37
Best Practices for Managing Risk from Open Source Libraries and Components February 5 th at 1pm ET Jim Routh & Joshua Corman

Best Practices for Managing Risk from Open Source Libraries and Components

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Best Practices for Managing Risk from Open Source Libraries and Components

Best Practices for Managing Risk from Open Source Libraries and Components

February 5th at 1pm ETJim Routh & Joshua Corman

Page 2: Best Practices for Managing Risk from Open Source Libraries and Components

2 04/11/2023

FEATURED SPEAKERS

JIM ROUTH, CISO JOSHUA CORMAN, CTO

Certified with CSSLP & CISM

Chairman of FS-ISAC Committee

20+ Years in Application Security

Co-founder of Rugged Software

Previously w/ Akamai & 451 Group

Trusted Security Professional @joshcorman

Page 3: Best Practices for Managing Risk from Open Source Libraries and Components

3 04/11/2023

TODAY’S AGENDA

• What is the Third Party Security Working Group

• What are the recommended control types

• Why policy management & enforcement

• What changed?

• Dependence (disproportional)

• Component Lifecycle Management in action

Page 4: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Third Party Software Security

Steering Committee Members

1. Jerry Brady, Morgan Stanley2. Mark Connelly, Thomson

Reuters3. Mahi Dontamasetti, DTCC4. Paul Fulton, Citi5. Keith Gordon, Capital One6. Royal Hansen, Goldman

Sachs7. Chauncey Holden, RBS

Citizens Bank8. Rich Jones, JP Morgan Chase9. Ben Miron, GE 10.Jim Routh, Aetna

Working Group Members

1. David Smith, Fidelity2. Don Elkins, Morgan Stanley3. Matt Levine, Goldman

Sachs4. David Hubley, Capital One5. Tim Mathias, Thomson

Reuters6. Rishikesh Pande, Citi

The Third Party Software Security Working Group was established with a mandate to analyze control options and develop specific recommendations on control types for member firms to consider adding to their vendor governance programs.

These recommendations on control types are captured in the FS-ISAC Working Group whitepaper, “Appropriate Software Security Control Types for Third Party Service and Product Providers.”

Page 5: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Recommended Control Types

vBSIMM Process Maturity

Binary Static Analysis

Policy management and enforcement for consumption of open source libraries and components

1

2

3

Page 6: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Control Types

Page 7: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Control 3 - Policy management and enforcement for consumption

of open source libraries and components This control type identifies consumable open source libraries for a given

Financial Institution, identifies the security vulnerabilities by open source component and enables the Financial Institution to apply

controls or governance over the acquisition and use of open source libraries.

Page 8: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Component Usage Has Exploded

Control 3 Open Source Policy Management

Page 9: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

Policy Management Capability

Page 10: Best Practices for Managing Risk from Open Source Libraries and Components

FS-ISAC Third Party Software Security Working Group

FS-ISAC Third Party Software Security Working Group Whitepaper

www.fs-isac.com

Page 11: Best Practices for Managing Risk from Open Source Libraries and Components

WHAT’S CHANGED?

Page 12: Best Practices for Managing Risk from Open Source Libraries and Components

COST, COMPLEXITY, AND RISK

Page 13: Best Practices for Managing Risk from Open Source Libraries and Components

CONSEQUENCES: VALUE & REPLACEABILITY

http://blog.cognitivedissidents.com/2011/10/24/a-replaceability-continuum/

Page 14: Best Practices for Managing Risk from Open Source Libraries and Components
Page 15: Best Practices for Managing Risk from Open Source Libraries and Components

Countermeasures

Situational Awareness

Operational ExcellenceDefensible Infrastructure

Page 16: Best Practices for Managing Risk from Open Source Libraries and Components

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 17: Best Practices for Managing Risk from Open Source Libraries and Components

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 18: Best Practices for Managing Risk from Open Source Libraries and Components

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 19: Best Practices for Managing Risk from Open Source Libraries and Components

Life RightsCritInf

r IP PII CCN

Counter-

measures

Situational

Awareness

OperationalExcellence

DefensibleInfrastructure

REPLACEABILITY

Page 20: Best Practices for Managing Risk from Open Source Libraries and Components

90%Assembled

Software Evolution

Written

20

HOW MUCH CODE DO WE “WRITE” THESE DAYS?

