21
SECURITY IN THE AGE OF OPEN SOURCE Mike Pittenger VP, Security Strategy

September 13, 2016: Security in the Age of Open Source:

Embed Size (px)

Citation preview

Page 1: September 13, 2016: Security in the Age of Open Source:

SECURITY IN THE AGE OF OPEN

SOURCEMike Pittenger

VP, Security Strategy

Page 2: September 13, 2016: Security in the Age of Open Source:

Open Source Embraced By The Enterprise

OPEN SOURCE• Needed functionality without

acquisition costs• Faster time to market• Lower development costs• Broad support from

communities

CUSTOM CODE• Proprietary functionality• Core enterprise IP• Competitive differentiation

OPEN SOURCE

CUSTOM CODE

Page 3: September 13, 2016: Security in the Age of Open Source:

Open Source Changed the Way Applications are Built

10% Open Source

20% Open Source

50% Open Source

Up to 90% Open Source

1998 2005 2010 TODAY

Open Source is the modern architecture

Custom & Commercial CodeOpen Source Software

Page 4: September 13, 2016: Security in the Age of Open Source:

Consequences Can Be Costly When You Can’t Control What You Can’t See

OpenSSLIntroduction: 2011Discovery: 2014

HeartbleedGNU C LibraryIntroduction: 2000Discovery: 2015

GhostQEMUIntroduction: 2004Discovery: 2015

VenomBashIntroduction: 1989Discovery: 2014

ShellshockOpenSSLIntroduction: 1990'sDiscovery: 2015

Freak

FREAK!

Page 5: September 13, 2016: Security in the Age of Open Source:

• Static analysis• Testing of source code or binaries for unknown security

vulnerabilities in custom code• Advantages in buffer overflow, some types of SQL

injection• Provides results in source code

• Dynamic analysis• Testing of compiled application in a staging

environment to detect unknown security vulnerabilities in custom code

• Advantages in injection errors, XSS• Provides results by URL, must be traced to source

• What’s Missing?

Why Aren’t We Finding These in Testing?

Page 6: September 13, 2016: Security in the Age of Open Source:

• Automated testing finds common vulnerabilities in the code you write• They are good, not perfect• Different tools work better on different classes

of bugs• Many types of bugs are undetectable except

by trained security researchers

There Are No Silver Bullets

All possible security

vulnerabilities

FREAK!

Identifiable with Static

Analysis

Identifiable with

Dynamic Analysis

Page 7: September 13, 2016: Security in the Age of Open Source:

• Static Analysis Tools and Dynamic Analysis Tools can be very effective in finding bugs in the code written by internal developers.• HOWEVER…• They are ineffective in finding known vulnerabilities in Open Source

components• They provide a point-in-time snapshot of security

What happens when the threat landscape changes?

What Do Security Testing Tools Miss?

Page 8: September 13, 2016: Security in the Age of Open Source:

The Threat Landscape Constantly Changes

• VulnDB (Open Source Vulnerability Database)• In 2015, over 3,000 new vulnerabilities in open source

• Since 2004, over 74,000 vulnerabilities have been disclosed by NVD. • 63 reference automated tools• 50 of those are for vulnerabilities reported in the tools• 13 are for vulnerabilities that could be identified by a fuzzer

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 20150500

100015002000250030003500

Open Source Vulnerabilities Reported Per Year

nvd vulndb-exclusive

Page 9: September 13, 2016: Security in the Age of Open Source:

Black Duck Open Source Security Audit Report Highlights Security & Management Challenges

Page 10: September 13, 2016: Security in the Age of Open Source:

OPEN SOURCE CODE

INTERNAL CODE

OUTSOURCED CODE

LEGACY CODE

REUSED CODE

SUPPLY CHAIN CODE

THIRD PARTY CODE

We Have Little Control Over How Open Source Enters The Code Base

Page 11: September 13, 2016: Security in the Age of Open Source:

Open Source is an Attractive Target

OPEN SOURCE IS USED EVERYWHERE

VULNERABILITIES ARE PUBLICIZEDEASY ACCESS TO SOURCE CODE

STEPS TO EXPLOIT READILY AVAILABLE

Page 12: September 13, 2016: Security in the Age of Open Source:

Who’s Responsible For Security?

Commercial Code Open Source Code

• Dedicated security researchers• Alerting and notification

infrastructure• Regular patch updates• Dedicated support team with

SLA

• “community”-based code analysis• Monitor newsfeeds yourself• No standard patching mechanism• Ultimately, you are responsible

Page 13: September 13, 2016: Security in the Age of Open Source:

0

200

400

600

800

1000

1200

Newest component on software was compiled in Nov 2012. This

indicatesThat it was released with at least

509unique CVEs affecting 24

componentsaround end of 2012 or early

2013.

As of 2015-02-15 total of 1094 unique CVEs

affected this software via now 30 vulnerable

components. That is about 0.8 new CVEs / day .

