SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Managing the Software Supply Chain
Policies that Promote Innovation While
Optimizing Security and Compliance
Jeff Luszcz
@jeffluszcz
jluszcz@flexera.com
What is the Software Supply Chain?
• Commercial Proprietary software companies (e.g. Microsoft, Oracle)
• Projects hosted on Open source repositories (e.g. project on Github or Sourceforge.net)
• Major Open source projects (eg. Apache, Jboss )
• Commercial Open Source companies (e.g. MySQL, Sugar CRM)
• University and personal websites
• “The Web” (Blogs, websites, StackOverflow, etc..)
• Books and Magazines
• Competitors
• “Yourself” – other business units’ products or tools
What Are Companies Concerned About?
• Vulnerabilities
• Non-compliant usage of GPL and other Copyleft Licenses (esp GPL v3.0)
• Affero GPL
• Commercial Content and Libraries
• Restrictions on commercial use or field of use (e.g. no Military use)
• Cryptography
• Code with Unknown Licenses
• What is the % of undisclosed or non-compliant content
• Who can fix the problems that are found?
GNU Bash
• Potentially affects hundreds of
millions of computers, servers and
devices
• Shellshock can be used to remotely
take control of almost any system
using Bash
• Typical age: 5 years
old (seen 13 years!)
Linux GNU C Library (glibc)
• Affects almost all major 

Linux distributions
• Millions of servers on the Internet
contain this vulnerability
• Typical age: 3 years
OpenSSL
• 17% of the Internet's secure web
servers (500M) believed to be
vulnerable to the attack
• Allowed theft of the servers'
private keys, users' session
cookies and passwords
• Typical age: 3-4+
years old
Apache Struts2
• Remote Code Execution (RCE)
vulnerability in the Jakarta Multipart
parser
• Allows attacker to execute malicious
commands on the server when
uploading files
• Exploits are publicly available, simple
to carry out, and reliable
Heartbleed
CVE-2014-0160
Shellshock
CVE-2014-6271
Ghost
CVE-2015-0235 CVE-2017-5638
Known Vulnerabilities
5
Knowledge of the Components that are in use
Most Organizations
Typically Know
LESS THAN 10%
Of What Is
Actually Used
2013
2014
2015
2016
560
454
252236
27
8
2925
Customer Estimate Flexera Audit Results
Source: Flexera Professional Services Audit Data 2011 - 2016
How has the supply chain changed over time?
0
200
400
600
800
2011 2012 2013 2014 2015 2016 2017
Found
Disclosed
  Found Disclosed % Disclosed
2011 135 18 13%
2012 221 25 11%
2013 236 25 11%
2014 252 29 12%
2015 454 8 2%
2016 560 27 5%
2017 718 12 2%
D I S C L O S U R E T O
A W A R E N E S S
A W A R E N E S S T O 

R E M E D I A T I O N
Known Vulnerabilities and the Risk Window

7
0 20 40 60 80 100 120 140 160 180 200
DISCLOSURE AWARENESS REMEDIATION
D
T I M E T O 1 s t
E X P L O I T
A W A R E N E S S T O 

