SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
2013 SONATYPE
SURVEY FINDINGS
OUR WORLD RUNS ON SOFTWARE, AND SOFTWARE RUNS ON OPEN
SOURCE COMPONENTS. EVERY YEAR, WE ASK THOSE ON THE FRONT
LINES—DEVELOPERS, ARCHITECTS, AND MANAGERS, ABOUT HOW
THEY'RE USING COMPONENTS, AND HOW THEY'RE BALANCING THE
NEED FOR SPEED WITH THE NEED FOR SECURITY.
THIS YEAR
3,500PEOPLE PROVIDED THEIR VIEWS
85% OF THE RESPONSES
CAME FROM DEVELOPERS,
MANAGERS AND ARCHITECTS
Who took the survey?
Just some of the organizations
represented
25% OF THE
RESPONDANTS HAVE
MORE THAN
500 DEVELOPERS
IN THEIR ORGANIZATION
> 50 COUNTRIES,
CONCENTRATION
US/EMEA
Question: Would it surprise you to know that 80% of a
typical Java application is now assembled from open
source components and frameworks?
64% Think that 80% seems about right
22% Feel that 80% seems a bit low
14% Believe that 80% seems a bit high
At least 80% of a typical java application is assembled
from open source components and frameworks.
Yes, It’s True!
Many of the applications you
use today are now assembled
from hundreds of open
source components.
Component downloads from the
Central Repository have exploded.
1,000
2,000
3,000
4,000
5,000
6,000
7,000
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
RequestsinMillions
Growth Drivers
MOBILE CLOUD
BIG DATAWEB APPS
8 Billion
Requests in 2012
Question: For your organization, please rate the following sources of open source
components. (Percentage reporting critical and important.)
78%
Download directly
from project site
47%
Atlassian
41%
JBoss
40%
GitHub
34%
RubyGems.org
13%
CPAN
9%
PyPl
6%
Nearly 80% of organizations report that the
components of The Central Repository (Maven Central)
are important to their development efforts.
The Central Repository (Maven Central)
This is nearly double the popularity of any other source of components.
Question: Does your company have an open source policy?
43% Yes
57% No
Even given all this usage, 57% of organizations lack any
policy governing open source usage.
76% of Organizations Lack Meaningful Controls
Over their Open Source Usage
32% There are no standards.
Each developer or team chooses the
components that are best for their project.
44% Yes, We have some corporate standards,
but they aren't enforced
24% We're completely locked down.
We can only use approved components.
Question: How well does your organization control which components are used in
software development projects?
Question: How well does your organization control which components are used in
software development projects?
16% There are no standards.
Each developer or team chooses the
components that are best for their project.
46% Yes, We have some corporate standards,
but they aren't enforced
38% We're completely locked down.
We can only use approved components.
Last year: 33%
Even if they have a policy, only 38% of
organizations have control over what components
are used in their applications.
Question: What are the biggest challenges with your open source policy?
31% There is no
enforcement
28% It slows down
development
27% We find out about
problems too late
in the process
“There is insufficient
information to definitively
determine compliance.”
“A lot of the rules are loose
and it's easy to get lazy
about stuff.”
“The people making the
policy have no development
or technical skills.”
“Good security design
means slower development.”
Open source policies are not only unenforced,
they get in the way.
16%
7%
13%
36%
Application Development
Management
Risk & Compliance
Security
Legal
Other
OSS/FOSS/Commitee/
Department
IT Operations
7%
7%14%
No one and everyone is responsible for
open source policy.
Question: Who in your organization has primary responsibility for open source
policy/governance?
OUR POLICY DOES NOT ADDRESS
SECURITY VULNERABILITIES
WE MUST PROVE THAT WE
ARE NOT USING COMPONENTS
WITH KNOWN VULNERABILITIES
OUR POLICY SAYS THAT WE MUST
AVOID KNOWN VULNERABILITIES
29%24%47%
Question: How does your open source policy address security vulnerabilities?
