Manage Open Source Code Security Risks VP, Cloud Security

Take Capital One Bank as an example of this. In the 2010’s they followed the waterfall methodology. The organization lives in the heavily regulated financial industry and is currently using Open Source as a part of their day-to-day work – even having built large components of their platform off it. In 2012 they were not open-source friendly with a “say no to open source” company mindset. Eventually, they realized they were using:

  • Java (open source)
  • Linux (open source)
  • Apache (open source)
  • Eclipse (open source)

They realized quickly they were building their environment off of open source. Through a migration from commercial source code management to subversion and their own architecture, they were able to launch their production applications (built in house) with open source code as part of the foundation. With specific processes put in place to mitigate the risks associated with open source code use, such as legal review, they were able to successfully execute without breaches or “secret” code releases.

Value of open source to Capital One: “Using Open Source software gives us numerous advantages from a business perspective. Open Source gives us the ability to re-use what already exists and works well, with full flexibility to customize and/or contribute back what we need for our business. It also means that we are inherently building with technology that a broader community is investing in, dramatically reducing the likelihood that we are relying on end of life tech as well as making us more permeable to the larger talent ecosystem” – John Schmidt, Product Manager Capital One

Open source isn’t completely free:

A common misconception of open source code is that it is “free”. Like a free puppy, its great to get, but then you still have to care for it and feed it. To benefit from open source code use, you need to get the right people, and tech involved to mitigate for the unique risks associated with it.

Legal Open Source Risk:

  • Licenses: Authors of software have rights to their code.
    • Permissive (giving credit) vs. Copy left (distribute and show source code + share code being touched)
    • Using code is as-is (no recourse to the author)
    • Request changes or pull requests
  • Trade secret disclosure (IP infringement)
  • Devaluation of patent portfolio
  • M&A Impact
  • Reputational risk

In fact, many large companies such as Capital One and Facebook have Open Source legal counsel on staff. They hold the position of “law and technology counsel” and advise on the above legal issues. For example, during a Merger & Acquisition they will advise on any open source issues during due diligence and then after the acquisition, work in partnership with the integration team.

Open Source Security Risks:

  • Vulnerabilities – average of 64 vulns per code base. 1500+ days before a fix. Development processes are your first line of defense.
  • You build it you own it
  • Software of unknown origin
  • Continuous monitoring of config and environment

To mitigate the risks, usage of Open Source repository scanning technologies is mandatory. A service which is able to find manifest files (identify and analyze), understand the direct and indirect dependencies (and flag them for known vulnerabilities) is a must. Having integration into your code repository also helps identify your risks tied to your projects. Then building the issue findings into your ticketing system (or creating pull requests) for remediation, at the developer level, is the next step to ensure the code has ownership and is cared for during its lifecycle. Maintenance and auditing (remediation) of this will be required because every time the same pull request happens, as scan and updated patch request must occur there too.

Building a culture among your organization to have ownership of code, the maintenance of it, and pride in the application from release to release will take time. It is paramount to making Open Source more secure though, as the ownership and pride will help keep it secure. Implementing the technology checks on top will assist in keeping the teams involved and more secure, as will doing this continuously.

4 best practices to mitigate open source code vulnerabilities:

  • Identify: Maintain open source inventory
  • Analyze: Track open source vulns and licenses
  • Remediate: Fix and patch, upgrade
  • Audit: Continuous monitoring

To help prevent the costly mistakes that open source vulnerabilities and license risks can cause, SecOps teams can implement a solution like Trend Micro Open Source Security by Snyk. This helps secure open source inventories throughout the application development with increased visibility for earlier identification and continuous monitoring to minimize exposure over time.

Read More HERE