R E M E D I A T I O N
The Risk Window: Patch Tuesday Example

8
0 20 40 60 80 100 120 140 160 180 200
DAYS
156
DISCLOSURE
AWARENESS
REMEDIATION
D
• Average time to first Exploitation: 30 days1
• Risk Window: 156 days
1 – Source: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
2 – Source: “2016 State of Vulnerability Risk Management” NopSec http://info.nopsec.com/sov
Common areas of concern for Vulnerabilities
While it is best to have a “Full” accounting of all third party software, certain
components may have a higher priority than others.
1) Highly targeted “Famous” components (Struts 2, Openssl, etc..)
2) Cryptographic components – often highly targeted, and also have legal
tracking requirements for export anyway
3) Compression components – similar to cryptography in terms of usage and
programming techniques. Often highly targeted.
4) Multi-media components - Wildly used, often contains crypto and
compression routines themselves.
5) Applications Platforms – widely used, often contain crypto and compression,
complex
6) Databases – central to all systems, complex
7) Operating Systems / Linux Stack related components
Why do you need an Open Source license?
Copyright law (in many places) means that all source is explicitly
copyright the original author EVEN if not marked
You have no right to use someone else’s code without permission
Open Source (and commercial) licenses are the way of giving permission
to use source code
Lack of license shows lack of maturity for the OSS project, often a sign of
other problems!
It is not Open Source if you don’t have a license
Common Misunderstandings
• Just because code is available, this does not give you any permission to
use it.
• “Freely Available” != Open Source
• “Public Domain” is different from “Open Source”
• You are not “safe” if you don’t ship your product (unlike some licenses
like the GPL)
• The open source author does not owe you an answer (let alone an
answer you like) if you ask about licensing
• The author is not necessarily an expert on licensing
Company Risks for Unknown Third Party Code
• Open Source is NOT a problem! (not managing or following the obligations
is)
• Unmanaged Vulnerabilities
• OpenSSL / Heartbleed
• Struts 2
• License Infringement
• Copyleft implications for your source code (GPL)
• Envelope issues
• Forced to Stop production and replace code
• Monetary Damages – (Commercial or OSS)
Open Source – Obligations
• Open Source is commonly confused with “Free” as in no cost software
• Open source may be Free of Cost, but is not Free of Obligations
Common referred to as “Free as in Speech, not Free as in Beer”
• Open Source licenses have a list of obligations that you must follow in order to legally use the open source library
under that license
• The act of following these obligations is called OSS Compliance or License Compliance
• Your Compliance actions depends on how you are using these OSS components
• Most licenses have Multiple Obligations
Commonly Seen Obligations
Obligation Type of Obligation Definition
Share Source Copyleft aka Viral Author requires user to share source code
Give Credit Notice or Attribution Name of author must be reported in About Box, Documentation,
Website, etc…
Share Patents Patent Clause Author requires permission to use patents or license patents in this
open source project
Restrict use Restrict who can use this code Restriction on military use, restriction on nuclear facilities, geography/
countries, commercial use etc..
Vanity/One Off Licenses Give me free beer, say a prayer, Do No Evil Requests by the author to do some sort of action not typically seen in
contracts or licenses
Preserve Attribution Attribution Requires attribution/copyrights to be preserved in the source code
Disclaimer Disclaimer Explain that the open source author is not responsible for the use of
the software, even if it has defects
Supply Original License text License Text Requires text of entire license to be provided to users
Commercial Pay for use of code Classic software business model license
How can we stop this lack
of knowledge from
happening again?
Create a Process that works for your company
Security & IT Ops
Develop & Test
Proactive OSS/TPS Governance Program = Get Clean & Stay Clean
Open Source Review Board
Plan, Define & Design
Legal & IT Audit
Govern, Release & Maintain
“SET GOVERNANCE POLICY”
Develop corporate policies and standard
operating procedures (SOP) for usage of
OSS and licenses.
“GET CLEAN”
Conduct scans and review findings to
produce an accurate bill of materials of
OSS within your codebase.
“STAY CLEAN”
Proactively address new findings based
on codebase changes or planned
introduction of new OSS materials with
governed approval processes.
Codebase Audit
• Delta Scan + Results
Release Management
• License obligations compliance
• License compatibility analysis
• Third-party notices
• Source distributions
• Copyright notices
• Attribution flow-through
• Contributions back to OSS
• Patent issues & royalties
“STAY CLEAN”
Proactively address new findings based
on codebase changes or planned
introduction of new OSS materials with
governed approval processes.
Remediation
Project Management
• Configure scan settings
• Configure development tool
connectors (SCM + Build)
OSS/3rd Party Requests
• Disclosed Inventory (Proactive)
• Detected Inventory (Reactive)
Codebase Audit
Remediation
Inbound Review
“GET CLEAN”
Conduct scans and review findings to
produce an accurate bill of materials of
OSS within your codebase.
Inbound Review
• Detailed review of all inbound
third-party materials
• Third-party notices
• License obligations
• Corporate policies
“SET GOVERNANCE POLICY”
Develop corporate policies and standard
operating procedures (SOP) for usage of
OSS and licenses.
Project Management
• Start clean or copy existing
• Provision project users
• Define project workflow
• Configure development tools
connectors (ALM)
Create Clear, Dynamic
and Enforced policies
Properties of good OSS Policies
Clear:
Everyone is trained on current policies, at least once a year
Policies are easily available on the corporate intranet / wiki
Dynamic:
Policies quickly change as needs change
Enforced:
Products should not ship if OSS obligations are not met
What should we know in
order to set policies?
What should we know to set Policies (deployment style)?
What is the high level architecture of your product:
SaaS vs shipping product
Embedded Linux vs classic Application
Client / Server
