{"id":597965,"date":"2023-01-16T05:50:41","date_gmt":"2023-01-16T11:50:41","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/16\/dont-forget-open-source-software-oss-when-assessing-cloud-app-security\/"},"modified":"2023-01-16T05:50:41","modified_gmt":"2023-01-16T11:50:41","slug":"dont-forget-open-source-software-oss-when-assessing-cloud-app-security","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/16\/dont-forget-open-source-software-oss-when-assessing-cloud-app-security\/","title":{"rendered":"Don\u2019t forget open source software (OSS) when assessing cloud app security"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2023-01-15T17:10:00+00:00\" datetime=\"2023-01-15T17:10:00+00:00\">January 15, 2023 9:10 AM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2022\/08\/GettyImages-1371738261.jpg?fit=750%2C500&#038;strip=all\" alt=\"3D technology illustration Fingerprint scanner with cloud integrated with a printed circuit board. release binary code\"><\/p>\n<div>\n<p><span>3D technology illustration Fingerprint scanner with cloud integrated with a printed circuit board. release binary code<\/span><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2839101\">\n<div>\n<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>The software development process is getting quicker. Devops teams are under increased pressure to go to market, and they\u2019re able to work quickly, thanks in part to open-source software (<a href=\"https:\/\/venturebeat.com\/2021\/06\/18\/what-is-open-source\/\">OSS<\/a>) packages.\u00a0<\/p>\n<p>OSS has become so prevalent that it\u2019s estimated to factor into <a href=\"https:\/\/www.coreinfrastructure.org\/wp-content\/uploads\/sites\/6\/2020\/02\/census_ii_vulnerabilities_in_the_core.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">80 to 90%<\/a> of any given piece of modern software. But while it\u2019s been a great accelerator to software development, OSS creates a large surface area that needs to be protected because there are millions of packages created anonymously that developers use to build software.\u00a0<\/p>\n<p>Most open-source developers act in good faith; they are interested in making life easier for other developers who might encounter the same challenge they\u2019re looking to solve. It\u2019s a thankless job because there\u2019s no financial benefit to publishing an OSS package and plenty of backlash in comment threads. According to GitHub\u2019s <a href=\"https:\/\/opensourcesurvey.org\/2017\/#about:~:text=By%20far%2C%20the,experienced%20by%203%25).\" target=\"_blank\" rel=\"noreferrer noopener\">Open Source Survey<\/a>, \u201cthe most frequently encountered bad behavior is rudeness (45% witnessed, 16% experienced), followed by name calling (20% witnessed, 5% experienced) and stereotyping (11% witnessed, 3% experienced).\u201d<\/p>\n<p>Unfortunately, not every OSS package can be trusted. Attribution is hard to track for changes made to open-source code, so it becomes almost impossible to identify malicious actors who want to compromise the code\u2019s integrity. Malicious open source software packages have been inserted to make a point about big companies using these packages but not funding their development, and at other times for purely malicious reasons.\u00a0<\/p>\n<p><html><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>If an OSS package is used to build software and has a vulnerability, that software now has a vulnerability, too. A back-door vulnerability can potentially compromise millions of applications, as we saw with <a href=\"https:\/\/thenewstack.io\/log4j-is-one-big-i-told-you-so-for-open-source-communities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j<\/a> last year. According to <a href=\"https:\/\/www.openlogic.com\/success\/resources\/2022-open-source-report\" target=\"_blank\" rel=\"noreferrer noopener\">OpenLogic\u2019s<\/a> State of Open Source Report, 77% of organizations increased their use of OSS last year, and 36% reported that the increase was significant. But research from the <a href=\"https:\/\/resources.snyk.io\/state-of-open-source-security-report-2022?aliId=eyJpIjoiXC83SHZ3QVhKT2ZGMmgxUkQiLCJ0IjoiMzhXXC9YSmZYNU4rV3VsY25jN2JlYXc9PSJ9\" target=\"_blank\" rel=\"noreferrer noopener\">Linux Foundation<\/a> shows that only 49% of organizations have a security policy that covers OSS development or use.<\/p>\n<p>So how can you better understand the risk OSS poses to your <a href=\"https:\/\/venturebeat.com\/data-infrastructure\/5-top-trends-driving-data-infrastructure-strategies-according-to-gartner\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud<\/a> application development and work to mitigate it?\u00a0<\/p>\n<h2 id=\"h-get-visibility\">Get visibility<\/h2>\n<p>The first step in understanding what kind of threat you face is to understand the surface area of your application. Build <a href=\"https:\/\/venturebeat.com\/enterprise-analytics\/report-90-of-orgs-indicate-increased-demand-for-automation\/\" target=\"_blank\" rel=\"noreferrer noopener\">automation<\/a> into your <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> measures to gain visibility into which OSS packages and which versions are being used in your software. By starting as early as the integrated development environment (IDE), you can fit this practice into your developers\u2019 workflow, so they\u2019re not being slowed down.\u00a0<\/p>\n<p>Also consider infrastructure as code (IaC), such as <a href=\"https:\/\/venturebeat.com\/business\/terraform-hashicorp\/\" target=\"_blank\" rel=\"noreferrer noopener\">Terraform<\/a>. Are you aware of all the modules you\u2019re using? If someone else built them, do they adhere to your security controls?\u00a0<\/p>\n<p>Once you understand the scope of your OSS usage, you can slowly start to establish control.\u00a0You\u2019ll need to find a balance between oversight and developers\u2019 freedom and velocity.