Only 1 in 4 organizations must prove they're not using components with known vulnerabilites.
Even organizations with an open source
policy are doing little to prevent security
vulnerabilities from creeping in.
Question: How would you characterize your developers’
interest in application security?
40%
This is a top concern
for us and we spend
a lot of time here
6%
It's just not something
we're focused on
26%
We know it's important,
but we just don't have
the time to spend on it
29%
We do what we have to
do, but this is the security
group's responsibility
Forget about policy, developers just aren't that
interested in security. More than 60% of developers
don't spend much time in this area.
51%
Yes and and we examine
every component and *all*
of its dependencies
29%
Yes and we examine
every component but
*not* its dependencies
20%
No, our policy does not
restrict component usage
based on licensing
Question: Does your policy restrict component usage based on
specific licenses or license types?
We're a little better at licensing, but still not very good.
Question: Does your organization maintain an inventory of open source components
used in production applications?
45% No
21% Yes, for all components but
NOT their dependencies
35% Yes, for all components
including dependencies
Getting Better!
Last year: 32%
Things don't get much better once
applications are in production.
NEARLY 2/3 OF ORGANIZATIONS
DON'T EVEN MAINTAIN A
COMPLETE BILL OF MATERIALS
FOR THEIR APPLICATIONS.
The answers to our survey point to a tradeoff.
- a dangerous tradeoff -
between speed and security
Development is agile, component-based,
and open source. Security hasn't kept up.
There has to be a better way.
SECURITY SPEED
FIXING THE RISK:
GOOD COMPONENT PRACTICE
SO WE KNOW THERE'S A RISK. WHAT DO WE DO ABOUT IT?
7 STEPSTO GOOD COMPONENT PRACTICE
DESIGNED TO HELP YOUR
DEVELOPERS GO FAST, AND YOUR
ORGANZIATION TO BE SECURE.
Step 1
CREATE AN OPEN SOURCE POLICY, IF YOU DON'T ALREADY HAVE ONE.
MAKE IT WORK FOR DEVELOPMENT OR IT WON'T WORK AT ALL.
Step 2
ENSURE YOUR POLICY COVERS ALL ASPECTS OF COMPONENT MANAGEMENT:
SECURITY, LICENSING, AND ARCHITECTURE.
Step 3
GIVE DEVELOPERS THE INFORMATION THEY NEED TO MAKE GOOD DECISIONS UP FRONT.
Step 4
MAKE SURE YOUR POLICY IS AUTOMATICALLY
APPLIED IN THE TOOLS YOUR DEVELOPERS ALREADY USE.
Step 5
BEFORE GOING TO PRODUCTION, CREATE AND MAINTAIN A
COMPLETE LIST OF DEPENDENCIES. OTHERWISE, YOU WON'T KNOW
WHERE TO LOOK WHEN THERE IS A PROBLEM.
IP Risk
Quality Risk
Step 6
WATCH OUT FOR NEW FLAWS.
NEW COMPONENT VULNERABILITIES EMERGE ALL THE TIME.
Step 7
HAVE A REMEDIATION PLAN. HOPE IS NOT A STRATEGY.
KNOW HOW YOU WILL FIX PROBLEMS—REGARDLESS OF WHERE
THEY OCCUR IN THE LIFECYCLE.
Want to learn more?
SONATYPE CAN HELP. VISIT WWW.SONATYPE.COM/CLM
DESIGN IT BUILD IT RELEASE IT MANAGE ITDEVELOP IT
1. Secure Consumption
with the use of certified
components and integrity
checking throughout the
lifecycle
2. Govern Development
to ensure policy compliance
without disrupting developer
productivity
3. Profile Exposures
to proactively identify and
prioritize action
4. Remediate Risk
by preventing and quickly
fixing security and IP
vulnerabilities
5. Monitor Threats
in production applications to
ensure continuous trust in
critical operations
SONATYPE CLM
Sonatype's annual community survey is the industry's largest, most comprehensive
primary research on open source usage from a developers point of view. 2013 saw
record participation with more than 3,500 participants.
Largest Open Source Survey of Its Kind
2011
1,600 2,500 3,545
2012 2013
Number of respondents
Meet Sonatype,
the Component Lifecycle Management Company
FOUNDERS APACHE MAVEN AND M2ECLIPSE
DISTRIBUTORS OF THE NEXUS REPOSITORY MANAGER
CREATORS OF COMPONENT LIFECYCLE MANAGEMENT
8 BILLION REQUESTS
FROM 70,000
ORGANIZATIONS
9 MILLION DEVELOPERS
20,000 ORGANIZATIONS
SECURING THE WORLD’S
SOFTWARE SUPPLY
CHAIN AT THE SPEED OF
DEVELOPMENT
OPERATORS OF THE CENTRAL REPOSITORY