Any Mobile applications?
Web front ends
External resources such as web services
Where do the OSS Packages live?
Product Stacks have many owners
The software development team is often different than the release team / IT team that puts a
product into production.
Things often fall in the gaps between these teams.
They often have different management, legal contacts, understanding of OSS licensing.
Companies many know some OSS from the release team (e.g. Linux, Apache httpd, MySQL, etc..)
or some OSS from the software team (zlib, openssl, etc..) but not always from both.
A “good” list for the IT team is often confused for a “good” list for the actual product.
Linux distributions often lead to long lists of OSS components but not always a clear
understanding of the company’s OSS choices in the product.
What should we know to set Policies?
Do you have a large patent portfolio?
Usage of certain licenses may affect your legal and patent
options due to Patent Grants and Patent Retaliation clauses
Do you understand how your product is distributed?
Do you understand how your product is linked?
Does your architecture require certain types of linking?
Do you use anyone else’s SDK?
Increase inbound
awareness of Licensing
What can we do to increase inbound awareness?
Encourage your developers to always look / ask for the license
of an OSS project
Train them on where licensing info is found
Ask explicit questions to your developers to gauge their
understanding of OSS licensing
Record all inbound usage from snippets to packages!
Log bugs against projects w/ no licenses
• 90%+ of OSS authors will pick a license when prompted
( Example https://github.com/etherkit/JTEncode/issues/1 )
Steps to set up a process
to discover and manage
your use of open source
How to Start Looking for OSS and TPS?
Get people together! The “Conference Room Effect” is very helpful to uncover
large unknown OSS and TPS components
Ask pointed questions (see list on next slide)
• What databases do we use?
• What encryption libraries?
• Etc..
Check with your commercial contract people for known Commercial
dependencies
REQUIRE: Commercial products to deliver current accurate third party
disclosure
Perform classic code reviews; keep reviewing
Perform initial OSS Code scans; keep scanning
Questions to ask your development team
❑Do we have a list of the open source and commercial libraries we are using?
❑How deep have we looked? How complete is this list?
❑What Cryptography, Compression, Multimedia and Application Server libraries are we using?
❑Does this lists include all libraries brought in though repository managers like RPM / Maven / Ruby
Gems / npm, etc…?
❑Do we have a list of all the web services we depend on? (e.g. credit card processors, stock price
lookup, time servers, etc…)
❑What Databases are we using? (including sql, nosql, embedded, hosted etc..)
❑Do we ship VMs, Containers or Applications to our customers? What OS, OSS components and
software stack are we shipping?
❑What is the “Full Stack” required to run our product – including the OS, DB, etc…?
❑Do we have a “Disclosure List” from our commercial vendors
Setting up an Open
Source Review Board
Setting up an OSRB
• An OSRB should be composed of technical, security, business and
legal representatives
• The job of the OSRB is to set and potentially enforce the Open
Source policy and act as an institutional memory
• The OSRB works best when people meet in person, but can be
virtualized as necessary
• OSRBs get better with time, don’t get discouraged
• OSRBs should be expected to change their minds based on new
information or discovered complexity
How to we get developers to buy in?
It’s tough: Developers want to ship and often route around process, esp. if it
not clear why the process exists.
“We should give credit where credit is due”
Attribution
“We are required to”
Legal Obligations
War stories (busybox, grsecurity, etc..)
Development gates
“We should help the Open Source project who help us”
Open Source Ethos
Time and Financial Support
If we don’t know we’re using how can we support them?
IP Risk Management: Levels of Analysis
Overview Audit
• High level BOM
• “Big Rocks”
• e.g. zlib and JBoss
Detailed Overview
• Third Party library BOM
• All Copyrights
• Large cut & paste
findings
Forensic
• Strong overview plus
• All cut & paste evidence
• Modification Review
• Commercial scf leakage
20 % Findings 80% Findings 100 % Findings
Software Supply Chain
While more companies are performing “pedigree scans” of individual OSS projects, this is
still a rare activity for most companies.
At first these were license oriented, but vulnerability analysis has been added
Data shows that the average OSS package has ~7 subcomponents.
Infrastructure pieces (e.g. Hadoop) will have dozens to hundreds of top level components
(not counting these envelope issues)
We expect more emphasis and contractual enforcement of supply chain disclosures to only increase.
What Is “Good Enough”?
• “Analysis Paralysis” is a real thing
• The Community is getting more varied and vocal, you should listen
• The “Community” includes commercial vendors who have different compliance views
• Customers are demanding more; at delivery and at contract signing
• More internal emphasis on tracking down source for pre-compiled binaries – compliance,
long term maintenance and disaster recovery
• Scanning is occurring at internal and external touch points
• More historical versions being reviewed at M&A time
• A supplier to my supplier is MY supplier! (Software Supply Chain concerns)
Have you disclosed or found everything? [Probably Not!]
• Java: Maven and external binary repositories are more prevalent
• C/C++/etc…: Github remote repositories
• Commercial Source compiled on laptop
• Binary analysis bar is being raised due to supply chain concerns
• Where did all these binaries come from? 1000 to 10,000+
• Web services are often overlooked
• Post acquisition discovery of missing code
IP Assets – Managing
How can you make this process easier to manage for yourself?
• Make it clear you expect Compliance
• Education
• Set a clear policy concerning third party inclusion
• Vet products before they are brought into the codebase
• Require comments to explain the origin of copied code
• Keep pristine copies of licensed code
• Audit often to catch surprises early
• Have a remediation plan in place
THANK YOU AND Q&A!
© 2017 Flexera | Company Confidential
JLuszcz@flexera.com
www.flexera.com
@JeffLuszcz