Oldest compiled componenton the software image was from Dec 2001

Hospital Monitoring System

Page 14: September 13, 2016: Security in the Age of Open Source:

Smart TV Set

6/1/20

11

7/9/201

1

8/16/2

011

9/23/2

011

10/31

/2011

12/8/

2011

1/15/2

012

2/22/20

12

3/31/20

12

5/8/20

12

6/15/2

012

7/23/2

012

8/30/2

012

10/7/

2012

11/14

/2012

12/22/2

012

1/29/2

013

3/8/20

13

4/15/2

013

5/23/2

013

6/30/20

13

8/7/20

13

9/14/2

013

10/22

/2013

11/29

/2013

1/6/20

14

2/13/20

14

3/23/2

014

4/30/2

014

6/7/201

4

7/15/2

014

8/22/20

14

9/29/20

14

11/6/

2014

12/14

/2014

1/21/2

015

0

100

200

300

400

500

600

700

11/1/

2022

March 1, 2015: 584 unique CVEs in 23 components

2012 Smart TV lineuplaunched: Nov/Dec 2011

Approx. 0.58 new CVEs / dayover the course of 23

months

(* date may not be fully accurate, as e.g. partial OTA updates may have been delivered after this date as well ( see sec. update on Nov 2014)

One year standardwarranty for partsand labor from thedate of purchase

7 years

Last firmware / SW update: Mar 2013 (*Approx. 178 unique CVEs affecting product at the moment of SW EoL)

Nov

2014

: sec

urity

upd

ate

to

patc

h cu

rl, o

pens

sl, fl

ash

play

er, ff

mpe

g , l

ibpn

g an

d fre

etyp

e

Nov 2022. End of 100.000 hours

average lifespan of LCD TV screen.

7 more years of expected operation of the LCD TV

(based on 100,000 hours average lifespan)

Estimated 2065 CVEs affecting Product by Nov

2022 based on historic 0.58 CWEs per day

Page 15: September 13, 2016: Security in the Age of Open Source:

How are Companies Managing Open Source Today? Not Well.

TRACKING VULNERABILITIES• No single responsible entity• Manual effort and labor intensive• Unmanageable (11/day)• Match applications, versions,

components, vulnerabilities

SPREADSHEET INVENTORY• Depends on developer best effort or

memory• Difficult maintenance• Not source of truth

MANUAL TABULATION• Architectural Review Board• Occurs at end of SDLC• High effort and low accuracy• No controls

VULNERABILITY DETECTIONRun monthly/quarterly vulnerability assessment tools (e.g., Nessus, Nexpose) against all applications to identify exploitable instances

Page 16: September 13, 2016: Security in the Age of Open Source:

Automating Five Critical Tasks and Having a Bill of Materials Provide Distinct Advantage

INVENTORYOpen

Source Software

MAPKnown

Security Vulnerabiliti

es

IDENTIFTYLicense

Compliance Risks

TRACKRemediation Priorities & Progress

ALERTNew

Vulnerabilities Affecting You

Visibility AND Control

1 2 3 4 5

Page 17: September 13, 2016: Security in the Age of Open Source:

Best Practices For Open Source

• Build and automatically enforce OSS policies• Identify OSS components early in the SDLC• Automatically create and maintain bills of material• Continuously monitor threat environment for new

vulnerabilitiesReqs• OSS Policies• Application

Criticality Ranking• OSS Risk

Parameters• License Risk• Security Risk• Operational Risk

Design• OSS Selection• Design Review• License Risk• Security Risk• Operational Risk

Code• OSS Detection• Automatically

detect and alert on non-conforming components

• Correlation with Bills of Material

Test• OSS Enforcement• Detect and alert on

non-conforming components

• Correlation with Bills of Material

Release• OSS Monitoring• Timely OSS

Vulnerability Identification & Reporting

• Bug Severity • Remediation Advice

Page 18: September 13, 2016: Security in the Age of Open Source:

Key Takeaways• Security testing is a good thing• It identifies common vulnerabilities in the code

companies write• Different testing methodologies are better suited for

different bug types• Open Source Security isn’t covered by traditional

tools• Monitor for open source with known vulnerabilities,

early in the SDL• Monitor production code for new vulnerabilities

• Security testing is a point-in-time snapshot• New vulnerabilities may result from…

• Changes to code can change security posture• Changes in the threat environment, even if the code hasn’t

changed

Page 19: September 13, 2016: Security in the Age of Open Source:

7 of the top 10 Software companies, and 44 of the top 100

6 of the top 8 Mobile handset vendors

6 of the top 10 Investment Banks

24Countries

250+Employees

1,600Customers

27 of the Fortune 100

About Black Duck

Award for Innovation

Gartner Group “Cool

Vendor”

“Top Place to Work,”

The Boston Globe

Four Years in the “Software 500” Largest

Software Companies

Six Years in a row for

Innovation

2014

Page 20: September 13, 2016: Security in the Age of Open Source:

Flight16 – Black Duck Conference Join us on October 4th – 6th for Flight16, Black Duck’s inaugural customer conference at the Seaport Hotel & World Trade Center in Boston, MA.• 2 ½ days focused on providing you with a fresh perspective on today’s security

threat landscape and helping you more effectively secure and manage open source.

• Three conference tracks• Technology, Security, & Legal/Compliance

• One-on-one sessions with Black Duck experts• Inspiring keynotes with

• Defense Intelligence Agency Director General Michael Flynn• Cigital CTO Gary McGraw• Black Duck CEO Lou Shipley

• Use code BOSTONLUNCH to register for free before September 16th.

Page 21: September 13, 2016: Security in the Age of Open Source: