPTX
From Zero to SAFe
Eficode
 
PPTX
Bringing value to the business and for your customer through DevOps
Eficode
 
PPTX
Disconnected Pipelines: The Missing Link
Eficode
 
PDF
The Best & Worst Uses of AI in Software Testing
Eficode
 
PDF
Model-based programming and AI-assisted software development
Eficode
 
PDF
2018 State Of DevOps Report Key Findings
Eficode
 
Saving money with Consolidations
Eficode
 
DevOps Automation with Puppet Bolt & Puppet Enterprise
Eficode
 
Scaling DevOps: Pitfalls to avoid
Eficode
 
Microservices, IoT, DevOps: A Case Study
Eficode
 
Building a Knowledge Graph at Zalando
Eficode
 
How to build the Cloud Native applications the way you want – not the way the...
Eficode
 
The Future of Enterprise Applications is Serverless
Eficode
 
Why Serverless is scary without DevSecOps and Observability
Eficode
 
Secure your Azure and DevOps in a smart way
Eficode
 
Can I Contain This?
Eficode
 
The Mono-repo – a contradiction with Microservices
Eficode
 
Using Go in DevOps
Eficode
 
Why Should You Be Thinking About DesignOps?
Eficode
 
A beginners guide to scaling DevOps
Eficode
 
From Zero to SAFe
Eficode
 
Bringing value to the business and for your customer through DevOps
Eficode
 
Disconnected Pipelines: The Missing Link
Eficode
 
The Best & Worst Uses of AI in Software Testing
Eficode
 
Model-based programming and AI-assisted software development
Eficode
 
2018 State Of DevOps Report Key Findings
Eficode
 
Ad

Recently uploaded (20)

PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
July Patch Tuesday
Ivanti
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Top Managed Service Providers in Los Angeles
Captain IT
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 

Securing Modern Applications: The Data Behind DevSecOps

Editor's Notes

  • #3: 145m record 600k Gdpr number C suite retirement Learn facts – watch ilka vid & atch youtube
  • #5: Say hello to YOUR software supply chain, not “the software supply chain”; personalizing it more for the audience. For those of you that are unfamiliar with a software supply chain, it's really an allegate to the traditional supply chains used in manufacturing today. Those supply chains have suppliers that are building components. In the case of software development, that is the open-source [projects 00:07:53] that are building components, and making them freely available to developers around the world. [00:08:00] They're able to store and distribute those components in the large central warehouses, like the central repository that Sonatype is responsible for managing, but also repositories like rubygems.org, [pipi.org 00:08:16], thenugetgallery, etc. This is where the components are stored and available to the manufacturers, that are really the software development teams, that are consuming these components and downloading these components over the years. Those components are then used to create the finished goods, or the software applications, that organizations are then delivering to their customers. We'll continue to use this supply chain analogy for the software supply chain, then compare and contrast what's happening in traditional manufacturing, is to what's happening in software today.
  • #6: There's a really interesting site out there called moduleaccounts.com. It has a simple value, it keeps track of the number of different components, or packages that are available across the different development languages, from pipi, to nuget, to bower, to maven, components, etc. And it shows the increase in the number of these components that are available to the developer ecosystem, or the developer population, over time. We used some data from that site to see that over a thousand new open-source projects were created each day. People delivering a new kind of software, a new kind of component. Then, from the general population of all open-source projects worldwide, we were able to estimate that ten thousand new versions of components are introduced every day. There's this huge supply of components entering the ecosystem, and available to our software supply chains. When we look at the central repository that Sonatype manages, of maven style or java open-source components, we looked across 380 thousand open-source projects, and found that on average those projects were releasing fourteen new versions of their components every year. That's great from a supply chain aspect, that the suppliers are very active, actively releasing new software, actively releasing new innovations, and actively improving the software that they're making available to developers worldwide.  
  • #12: Unfortunately, not all parts are equal... Some are healthy, some are not… …and all go bad over time (like milk, not like wine).
  • #17:  in the late 1950s, and the dominance of car design over good engineering
  • #18: [00:14:00] One of the things that we measured year over year, and we do do some year over year comparisons throughout the report, is that 6.2% of the downloads from the central repository last year out of the billions of downloads, had a known security vulnerability in them. This past year we saw 6.1% of the downloads had a known vulnerability. That's about one in sixteen of every component download has a known vulnerability in it.
  • #20: [00:14:00] One of the things that we measured year over year, and we do do some year over year comparisons throughout the report, is that 6.2% of the downloads from the central repository last year out of the billions of downloads, had a known security vulnerability in them. This past year we saw 6.1% of the downloads had a known vulnerability. That's about one in sixteen of every component download has a known vulnerability in it.
  • #23: in 2016 there were 197 GAVs related to bouncycastle downloaded a total of 23,412,020 times. 61 of thos GAVs were insecure, and those were downloaded 11,181,493 times
  • #24: for commons-collection, there were 25 GAVs downloaded a total of 23,476,966 times.  7 of those GAVs were insecure, and those were downloaded 18,330,958 times.
  • #29: “Cease dependence on mass inspection.” Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.
  • #31: Run through to CI / CD relatively quickly. 2min max. When there, focus on discussing * ‘what happens when we introduce the questions of ‘what about security vulnerabilities?’ ‘What about licensing?’ Most companies solve these manually. Takes long time. Ask the attendees how they deal with it? When you know, start explaining we believe these should be automated throughout the SLCD instead of being at the very beginning or very end. Reveal each label, discuss briefly implications BEGIN DEMO FLOW. Stop after each major theme briefly for questiosn IDE Policy Jenkins / Bamboo REPORT – Vulnerabilities – Licensing – important to know what persona to know what to focus on here JIRA – DASHBOARD AT THE END OF THE DEMO – ASK FOR THEIR IMPRESSIONS “And that’s the end of the demo. What do you think, could this be useful?” => Helps set the stage for value affirmation and future next steps
  • #32: “Cease dependence on mass inspection.” Inspection does not improve quality. Nor guarantee quality. Inspection is too late. Harold F. Dodge: “You cannot inspect quality into a product” Automatic inspection and recording require constant vigil.
  • #33: The question is not: Can we build secure software?
  • #34: Fannie mae? LM – R !LC 34,000 – amex? 48% FM?
  • #35: This should be at the beginning and end of your presentation: What are the three talking points your audience should be able to answer after this presentation?