Más contenido relacionado

La actualidad más candente

BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suitejeff cheng
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitchi7
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Black Duck by Synopsys
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskProtecode
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open source software: The infrastructure impact
Open source software: The infrastructure impactOpen source software: The infrastructure impact
Open source software: The infrastructure impactRogue Wave Software
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskSource Code Control Limited
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
香港六合彩<六合彩
香港六合彩<六合彩香港六合彩<六合彩
香港六合彩<六合彩dqsmesc
 

La actualidad más candente (17)

BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open source software: The infrastructure impact
Open source software: The infrastructure impactOpen source software: The infrastructure impact
Open source software: The infrastructure impact
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
香港六合彩<六合彩
香港六合彩<六合彩香港六合彩<六合彩
香港六合彩<六合彩
 

Similar a Managing the Software Supply Chain: Policies that Promote Innovation While Optimizing Security and Compliance

Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationnexB Inc.
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Mindtrek
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseMarcel de Vries
 
Giving Everyone Access To Open Source Best Practices: The OpenChain Curriculum
Giving Everyone Access To Open Source Best Practices: The OpenChain CurriculumGiving Everyone Access To Open Source Best Practices: The OpenChain Curriculum
Giving Everyone Access To Open Source Best Practices: The OpenChain CurriculumShane Coughlan
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Black Duck by Synopsys
 
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...South Tyrol Free Software Conference
 
Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...All Things Open
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsRogue Wave Software
 
Open source software license
Open source software licenseOpen source software license
Open source software licenseaakash malhotra
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Rogue Wave Software
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Sonatype
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)Shivani Rai
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsBinary Semantics
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullGreat Wide Open
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The ThingsAll Things Open
 
Managing Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software ComplianceManaging Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software CompliancenexB Inc.
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareOpenStack
 

Similar a Managing the Software Supply Chain: Policies that Promote Innovation While Optimizing Security and Compliance (20)

Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Open Source ETL
Open Source ETLOpen Source ETL
Open Source ETL
 
Giving Everyone Access To Open Source Best Practices: The OpenChain Curriculum
Giving Everyone Access To Open Source Best Practices: The OpenChain CurriculumGiving Everyone Access To Open Source Best Practices: The OpenChain Curriculum
Giving Everyone Access To Open Source Best Practices: The OpenChain Curriculum
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
 
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
 
Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
Open source software license
Open source software licenseOpen source software license
Open source software license
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
My Seminar
My SeminarMy Seminar
My Seminar
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
Managing Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software ComplianceManaging Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software Compliance
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera Software
 

Más de FINOS

2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOSFINOS
 
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...FINOS
 
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...FINOS
 
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...FINOS
 
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web Intents
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web IntentsOSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web Intents
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web IntentsFINOS
 
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...FINOS
 
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...FINOS
 
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceOSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceFINOS
 
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...FINOS
 
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...FINOS
 
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...FINOS
 
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...FINOS
 
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...FINOS
 
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...FINOS
 
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...FINOS
 
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101FINOS
 
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...FINOS
 
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...FINOS
 
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise how not to ...
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise  how not to ...OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise  how not to ...
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise how not to ...FINOS
 
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...FINOS
 

Más de FINOS (20)

2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS
 
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
 
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...
OSSF 2018 - Steve Helvie of the Open Compute Network - Rethinking Infrastruct...
 
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...
OSSF 2018 - Stefan Just of Codescoop - OSCAR - a new approach to Software Com...
 
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web Intents
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web IntentsOSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web Intents
OSSF 2018 - Nick Kolba of OpenFin - FDC3 and the Legacy of Web Intents
 
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...
OSSF 2018 - Matt Barrett of Adaptive - Open sourcing a bank's software: exact...
 
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...
OSSF 2018 - Overcoming Compliance Barriers to Open Source Collaboration Infra...
 
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceOSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
 
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...
OSSF 2018 - Jeff Luszcz of Flexera - Day 2 - Open Source Culture, Standards, ...
 
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...
OSSF 2018 - Jeff Luszcz of Flexera - Common Open Source Intake Issues and How...
 
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...
OSSF 2018 - Jared Broad of QuantConnect - Motivations and Business Goals for ...
 
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...
OSSF 2018 - Jamie Jones of GitHub - Pull what where? Contributing to Open Sou...
 
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...
OSSF 2018 - Greg Olson of Open Source Sense - Building Mission- and Business-...
 
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...
OSSF 2018 - Dawn Foster of Pivotal - Open Source Collaboration: Finding the R...
 
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...
OSSF 2018 - David Kappos of Cravath, Swaine & Moore - Accounting for Patents ...
 
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
OSSF 2018 - David habusha of Whitesource - Open Source Vulnerabilities 101
 
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...
OSSF 2018 - Daniel Izquierdo of Bitergia / InnerSource Commons - Starting wit...
 
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...
OSSF 2018 - Danese Cooper of NearForm - Getting the most out of Open Source i...
 
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise how not to ...
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise  how not to ...OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise  how not to ...
OSSF 2018 - Colin Charles of GrokOpen - Community vs. enterprise how not to ...
 
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...
OSSF 2018 - Andrew Katz of Moorcrofts - OpenChain: a Tested Framework for Ope...
 

Último

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Managing the Software Supply Chain: Policies that Promote Innovation While Optimizing Security and Compliance

  • 1. Managing the Software Supply Chain Policies that Promote Innovation While Optimizing Security and Compliance Jeff Luszcz @jeffluszcz jluszcz@flexera.com
  • 2. What is the Software Supply Chain? • Commercial Proprietary software companies (e.g. Microsoft, Oracle) • Projects hosted on Open source repositories (e.g. project on Github or Sourceforge.net) • Major Open source projects (eg. Apache, Jboss ) • Commercial Open Source companies (e.g. MySQL, Sugar CRM) • University and personal websites • “The Web” (Blogs, websites, StackOverflow, etc..) • Books and Magazines • Competitors • “Yourself” – other business units’ products or tools
  • 3. What Are Companies Concerned About? • Vulnerabilities • Non-compliant usage of GPL and other Copyleft Licenses (esp GPL v3.0) • Affero GPL • Commercial Content and Libraries • Restrictions on commercial use or field of use (e.g. no Military use) • Cryptography • Code with Unknown Licenses • What is the % of undisclosed or non-compliant content • Who can fix the problems that are found?
  • 4. GNU Bash • Potentially affects hundreds of millions of computers, servers and devices • Shellshock can be used to remotely take control of almost any system using Bash • Typical age: 5 years old (seen 13 years!) Linux GNU C Library (glibc) • Affects almost all major 
 Linux distributions • Millions of servers on the Internet contain this vulnerability • Typical age: 3 years OpenSSL • 17% of the Internet's secure web servers (500M) believed to be vulnerable to the attack • Allowed theft of the servers' private keys, users' session cookies and passwords • Typical age: 3-4+ years old Apache Struts2 • Remote Code Execution (RCE) vulnerability in the Jakarta Multipart parser • Allows attacker to execute malicious commands on the server when uploading files • Exploits are publicly available, simple to carry out, and reliable Heartbleed CVE-2014-0160 Shellshock CVE-2014-6271 Ghost CVE-2015-0235 CVE-2017-5638 Known Vulnerabilities
  • 5. 5 Knowledge of the Components that are in use Most Organizations Typically Know LESS THAN 10% Of What Is Actually Used 2013 2014 2015 2016 560 454 252236 27 8 2925 Customer Estimate Flexera Audit Results Source: Flexera Professional Services Audit Data 2011 - 2016
  • 6. How has the supply chain changed over time? 0 200 400 600 800 2011 2012 2013 2014 2015 2016 2017 Found Disclosed   Found Disclosed % Disclosed 2011 135 18 13% 2012 221 25 11% 2013 236 25 11% 2014 252 29 12% 2015 454 8 2% 2016 560 27 5% 2017 718 12 2%
  • 7. D I S C L O S U R E T O A W A R E N E S S A W A R E N E S S T O 
 R E M E D I A T I O N Known Vulnerabilities and the Risk Window
 7 0 20 40 60 80 100 120 140 160 180 200 DISCLOSURE AWARENESS REMEDIATION D
  • 8. T I M E T O 1 s t E X P L O I T A W A R E N E S S T O 
 R E M E D I A T I O N The Risk Window: Patch Tuesday Example
 8 0 20 40 60 80 100 120 140 160 180 200 DAYS 156 DISCLOSURE AWARENESS REMEDIATION D • Average time to first Exploitation: 30 days1 • Risk Window: 156 days 1 – Source: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ 2 – Source: “2016 State of Vulnerability Risk Management” NopSec http://info.nopsec.com/sov
  • 9. Common areas of concern for Vulnerabilities While it is best to have a “Full” accounting of all third party software, certain components may have a higher priority than others. 1) Highly targeted “Famous” components (Struts 2, Openssl, etc..) 2) Cryptographic components – often highly targeted, and also have legal tracking requirements for export anyway 3) Compression components – similar to cryptography in terms of usage and programming techniques. Often highly targeted. 4) Multi-media components - Wildly used, often contains crypto and compression routines themselves. 5) Applications Platforms – widely used, often contain crypto and compression, complex 6) Databases – central to all systems, complex 7) Operating Systems / Linux Stack related components
  • 10. Why do you need an Open Source license? Copyright law (in many places) means that all source is explicitly copyright the original author EVEN if not marked You have no right to use someone else’s code without permission Open Source (and commercial) licenses are the way of giving permission to use source code Lack of license shows lack of maturity for the OSS project, often a sign of other problems! It is not Open Source if you don’t have a license
  • 11. Common Misunderstandings • Just because code is available, this does not give you any permission to use it. • “Freely Available” != Open Source • “Public Domain” is different from “Open Source” • You are not “safe” if you don’t ship your product (unlike some licenses like the GPL) • The open source author does not owe you an answer (let alone an answer you like) if you ask about licensing • The author is not necessarily an expert on licensing
  • 12. Company Risks for Unknown Third Party Code • Open Source is NOT a problem! (not managing or following the obligations is) • Unmanaged Vulnerabilities • OpenSSL / Heartbleed • Struts 2 • License Infringement • Copyleft implications for your source code (GPL) • Envelope issues • Forced to Stop production and replace code • Monetary Damages – (Commercial or OSS)