Más contenido relacionado

La actualidad más candente

Accelerating Your Digital Agenda with Continuous Testing ft. Forrester
Accelerating Your Digital Agenda with Continuous Testing ft. ForresterAccelerating Your Digital Agenda with Continuous Testing ft. Forrester
Accelerating Your Digital Agenda with Continuous Testing ft. ForresterSauce Labs
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementSBWebinars
 
Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It WorkIANS
 
4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Testbugcrowd
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Black Duck by Synopsys
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceSolarWinds
 
Mentors View: Aligning Your Team and Your Powers for Success
Mentors View: Aligning Your Team and Your Powers for SuccessMentors View: Aligning Your Team and Your Powers for Success
Mentors View: Aligning Your Team and Your Powers for SuccessSonatype
 
Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)SolarWinds
 
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsPrioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsSAIL_QU
 
Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)SolarWinds
 
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...Sauce Labs
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTEDbugcrowd
 
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)SolarWinds
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)SolarWinds
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondBlack Duck by Synopsys
 
Owasp top 10-2017
Owasp top 10-2017Owasp top 10-2017
Owasp top 10-2017malvvv
 
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)Survey: IT is Everywhere (IT Professionals’ Perspective, Global)
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)SolarWinds
 
Survey: IT is Everywhere (End Users’ Perspective, Brazil)
Survey: IT is Everywhere (End Users’ Perspective, Brazil)Survey: IT is Everywhere (End Users’ Perspective, Brazil)
Survey: IT is Everywhere (End Users’ Perspective, Brazil)SolarWinds
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceRogue Wave Software
 

La actualidad más candente (20)

Accelerating Your Digital Agenda with Continuous Testing ft. Forrester
Accelerating Your Digital Agenda with Continuous Testing ft. ForresterAccelerating Your Digital Agenda with Continuous Testing ft. Forrester
Accelerating Your Digital Agenda with Continuous Testing ft. Forrester
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 
Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
Mentors View: Aligning Your Team and Your Powers for Success
Mentors View: Aligning Your Team and Your Powers for SuccessMentors View: Aligning Your Team and Your Powers for Success
Mentors View: Aligning Your Team and Your Powers for Success
 
Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)
 
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsPrioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
 
Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)
 
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...
Accelerating Innovation: Leveraging Open Source to Optimize Your Shift-Left I...
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and Beyond
 
Owasp top 10-2017
Owasp top 10-2017Owasp top 10-2017
Owasp top 10-2017
 
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)Survey: IT is Everywhere (IT Professionals’ Perspective, Global)
Survey: IT is Everywhere (IT Professionals’ Perspective, Global)
 
Survey: IT is Everywhere (End Users’ Perspective, Brazil)
Survey: IT is Everywhere (End Users’ Perspective, Brazil)Survey: IT is Everywhere (End Users’ Perspective, Brazil)
Survey: IT is Everywhere (End Users’ Perspective, Brazil)
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 

Destacado

4 Outcomes of an Advanced Repo Manager Strategy
4 Outcomes of an Advanced Repo Manager Strategy4 Outcomes of an Advanced Repo Manager Strategy
4 Outcomes of an Advanced Repo Manager StrategySonatype
 
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...EclipseDayParis
 
White Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementWhite Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementSonatype
 
Repository Management with JFrog Artifactory
Repository Management with JFrog ArtifactoryRepository Management with JFrog Artifactory
Repository Management with JFrog ArtifactoryStephen Chin
 
Artifactory Docker Integration Webinar
Artifactory Docker Integration WebinarArtifactory Docker Integration Webinar
Artifactory Docker Integration WebinarBaruch Sadogursky
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...Sonatype
 

Destacado (6)

4 Outcomes of an Advanced Repo Manager Strategy
4 Outcomes of an Advanced Repo Manager Strategy4 Outcomes of an Advanced Repo Manager Strategy
4 Outcomes of an Advanced Repo Manager Strategy
 
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
Next Generation Development Infrastructure: Maven, m2eclipse, Nexus & Hudson ...
 
White Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository ManagementWhite Paper: Concepts and Benefits of Repository Management
White Paper: Concepts and Benefits of Repository Management
 
Repository Management with JFrog Artifactory
Repository Management with JFrog ArtifactoryRepository Management with JFrog Artifactory
Repository Management with JFrog Artifactory
 
Artifactory Docker Integration Webinar
Artifactory Docker Integration WebinarArtifactory Docker Integration Webinar
Artifactory Docker Integration Webinar
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 

Similar a Sonatype's 2013 OSS Software Survey

Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
The Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentThe Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentSonatype
 
AtlassianDevOpsTrendsSurvey2020.pdf
AtlassianDevOpsTrendsSurvey2020.pdfAtlassianDevOpsTrendsSurvey2020.pdf
AtlassianDevOpsTrendsSurvey2020.pdfPrasannaKumarN8
 
eb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfeb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfSajid Ali
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC Advisory Group
 
Scaling Software Delivery.pdf
Scaling Software Delivery.pdfScaling Software Delivery.pdf
Scaling Software Delivery.pdfTiffany Jachja
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Sonatype
 
2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results2016 Future of Open Source Survey Results
2016 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey ResultsTim Mackey
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
Slides from "Taking an Holistic Approach to Product Quality"
Slides from "Taking an Holistic Approach to Product Quality"Slides from "Taking an Holistic Approach to Product Quality"
Slides from "Taking an Holistic Approach to Product Quality"Peter Marshall
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранSigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecurityVlad Styran
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design DecisionsRikki Wright
 
Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Denim Group
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 

Similar a Sonatype's 2013 OSS Software Survey (20)

Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
The Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentThe Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software Development
 
AtlassianDevOpsTrendsSurvey2020.pdf
AtlassianDevOpsTrendsSurvey2020.pdfAtlassianDevOpsTrendsSurvey2020.pdf
AtlassianDevOpsTrendsSurvey2020.pdf
 
eb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfeb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdf
 
Aliens in Your Apps!
Aliens in Your Apps!Aliens in Your Apps!
Aliens in Your Apps!
 
Developer Skills Report
Developer Skills ReportDeveloper Skills Report
Developer Skills Report
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Scaling Software Delivery.pdf
Scaling Software Delivery.pdfScaling Software Delivery.pdf
Scaling Software Delivery.pdf
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
 
2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results2016 Future of Open Source Survey Results
2016 Future of Open Source Survey Results
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey Results
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Example_Whitepaper
Example_WhitepaperExample_Whitepaper
Example_Whitepaper
 
Slides from "Taking an Holistic Approach to Product Quality"
Slides from "Taking an Holistic Approach to Product Quality"Slides from "Taking an Holistic Approach to Product Quality"
Slides from "Taking an Holistic Approach to Product Quality"
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 

Más de Sonatype

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019Sonatype
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference ArchitecturesSonatype
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxSonatype
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018Sonatype
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOpsSonatype
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps SurveySonatype
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseSonatype
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesSonatype
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandSonatype
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealSonatype
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way ForwardSonatype
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizSonatype
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanSonatype
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsSonatype
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsSonatype
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSSonatype
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsSonatype
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure AutomationSonatype
 

Más de Sonatype (20)

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all Equifax
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the Enterprise
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & Microservices
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen Beal
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way Forward
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward Ruiz
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris Swan
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin Collins
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with Jenkins
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure Automation
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Sonatype's 2013 OSS Software Survey