Page 21: Best Practices for Managing Risk from Open Source Libraries and Components

90%Assembled

Software Evolution

Written

21

HOW MUCH CODE DO WE “WRITE” THESE DAYS?

Page 22: Best Practices for Managing Risk from Open Source Libraries and Components

Component Selection

Open source usage is

EXPLODING

Yesterday’s source code is today’s

OPEN SOURCE

201320122011200920082007 2010

2B1B500M 4B 6B 8B 13B

Page 23: Best Practices for Managing Risk from Open Source Libraries and Components

A Sea Change in Hacker Targeting

Now that software is assembled…

23

Page 24: Best Practices for Managing Risk from Open Source Libraries and Components

Today’s approaches

AREN’T WORKING

Component Selection

DEVELOPMENT BUILD AND DEPLOY PRODUCTIONCOMPONENT SELECTION

46m vulnerable

components downloaded

!

71% of repos have 1+

critical or severe

vulnerability

!

90% of repos have 1+ critical

vulnerability

!

Page 25: Best Practices for Managing Risk from Open Source Libraries and Components

A Massive Supply Chain Problem

No Visibility

No Control

No Fix

No visibility to what components are used, where they are used and where there is risk

No way to govern/enforce component usage. Policies are not integrated with development .

No efficient way to fix existing flaws.

25

Page 26: Best Practices for Managing Risk from Open Source Libraries and Components
Page 27: Best Practices for Managing Risk from Open Source Libraries and Components

27

FROM THE FS-ISAC WHITE PAPER

• Enabling application architects to control versions of software.

• Accelerating the development process by encouraging the consumption of open source libraries that are resilient.

• Reduce operating costs since the cost of ripping out obsolete components from existing applications is high assuming the older versions can be identified in the first place.

Page 28: Best Practices for Managing Risk from Open Source Libraries and Components

CLM IN ACTION

Page 29: Best Practices for Managing Risk from Open Source Libraries and Components

BACK TO… CONTROL TYPES

Page 30: Best Practices for Managing Risk from Open Source Libraries and Components

Notional Exposure Active Risk

Snapshot Report

Repository Health Check

Application Health Check

What have I downloaded ?

What’s in my repo? Are my apps vulnerable?

Page 31: Best Practices for Managing Risk from Open Source Libraries and Components

31

Global Bank

Software ProviderSoftware

Provider’s Customer

State UniversityThree-Letter

AgencyLarge Financial

Exchange

CVE-2013-2251: WIDESPREAD COMPROMISE

Page 32: Best Practices for Managing Risk from Open Source Libraries and Components

How can we choose the best components

FROM THE START?

Shift Upstream = ZTTR (Zero Time to Remediation)

Analyze all components from within your IDE

License, Security and Architecture data for each component, evaluated against your policy

Page 33: Best Practices for Managing Risk from Open Source Libraries and Components

Software Evolution

33

BIG IMPACT Little Effort,

Page 34: Best Practices for Managing Risk from Open Source Libraries and Components

WE NEED BETTER LEVERAGE!

Most security programs are getting a little bit better everywhere; but not sufficiently better anywhere...

Earlier. Easier. Effective.

Page 35: Best Practices for Managing Risk from Open Source Libraries and Components

35 04/11/2023

DEVELOPERS & APPLICATION SECURITY:

WHO’S RESPONSIBLE?

Take the Survey: https://www.surveymonkey.com/s/Developers_and_App

63% of people concerned with open source

Page 36: Best Practices for Managing Risk from Open Source Libraries and Components

36 04/11/2023

“A new approach in the market is Component Lifecycle Management (CLM) which offers the ability to enforce policies in the development process.”

LEARN MORE

To learn more about the ‘Component Lifecycle Management Approach’, read the OVUM report.

http://www.sonatype.com/resources/whitepapers

Page 37: Best Practices for Managing Risk from Open Source Libraries and Components

BEST PRACTICES FOR MANAGING RISK FROM OPEN SOURCE LIBRARIES AND COMPONENTS Thank you for attending today’s event, please contact us with any questions. http://www.sonatype.com/contact/general-inquiry