  • 13. Open Source – Obligations • Open Source is commonly confused with “Free” as in no cost software • Open source may be Free of Cost, but is not Free of Obligations Common referred to as “Free as in Speech, not Free as in Beer” • Open Source licenses have a list of obligations that you must follow in order to legally use the open source library under that license • The act of following these obligations is called OSS Compliance or License Compliance • Your Compliance actions depends on how you are using these OSS components • Most licenses have Multiple Obligations
  • 14. Commonly Seen Obligations Obligation Type of Obligation Definition Share Source Copyleft aka Viral Author requires user to share source code Give Credit Notice or Attribution Name of author must be reported in About Box, Documentation, Website, etc… Share Patents Patent Clause Author requires permission to use patents or license patents in this open source project Restrict use Restrict who can use this code Restriction on military use, restriction on nuclear facilities, geography/ countries, commercial use etc.. Vanity/One Off Licenses Give me free beer, say a prayer, Do No Evil Requests by the author to do some sort of action not typically seen in contracts or licenses Preserve Attribution Attribution Requires attribution/copyrights to be preserved in the source code Disclaimer Disclaimer Explain that the open source author is not responsible for the use of the software, even if it has defects Supply Original License text License Text Requires text of entire license to be provided to users Commercial Pay for use of code Classic software business model license
  • 15. How can we stop this lack of knowledge from happening again?
  • 16. Create a Process that works for your company
  • 17. Security & IT Ops Develop & Test Proactive OSS/TPS Governance Program = Get Clean & Stay Clean Open Source Review Board Plan, Define & Design Legal & IT Audit Govern, Release & Maintain “SET GOVERNANCE POLICY” Develop corporate policies and standard operating procedures (SOP) for usage of OSS and licenses. “GET CLEAN” Conduct scans and review findings to produce an accurate bill of materials of OSS within your codebase. “STAY CLEAN” Proactively address new findings based on codebase changes or planned introduction of new OSS materials with governed approval processes. Codebase Audit • Delta Scan + Results Release Management • License obligations compliance • License compatibility analysis • Third-party notices • Source distributions • Copyright notices • Attribution flow-through • Contributions back to OSS • Patent issues & royalties “STAY CLEAN” Proactively address new findings based on codebase changes or planned introduction of new OSS materials with governed approval processes. Remediation Project Management • Configure scan settings • Configure development tool connectors (SCM + Build) OSS/3rd Party Requests • Disclosed Inventory (Proactive) • Detected Inventory (Reactive) Codebase Audit Remediation Inbound Review “GET CLEAN” Conduct scans and review findings to produce an accurate bill of materials of OSS within your codebase. Inbound Review • Detailed review of all inbound third-party materials • Third-party notices • License obligations • Corporate policies “SET GOVERNANCE POLICY” Develop corporate policies and standard operating procedures (SOP) for usage of OSS and licenses. Project Management • Start clean or copy existing • Provision project users • Define project workflow • Configure development tools connectors (ALM)
  • 18. Create Clear, Dynamic and Enforced policies
  • 19. Properties of good OSS Policies Clear: Everyone is trained on current policies, at least once a year Policies are easily available on the corporate intranet / wiki Dynamic: Policies quickly change as needs change Enforced: Products should not ship if OSS obligations are not met
  • 20. What should we know in order to set policies?
  • 21. What should we know to set Policies (deployment style)? What is the high level architecture of your product: SaaS vs shipping product Embedded Linux vs classic Application Client / Server Any Mobile applications? Web front ends External resources such as web services
  • 22. Where do the OSS Packages live?
  • 23. Product Stacks have many owners The software development team is often different than the release team / IT team that puts a product into production. Things often fall in the gaps between these teams. They often have different management, legal contacts, understanding of OSS licensing. Companies many know some OSS from the release team (e.g. Linux, Apache httpd, MySQL, etc..) or some OSS from the software team (zlib, openssl, etc..) but not always from both. A “good” list for the IT team is often confused for a “good” list for the actual product. Linux distributions often lead to long lists of OSS components but not always a clear understanding of the company’s OSS choices in the product.
  • 24. What should we know to set Policies? Do you have a large patent portfolio? Usage of certain licenses may affect your legal and patent options due to Patent Grants and Patent Retaliation clauses Do you understand how your product is distributed? Do you understand how your product is linked? Does your architecture require certain types of linking? Do you use anyone else’s SDK?