\u00a0<\/p>\n<h2>Dig in to open source software<\/h2>\n<p>The industry standard is Supply-chain Levels for Software Artifacts (<a href=\"https:\/\/slsa.dev\/\" target=\"_blank\" rel=\"noreferrer noopener\">SLSA<\/a>), a framework of standards and controls that aims \u201cto prevent tampering, improve integrity, and secure packages and infrastructure in your projects.\u201d There are certain tools you can use that leverage SLSA to identify if an OSS package has known issues before your developers start using it.<\/p>\n<p>From there, you should either establish an \u201callow list\u201d of trusted sources and reject all others, or at least audit instances where sources that aren\u2019t on the \u201callow list\u201d are used. Composition analysis like the one released by the <a href=\"https:\/\/github.com\/ossf\/package-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">Open Source Security Foundation<\/a> (OpenSSF) can help inform what that \u201callow list\u201d should look like.<\/p>\n<p>Tech giants have gotten in on open source software security too, considering they also use these packages. Google made a <a href=\"https:\/\/blog.google\/technology\/safety-security\/why-were-committing-10-billion-to-advance-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">$100 million<\/a> commitment \u201cto support third-party foundations, like OpenSSF, that manage open-source security priorities and help fix vulnerabilities.\u201d It also has a <a href=\"https:\/\/security.googleblog.com\/2023\/08\/Announcing-Googles-Open-Source-Software-Vulnerability-Rewards-Program%20.html\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty program<\/a> that it positions as a \u201creward program,\u201d to compensate researchers that find bugs in OSS packages.<\/p>\n<p><a href=\"https:\/\/www.techtimes.com\/articles\/275486\/20220516\/amazon-microsoft-google-more-invest-30m-reinforce-open-source-software.htm\" target=\"_blank\" rel=\"noreferrer noopener\">A separate initiative<\/a> headlined by Amazon, Microsoft and Google includes $10 million to reinforce open-source software security, but that\u2019s 0.001% of the companies\u2019 combined 2021 revenue. While an admirable and important effort, it\u2019s a drop in the bucket in comparison to the scope of the issue.\u00a0<\/p>\n<h2>Raise awareness<\/h2>\n<p>Larger investments from tech giants that depend on OSS and its continued innovations are needed, but we also need more community participation and education.<\/p>\n<p>OSS packages benefit the greater good for developers, and the landscape encourages the anonymity of those code authors. So, where do we go from here in prioritizing security?<\/p>\n<p>Training developers at the university level on the potential risks associated with blindly adding OSS packages into software code is a good place to start. This training should continue at the professional level so organizations can protect themselves from the threats that sometimes infiltrate these packages and, in all likelihood, their software, too.\u00a0<\/p>\n<p>Leaning on organizations like the Cloud Native Computing Foundation (<a href=\"https:\/\/www.cncf.io\/blog\/2022\/08\/23\/mid-year-update-on-2022-cncf-linux-foundation-and-open-source-velocity\/\" target=\"_blank\" rel=\"noreferrer noopener\">CNCF<\/a>), which has charted some of the best open-source projects, also offers good groundwork.<\/p>\n<p>Open source software packages are a vital component of the increased velocity of application development, but we need to pay better attention to what\u2019s inside them to limit their risk and fend off <a href=\"https:\/\/venturebeat.com\/2022\/05\/20\/report-frequency-of-cyberattacks-in-2022-has-increased-by-almost-3m\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyberattacks<\/a>.<\/p>\n<p><em>Aakash Shah is cofounder and CTO at oak9<\/em>.<\/p>\n<div id=\"boilerplate_2736392\">\n<h3 id=\"h-datadecisionmakers\">DataDecisionMakers<\/h3>\n<p>Welcome to the VentureBeat community!<\/p>\n<p>DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.<\/p>\n<p>If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.<\/p>\n<p>You might even consider\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/venturebeat.com\/contribute-to-datadecisionmakers\/\">contributing an article<\/a>\u00a0of your own!<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/venturebeat.com\/category\/DataDecisionMakers\/\" target=\"_blank\">Read More From DataDecisionMakers<\/a><\/p>\n<\/div>\n<p>\t\t\t\t<\/html><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/programming-development\/dont-forget-open-source-software-oss-when-assessing-cloud-app-security\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Aakash Shah, oak9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>January 15, 2023 9:10 AM 3D technology illustration Fingerprint scanner with cloud integrated with a printed circuit board. release binary code Check out all the on-demand sessions from the Intelligent Security Summit here. The software development process is getting quicker. Devops teams are under increased pressure to go to market, and they\u2019re able to work<\/p>\n","protected":false},"author":1,"featured_media":597966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[640,3278,46],"tags":[],"class_list":{"0":"post-597965","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-dont","8":"category-source","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/597965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=597965"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/597965\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/597966"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=597965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=597965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=597965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}