Tuesday, July 11, 2017

Taming the Open Source Beast With an Effective Application Security Testing Program May 4, 2017 | By David Marshak

David Marshak Senior Offering Manager, IBM David Marshak focuses on IBM’s Application Security portfolio, including the AppScan product line, cloud offerings and partnerships with companies such as Arxan. Prior to joining IBM in January 2005, Marshak was an internationally known industry analyst and consultant with Patricia Seybold Group for 18 years. Marshak has spoken worldwide to audiences, large and small, on emerging technologies and future trends. He is often called upon to be a featured speaker and panel moderator at numerous industry conferences such as IBM InterConnect, Connect, Pulse, VoiceCon, Collaboration Technologies Conference, Burton Group Catalyst Conference, COMDEX, InternetWorld, Groupware, VON, NetWorld and Lotusphere, among others. He has appeared as an expert commentator on PBS, CNBC and National Public Radio and has lectured on collaboration at Massachusetts Institute of Technology and Babson College. Marshak has been quoted in the Wall Street Journal, Forbes, New York Times, Business Week and Investor’s Business Daily as well as the technical press. Home > Topics > Application Security > Taming the Open Source Beast With an Effective Application Security Testing Program May 4, 2017 | By David Marshak A lion in a circus cage. Bigstock Share Taming the Open Source Beast With an Effective Application Security Testing Program on Twitter Share Taming the Open Source Beast With an Effective Application Security Testing Program on Facebook Share Taming the Open Source Beast With an Effective Application Security Testing Program on LinkedIn Cute Attacks With Acute Impact on Your Application Security Testing Effectiveness Here we go again: Another attack with a cute name is about to make the news. More dangerous than a Ghost, a POODLE, a FREAK, a Heartbleed, a Shellshock or the other 6,000-plus attacks that show up each year, we know at least two things about it: It will probably attack through a vulnerable open source component. It is highly likely you’ll find the open source component in your apps. images for open source appsec blog publishing on May 4 Addressing the Open Source Challenge Should you stop your developers from using open source? You can’t — at least if you want them to be productive. In fact, more and more software is reliant on open source components than ever before. The Forrester report titled “Secure Applications at the Speed of DevOps” states that “approximately 80 to 90 percent of the code in modern applications is from open source components.” Clearly, open source is here to stay. To protect yourself, you must proactively test your code to assure that you don’t have vulnerable libraries. And since it’s extremely likely that your organization is vulnerable in some fashion, you should focus on two specific success factors. Success Factor One: Integrate Open Source Testing Into DevOps The single most important thing you can do is be aware of the open source packages that your developers use, and specifically which ones have vulnerabilities that can be exploited. It is critical that this review be performed as early in the development cycle as possible and that it be done continuously, since threats are constantly changing. Forrester specifically recommended the following: “Insert a software composition analysis (SCA) tool as early in the SDLC as possible and continue to scan applications, including older applications with inconsistent or long release cycles, to ferret out newly discovered vulnerabilities.” The best way to do this is to integrate open source discovery directly into the application security testing that you are already doing — making it an essential part of your DevOps strategy. IBM has made this process easy and transparent. With introduction of IBM Application Security Open Source Analyzer, part of IBM Application Security on Cloud, identifying open source components occurs automatically during static application security testing (SAST). These components are matched against a list of known vulnerabilities and results are returned. The results are not only actionable, but they also include specific remediation recommendations such as substituting more recent versions of the components. Results are directly integrated into reports that contain identification and remediation of vulnerabilities found in your custom code, creating a seamless adoption and use model that best enables your success. images for open source appsec blog publishing on May 4 Figure 2: Open source vulnerabilities (shown in purple) appear as Fix Groups within the scan report. For more on Application Security on Cloud Fix Groups, consult our IFA blog. images for open source appsec blog publishing on May 4 Figure 3: Clicking on the Fix Group shows vulnerability types (in this case, open source CVE), descriptions and links to recommended fixes. Success Factor Two: Use the Most Reliable Source to Detect Open Source Vulnerabilities Of course, no matter how seamless the integration is, it boils down to the quality of your testing results. Quality depends on a number of factors — most notably the completeness, breadth, depth and currency of