  • 26. What can we do to increase inbound awareness? Encourage your developers to always look / ask for the license of an OSS project Train them on where licensing info is found Ask explicit questions to your developers to gauge their understanding of OSS licensing Record all inbound usage from snippets to packages! Log bugs against projects w/ no licenses • 90%+ of OSS authors will pick a license when prompted ( Example https://github.com/etherkit/JTEncode/issues/1 )
  • 27. Steps to set up a process to discover and manage your use of open source
  • 28. How to Start Looking for OSS and TPS? Get people together! The “Conference Room Effect” is very helpful to uncover large unknown OSS and TPS components Ask pointed questions (see list on next slide) • What databases do we use? • What encryption libraries? • Etc.. Check with your commercial contract people for known Commercial dependencies REQUIRE: Commercial products to deliver current accurate third party disclosure Perform classic code reviews; keep reviewing Perform initial OSS Code scans; keep scanning
  • 29. Questions to ask your development team ❑Do we have a list of the open source and commercial libraries we are using? ❑How deep have we looked? How complete is this list? ❑What Cryptography, Compression, Multimedia and Application Server libraries are we using? ❑Does this lists include all libraries brought in though repository managers like RPM / Maven / Ruby Gems / npm, etc…? ❑Do we have a list of all the web services we depend on? (e.g. credit card processors, stock price lookup, time servers, etc…) ❑What Databases are we using? (including sql, nosql, embedded, hosted etc..) ❑Do we ship VMs, Containers or Applications to our customers? What OS, OSS components and software stack are we shipping? ❑What is the “Full Stack” required to run our product – including the OS, DB, etc…? ❑Do we have a “Disclosure List” from our commercial vendors
  • 30. Setting up an Open Source Review Board
  • 31. Setting up an OSRB • An OSRB should be composed of technical, security, business and legal representatives • The job of the OSRB is to set and potentially enforce the Open Source policy and act as an institutional memory • The OSRB works best when people meet in person, but can be virtualized as necessary • OSRBs get better with time, don’t get discouraged • OSRBs should be expected to change their minds based on new information or discovered complexity
  • 32. How to we get developers to buy in? It’s tough: Developers want to ship and often route around process, esp. if it not clear why the process exists. “We should give credit where credit is due” Attribution “We are required to” Legal Obligations War stories (busybox, grsecurity, etc..) Development gates “We should help the Open Source project who help us” Open Source Ethos Time and Financial Support If we don’t know we’re using how can we support them?
  • 33. IP Risk Management: Levels of Analysis Overview Audit • High level BOM • “Big Rocks” • e.g. zlib and JBoss Detailed Overview • Third Party library BOM • All Copyrights • Large cut & paste findings Forensic • Strong overview plus • All cut & paste evidence • Modification Review • Commercial scf leakage 20 % Findings 80% Findings 100 % Findings
  • 34. Software Supply Chain While more companies are performing “pedigree scans” of individual OSS projects, this is still a rare activity for most companies. At first these were license oriented, but vulnerability analysis has been added Data shows that the average OSS package has ~7 subcomponents. Infrastructure pieces (e.g. Hadoop) will have dozens to hundreds of top level components (not counting these envelope issues) We expect more emphasis and contractual enforcement of supply chain disclosures to only increase.
  • 35. What Is “Good Enough”? • “Analysis Paralysis” is a real thing • The Community is getting more varied and vocal, you should listen • The “Community” includes commercial vendors who have different compliance views • Customers are demanding more; at delivery and at contract signing • More internal emphasis on tracking down source for pre-compiled binaries – compliance, long term maintenance and disaster recovery • Scanning is occurring at internal and external touch points • More historical versions being reviewed at M&A time • A supplier to my supplier is MY supplier! (Software Supply Chain concerns)
  • 36. Have you disclosed or found everything? [Probably Not!] • Java: Maven and external binary repositories are more prevalent • C/C++/etc…: Github remote repositories • Commercial Source compiled on laptop • Binary analysis bar is being raised due to supply chain concerns • Where did all these binaries come from? 1000 to 10,000+ • Web services are often overlooked • Post acquisition discovery of missing code
  • 37. IP Assets – Managing How can you make this process easier to manage for yourself? • Make it clear you expect Compliance • Education • Set a clear policy concerning third party inclusion • Vet products before they are brought into the codebase • Require comments to explain the origin of copied code • Keep pristine copies of licensed code • Audit often to catch surprises early • Have a remediation plan in place
  • 38. THANK YOU AND Q&A! © 2017 Flexera | Company Confidential JLuszcz@flexera.com www.flexera.com @JeffLuszcz