SlideShare a Scribd company logo
Securing Open Source
Code in Enterprise
Asankhaya Sharma
Open-Source Library Growth
Projection: > 400M Libraries by 2026
Complexity of Libraries has exploded
For every 1 Java
library you add to
your projects, 4
others are added
For every one
library you add to a
Node.js project, 9
others are added
SourceClear Scan of apache/spark
The Code Cocktail
Control Over What is in Your Code Has Changed
Reference : http://anvaka.github.io/allnpmviz.an/
From YOU to:
- Developer Tools
- Open-Source Code
- 3rd
Party Developers
Threats using open source code
- Vulnerabilities in open source libraries
- Malicious libraries
- Typosquatting package names
- Data exfiltration
- Command execution during build
Securing Open Source Code in Enterprise
Securing Open Source Code in Enterprise
Securing Open Source Code in Enterprise
Securing Open Source Code in Enterprise
Securing Open Source Code in Enterprise
Software Composition Analysis (SCA)
Discover and identify software vulnerabilities and
expose licenses for open source components
Scanner Data
Scanning Technology
App
A v1.0 B v2.0 C v1.0
B v2.0 B v2.0
App
A v1.0
B v2.0
C v1.0
Dependency Locked File Dependency GraphSCA Scanner
Scanning Technology
App
A v1.0 B v1.0 C v1.0 App
A v1.0
B v2.0
C v1.0
Dependency File
Dependency Graph
App
A v1.0 B v2.0 C v1.0
B v2.0 B v2.0
Resolved DependenciesSCA Scanner
System Dependencies Scanning
SCA Scanner
container ID
A 1.0 amd64 B 1.0 all C 1.0
pod name
A 1.0 amd64 B 1.0 all C 1.0
pod name
A 1.0 amd64 B 1.0 all C 1.0
pod name
A 1.0 amd64 B 1.0 all C 1.0
Vulnerabilities in Open Source Libraries
● Known Sources
○ CVEs / NVD
○ Advisories
○ Mailing list disclosures
● Unidentified issues
○ Commit logs
○ Bug reports
○ Change logs
○ Pull Requests
Security Issues are
often not reported or
publicly mentioned
How do we get the data?
Mining for unidentified vulnerabilities
NLP and Machine Learning for Harvesting Data
https://asankhaya.github.io/pdf/automated-identification-of-security-issues-fr
om-commit-messages-and-bug-reports.pdf
SCA Vendors
Evaluation Framework For Dependency Analysis
EFDA is an open source project that allows users to test
the dependency analysis tool of their choice and see how
accurate the tool is.
https://github.com/devsecops-community/efda
Software Supply Chain
Source Control Management Continuous Delivery (CI/CD) ProductionDeveloper
Software Composition Analysis
DevSecOps
- Integrate SCA scanning in your CI pipeline
- Create open source usage policy
- Fail builds on high severity vulnerabilities
- Gather data on open source libraries, vulnerabilities and licenses
- Review bill of material (BOM) reports on what’s running in your
applications
Rules for using 3rd party code
1. Know what you are using
2. Think about where it came from
3. Understand what it is doing
4. Avoid using vulnerable libraries
Thank you!
● Questions?
● Contact
○ Twitter: @asankhaya

More Related Content

What's hot (20)

PPTX
Rise of software supply chain attack
Yadnyawalkya Tale
 
PPTX
Digital Forensic Assignment Help
Global Web Tutors
 
PDF
Security Scanning Overview - Tetiana Chupryna (RUS) | Ruby Meditation 26
Ruby Meditation
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPT
Analysis Of Adverarial Code - The Role of Malware Kits
Rahul Mohandas
 
PPT
Malware forensics
Sameera Amjad
 
PDF
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
 
PDF
Next Generation Infrastructure - Devops Enterprise Summit 2018
John Willis
 
PPTX
Analyzing Packages in Docker images hosted On DockerHub
Ahmed Zerouali
 
PPT
MOSP Walkthrough 2009
Andrew Roughan
 
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
PDF
Reverse Engineering Malware Workshop
Mustafa Qasim
 
PDF
Breaking iOS Apps using Cycript
n|u - The Open Security Community
 
PPTX
Complete python toolbox for modern developers
Jan Giacomelli
 
PDF
Apache ManifoldCF
Piergiorgio Lucidi
 
PPTX
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
 
PDF
[CONFidence 2016] Andrey Plastunov - Simple bugs to pwn the devs
PROIDEA
 
PPTX
Linux server penetration testing project
Emad Soltani
 
PDF
ownR extended technical introduction
Functional Analytics
 
PDF
Towards a Census of Free and Open Source Licenses
dmgerman
 
Rise of software supply chain attack
Yadnyawalkya Tale
 
Digital Forensic Assignment Help
Global Web Tutors
 
Security Scanning Overview - Tetiana Chupryna (RUS) | Ruby Meditation 26
Ruby Meditation
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Analysis Of Adverarial Code - The Role of Malware Kits
Rahul Mohandas
 
Malware forensics
Sameera Amjad
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
 
Next Generation Infrastructure - Devops Enterprise Summit 2018
John Willis
 
Analyzing Packages in Docker images hosted On DockerHub
Ahmed Zerouali
 
MOSP Walkthrough 2009
Andrew Roughan
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
Reverse Engineering Malware Workshop
Mustafa Qasim
 
Breaking iOS Apps using Cycript
n|u - The Open Security Community
 
Complete python toolbox for modern developers
Jan Giacomelli
 
Apache ManifoldCF
Piergiorgio Lucidi
 
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
 
[CONFidence 2016] Andrey Plastunov - Simple bugs to pwn the devs
PROIDEA
 
Linux server penetration testing project
Emad Soltani
 
ownR extended technical introduction
Functional Analytics
 
Towards a Census of Free and Open Source Licenses
dmgerman
 

Similar to Securing Open Source Code in Enterprise (20)

PPTX
All You need to Know about Secure Coding with Open Source Software
Javier Perez
 
PDF
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
null - The Open Security Community
 
PPTX
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
PDF
Surge2012
davidapacheco
 
PPTX
OpenChain Webinar #53 – OpenSCA
Shane Coughlan
 
PDF
Analyse de la composition logicielle à l’aide d’outils open source
Open Source Experience
 
PDF
OpenChain Webinar - AboutCode - Practical Compliance in One Stack – Licensing...
Shane Coughlan
 
PDF
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
PPTX
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
PDF
A Developer’s Guide to Kubernetes Security
Gene Gotimer
 
PPTX
A question of trust - understanding Open Source risks
Tim Mackey
 
PDF
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
PDF
Your Code Isn’t Static. Your Processes Shouldn’t be Either.
DevOps.com
 
PPTX
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Black Duck by Synopsys
 
PDF
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
Shane Coughlan
 
PDF
Webinar–2019 Open Source Risk Analysis Report
Synopsys Software Integrity Group
 
PDF
OWASP - Dependency Check
Vandana Verma
 
PDF
Using Third Party Components for Building an Application Might be More Danger...
Achim D. Brucker
 
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
All You need to Know about Secure Coding with Open Source Software
Javier Perez
 
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
null - The Open Security Community
 
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
Surge2012
davidapacheco
 
OpenChain Webinar #53 – OpenSCA
Shane Coughlan
 
Analyse de la composition logicielle à l’aide d’outils open source
Open Source Experience
 
OpenChain Webinar - AboutCode - Practical Compliance in One Stack – Licensing...
Shane Coughlan
 
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
A Developer’s Guide to Kubernetes Security
Gene Gotimer
 
A question of trust - understanding Open Source risks
Tim Mackey
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
Your Code Isn’t Static. Your Processes Shouldn’t be Either.
DevOps.com
 
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Black Duck by Synopsys
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
Shane Coughlan
 
Webinar–2019 Open Source Risk Analysis Report
Synopsys Software Integrity Group
 
OWASP - Dependency Check
Vandana Verma
 
Using Third Party Components for Building an Application Might be More Danger...
Achim D. Brucker
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Ad

More from Asankhaya Sharma (13)

PDF
9 types of people you find on your team
Asankhaya Sharma
 
PDF
Design and Implementation of the Security Graph Language
Asankhaya Sharma
 
PPTX
Secure Software Development
Asankhaya Sharma
 
PPTX
Verified Subtyping with Traits and Mixins
Asankhaya Sharma
 
PPTX
Specifying compatible sharing in data structures
Asankhaya Sharma
 
PPTX
Exploiting undefined behaviors for efficient symbolic execution
Asankhaya Sharma
 
PPT
DIDAR: Database Intrusion Detection with Automated Recovery
Asankhaya Sharma
 
PPTX
Developer-focused Software Security
Asankhaya Sharma
 
PPTX
Visualizing Symbolic Execution with Bokeh
Asankhaya Sharma
 
PPT
Crafting a Successful Engineering Career
Asankhaya Sharma
 
PPTX
Certified Reasoning for Automated Verification
Asankhaya Sharma
 
PDF
Last Days of Academy
Asankhaya Sharma
 
PPT
SayCheese Ad
Asankhaya Sharma
 
9 types of people you find on your team
Asankhaya Sharma
 
Design and Implementation of the Security Graph Language
Asankhaya Sharma
 
Secure Software Development
Asankhaya Sharma
 
Verified Subtyping with Traits and Mixins
Asankhaya Sharma
 
Specifying compatible sharing in data structures
Asankhaya Sharma
 
Exploiting undefined behaviors for efficient symbolic execution
Asankhaya Sharma
 
DIDAR: Database Intrusion Detection with Automated Recovery
Asankhaya Sharma
 
Developer-focused Software Security
Asankhaya Sharma
 
Visualizing Symbolic Execution with Bokeh
Asankhaya Sharma
 
Crafting a Successful Engineering Career
Asankhaya Sharma
 
Certified Reasoning for Automated Verification
Asankhaya Sharma
 
Last Days of Academy
Asankhaya Sharma
 
SayCheese Ad
Asankhaya Sharma
 
Ad

Recently uploaded (20)

PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
July Patch Tuesday
Ivanti
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
July Patch Tuesday
Ivanti
 

Securing Open Source Code in Enterprise

  • 1. Securing Open Source Code in Enterprise Asankhaya Sharma
  • 3. Projection: > 400M Libraries by 2026
  • 4. Complexity of Libraries has exploded For every 1 Java library you add to your projects, 4 others are added For every one library you add to a Node.js project, 9 others are added
  • 5. SourceClear Scan of apache/spark
  • 7. Control Over What is in Your Code Has Changed Reference : http://anvaka.github.io/allnpmviz.an/ From YOU to: - Developer Tools - Open-Source Code - 3rd Party Developers
  • 8. Threats using open source code - Vulnerabilities in open source libraries - Malicious libraries - Typosquatting package names - Data exfiltration - Command execution during build
  • 14. Software Composition Analysis (SCA) Discover and identify software vulnerabilities and expose licenses for open source components Scanner Data
  • 15. Scanning Technology App A v1.0 B v2.0 C v1.0 B v2.0 B v2.0 App A v1.0 B v2.0 C v1.0 Dependency Locked File Dependency GraphSCA Scanner
  • 16. Scanning Technology App A v1.0 B v1.0 C v1.0 App A v1.0 B v2.0 C v1.0 Dependency File Dependency Graph App A v1.0 B v2.0 C v1.0 B v2.0 B v2.0 Resolved DependenciesSCA Scanner
  • 17. System Dependencies Scanning SCA Scanner container ID A 1.0 amd64 B 1.0 all C 1.0 pod name A 1.0 amd64 B 1.0 all C 1.0 pod name A 1.0 amd64 B 1.0 all C 1.0 pod name A 1.0 amd64 B 1.0 all C 1.0
  • 18. Vulnerabilities in Open Source Libraries ● Known Sources ○ CVEs / NVD ○ Advisories ○ Mailing list disclosures ● Unidentified issues ○ Commit logs ○ Bug reports ○ Change logs ○ Pull Requests Security Issues are often not reported or publicly mentioned How do we get the data?
  • 19. Mining for unidentified vulnerabilities
  • 20. NLP and Machine Learning for Harvesting Data https://asankhaya.github.io/pdf/automated-identification-of-security-issues-fr om-commit-messages-and-bug-reports.pdf
  • 22. Evaluation Framework For Dependency Analysis EFDA is an open source project that allows users to test the dependency analysis tool of their choice and see how accurate the tool is. https://github.com/devsecops-community/efda
  • 23. Software Supply Chain Source Control Management Continuous Delivery (CI/CD) ProductionDeveloper Software Composition Analysis
  • 24. DevSecOps - Integrate SCA scanning in your CI pipeline - Create open source usage policy - Fail builds on high severity vulnerabilities - Gather data on open source libraries, vulnerabilities and licenses - Review bill of material (BOM) reports on what’s running in your applications
  • 25. Rules for using 3rd party code 1. Know what you are using 2. Think about where it came from 3. Understand what it is doing 4. Avoid using vulnerable libraries
  • 26. Thank you! ● Questions? ● Contact ○ Twitter: @asankhaya