  • 2. OUR WORLD RUNS ON SOFTWARE, AND SOFTWARE RUNS ON OPEN SOURCE COMPONENTS. EVERY YEAR, WE ASK THOSE ON THE FRONT LINES—DEVELOPERS, ARCHITECTS, AND MANAGERS, ABOUT HOW THEY'RE USING COMPONENTS, AND HOW THEY'RE BALANCING THE NEED FOR SPEED WITH THE NEED FOR SECURITY. THIS YEAR 3,500PEOPLE PROVIDED THEIR VIEWS
  • 3. 85% OF THE RESPONSES CAME FROM DEVELOPERS, MANAGERS AND ARCHITECTS Who took the survey? Just some of the organizations represented 25% OF THE RESPONDANTS HAVE MORE THAN 500 DEVELOPERS IN THEIR ORGANIZATION > 50 COUNTRIES, CONCENTRATION US/EMEA
  • 4. Question: Would it surprise you to know that 80% of a typical Java application is now assembled from open source components and frameworks? 64% Think that 80% seems about right 22% Feel that 80% seems a bit low 14% Believe that 80% seems a bit high At least 80% of a typical java application is assembled from open source components and frameworks. Yes, It’s True! Many of the applications you use today are now assembled from hundreds of open source components.
  • 5. Component downloads from the Central Repository have exploded. 1,000 2,000 3,000 4,000 5,000 6,000 7,000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 RequestsinMillions Growth Drivers MOBILE CLOUD BIG DATAWEB APPS 8 Billion Requests in 2012
  • 6. Question: For your organization, please rate the following sources of open source components. (Percentage reporting critical and important.) 78% Download directly from project site 47% Atlassian 41% JBoss 40% GitHub 34% RubyGems.org 13% CPAN 9% PyPl 6% Nearly 80% of organizations report that the components of The Central Repository (Maven Central) are important to their development efforts. The Central Repository (Maven Central) This is nearly double the popularity of any other source of components.
  • 7. Question: Does your company have an open source policy? 43% Yes 57% No Even given all this usage, 57% of organizations lack any policy governing open source usage.
  • 8. 76% of Organizations Lack Meaningful Controls Over their Open Source Usage 32% There are no standards. Each developer or team chooses the components that are best for their project. 44% Yes, We have some corporate standards, but they aren't enforced 24% We're completely locked down. We can only use approved components. Question: How well does your organization control which components are used in software development projects?
  • 9. Question: How well does your organization control which components are used in software development projects? 16% There are no standards. Each developer or team chooses the components that are best for their project. 46% Yes, We have some corporate standards, but they aren't enforced 38% We're completely locked down. We can only use approved components. Last year: 33% Even if they have a policy, only 38% of organizations have control over what components are used in their applications.
  • 10. Question: What are the biggest challenges with your open source policy? 31% There is no enforcement 28% It slows down development 27% We find out about problems too late in the process “There is insufficient information to definitively determine compliance.” “A lot of the rules are loose and it's easy to get lazy about stuff.” “The people making the policy have no development or technical skills.” “Good security design means slower development.” Open source policies are not only unenforced, they get in the way.
  • 11. 16% 7% 13% 36% Application Development Management Risk & Compliance Security Legal Other OSS/FOSS/Commitee/ Department IT Operations 7% 7%14% No one and everyone is responsible for open source policy. Question: Who in your organization has primary responsibility for open source policy/governance?
  • 12. OUR POLICY DOES NOT ADDRESS SECURITY VULNERABILITIES WE MUST PROVE THAT WE ARE NOT USING COMPONENTS WITH KNOWN VULNERABILITIES OUR POLICY SAYS THAT WE MUST AVOID KNOWN VULNERABILITIES 29%24%47% Question: How does your open source policy address security vulnerabilities? Only 1 in 4 organizations must prove they're not using components with known vulnerabilites. Even organizations with an open source policy are doing little to prevent security vulnerabilities from creeping in.