known vulnerabilities and remediation recommendations. IBM Application Security Open Source Analyzer is able to generate a comprehensive set of open source packages for evaluation by analyzing the file level during application code analysis. Those files are then compared with known open source vulnerabilities and vulnerable ones are identified, along with specific remediation advice. The quality of IBM Application Security Open Source Analyzer data is differentiated in several important ways. The solution: Supports a large number of languages: Open Source Analyzer does not merely work on a small set of languages like other solutions do. It supports a very large set, including Java, .NET, JavaScript, PHP, Node.JS, C/C++, Ruby, Python, ObjectiveC, SWIFT, Go, Scala, Clojure, Groovy, Android, Perl and Pascal. Identifies a huge set of open source libraries: Across these languages, Open Source Analyzer understands more than 3.5 million binary components and nearly a half billion nonbinary source libraries. Leverages a database of more than 230,000 vulnerabilities from public and private sources: IBM Application Security Open Source Analyzer has access to 12 different sources, in addition to the commonly used National Vulnerability Database (NVD). By comparison, it is estimated NVD includes fewer than 10,000 identified open source vulnerabilities. The Open Source Analyzer database is continually updated with thousands of newly discovered vulnerabilities added each month. Provides actionable remediation recommendations: Our offering combines information from nearly a dozen authoritative sources, including research from the IBM X-Force team, links to patches, specific source files and newer versions that fix issues. Peace of Mind With Application Security Testing Embarking on a program to test your open source exposure level is the easiest and fastest way to increase your application security posture — not to mention keep your name out of the press the next time that a cute attack (or an acute attack) threatens to tarnish your organization’s good name. Our advice is to access our complimentary trial of IBM Application Security on Cloud featuring Open Source Analyzer today, and see for yourself how easy it is to obtain the peace of mind you desire. START A FREE TRIAL OF APPLICATION SECURITY ON CLOUD NOW Tags: Application Security | DevOps | Open Source | Static Application Security Testing (SAST) | Vulnerabilities | Vulnerability Share this Article:Share Taming the Open Source Beast With an Effective Application Security Testing Program on Twitter Share Taming the Open Source Beast With an Effective Application Security Testing Program on Facebook Share Taming the Open Source Beast With an Effective Application Security Testing Program on LinkedIn RECOMMENDED FOR YOU Application Security Intelligent Finding Analytics: Your Cognitive Computing Application Security Expert By David Marshak CISO Current Trends in Identity and Access Management: July 2017 By Brett Valentine Malware A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain By Mike Oppenheim David Marshak Senior Offering Manager, IBM David Marshak focuses on IBM’s Application Security portfolio, including the AppScan product line, cloud offerings and partnerships with companies such as Arxan. Prior to joining IBM in January 2005, Marshak was an internationally known industry analyst and consultant with Patricia Seybold Group for 18 years. Marshak has spoken worldwide to audiences, large and small, on emerging technologies and future trends. He is often called upon to be a featured speaker and panel moderator at numerous industry conferences such as IBM InterConnect, Connect, Pulse, VoiceCon, Collaboration Technologies Conference, Burton Group Catalyst Conference, COMDEX, InternetWorld, Groupware, VON, NetWorld and Lotusphere, among others. He has appeared as an expert commentator on PBS, CNBC and National Public Radio and has lectured on collaboration at Massachusetts Institute of Technology and Babson College. Marshak has been quoted in the Wall Street Journal, Forbes, New York Times, Business Week and Investor’s Business Daily as well as the technical press. SEE ALL POSTS FOLLOW DAVID MARSHAK READERS ALSO LIKE The 10 Most Common Application Attacks in Action Read More The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center Read More Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel Read More How STIX, TAXII and CybOX Can Help With Standardizing Threat Information Read More Using SIEM Solutions to Connect the Security Dots and Detect Ransomware Read More On-Demand Webinar An Incident Responder’s POV: Inside the Latest Petya Variant Security Intelligence Analysis and Insight for Information Security Professionals The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of IBM. NEWS TOPICS INDUSTRIES X-FORCE RESEARCH MEDIA EVENTS & WEBINARS CONTRIBUTORS BECOME A CONTRIBUTOR Subscribe to Security Intelligence Follow Security Intelligence on Twitter Follow Security Intelligence on Facebook Follow Security Intelligence on Youtube Follow Security Intelligence on LinkedIn Follow Security Intelligence on Slideshare Follow Security Intelligence on Quora © 2017 IBM |Contact |Privacy |Terms Of Use |Accessibility

No comments:

Post a Comment