  • 13. Question: How would you characterize your developers’ interest in application security? 40% This is a top concern for us and we spend a lot of time here 6% It's just not something we're focused on 26% We know it's important, but we just don't have the time to spend on it 29% We do what we have to do, but this is the security group's responsibility Forget about policy, developers just aren't that interested in security. More than 60% of developers don't spend much time in this area.
  • 14. 51% Yes and and we examine every component and *all* of its dependencies 29% Yes and we examine every component but *not* its dependencies 20% No, our policy does not restrict component usage based on licensing Question: Does your policy restrict component usage based on specific licenses or license types? We're a little better at licensing, but still not very good.
  • 15. Question: Does your organization maintain an inventory of open source components used in production applications? 45% No 21% Yes, for all components but NOT their dependencies 35% Yes, for all components including dependencies Getting Better! Last year: 32% Things don't get much better once applications are in production. NEARLY 2/3 OF ORGANIZATIONS DON'T EVEN MAINTAIN A COMPLETE BILL OF MATERIALS FOR THEIR APPLICATIONS.
  • 16. The answers to our survey point to a tradeoff. - a dangerous tradeoff - between speed and security Development is agile, component-based, and open source. Security hasn't kept up. There has to be a better way. SECURITY SPEED
  • 17. FIXING THE RISK: GOOD COMPONENT PRACTICE
  • 18. SO WE KNOW THERE'S A RISK. WHAT DO WE DO ABOUT IT? 7 STEPSTO GOOD COMPONENT PRACTICE DESIGNED TO HELP YOUR DEVELOPERS GO FAST, AND YOUR ORGANZIATION TO BE SECURE.
  • 19. Step 1 CREATE AN OPEN SOURCE POLICY, IF YOU DON'T ALREADY HAVE ONE. MAKE IT WORK FOR DEVELOPMENT OR IT WON'T WORK AT ALL.
  • 20. Step 2 ENSURE YOUR POLICY COVERS ALL ASPECTS OF COMPONENT MANAGEMENT: SECURITY, LICENSING, AND ARCHITECTURE.
  • 21. Step 3 GIVE DEVELOPERS THE INFORMATION THEY NEED TO MAKE GOOD DECISIONS UP FRONT.
  • 22. Step 4 MAKE SURE YOUR POLICY IS AUTOMATICALLY APPLIED IN THE TOOLS YOUR DEVELOPERS ALREADY USE.
  • 23. Step 5 BEFORE GOING TO PRODUCTION, CREATE AND MAINTAIN A COMPLETE LIST OF DEPENDENCIES. OTHERWISE, YOU WON'T KNOW WHERE TO LOOK WHEN THERE IS A PROBLEM. IP Risk Quality Risk
  • 24. Step 6 WATCH OUT FOR NEW FLAWS. NEW COMPONENT VULNERABILITIES EMERGE ALL THE TIME.
  • 25. Step 7 HAVE A REMEDIATION PLAN. HOPE IS NOT A STRATEGY. KNOW HOW YOU WILL FIX PROBLEMS—REGARDLESS OF WHERE THEY OCCUR IN THE LIFECYCLE.
  • 26. Want to learn more? SONATYPE CAN HELP. VISIT WWW.SONATYPE.COM/CLM DESIGN IT BUILD IT RELEASE IT MANAGE ITDEVELOP IT 1. Secure Consumption with the use of certified components and integrity checking throughout the lifecycle 2. Govern Development to ensure policy compliance without disrupting developer productivity 3. Profile Exposures to proactively identify and prioritize action 4. Remediate Risk by preventing and quickly fixing security and IP vulnerabilities 5. Monitor Threats in production applications to ensure continuous trust in critical operations SONATYPE CLM
  • 27. Sonatype's annual community survey is the industry's largest, most comprehensive primary research on open source usage from a developers point of view. 2013 saw record participation with more than 3,500 participants. Largest Open Source Survey of Its Kind 2011 1,600 2,500 3,545 2012 2013 Number of respondents
  • 28. Meet Sonatype, the Component Lifecycle Management Company FOUNDERS APACHE MAVEN AND M2ECLIPSE DISTRIBUTORS OF THE NEXUS REPOSITORY MANAGER CREATORS OF COMPONENT LIFECYCLE MANAGEMENT 8 BILLION REQUESTS FROM 70,000 ORGANIZATIONS 9 MILLION DEVELOPERS 20,000 ORGANIZATIONS SECURING THE WORLD’S SOFTWARE SUPPLY CHAIN AT THE SPEED OF DEVELOPMENT OPERATORS OF THE CENTRAL REPOSITORY