Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Top Tips on Identifying and Remediating Open Source Vulnerabilities
Cybersecurity

Top Tips on Identifying and Remediating Open Source Vulnerabilities

Bill DoerrfeldBy Bill DoerrfeldAugust 18, 2022Updated:April 13, 20235 Mins Read
Facebook Twitter LinkedIn Email
Open Source Vulnerabilities
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Open-source software is pervasive. The average application uses more than 500 open-source components. In 2022, Synopsis found that 97% of codebases contain open-source code. Open source is increasingly at the core of modern technology, even within proprietary software, yet, most end users remain unaware of this growing dependency.

Lately, open-source software (OSS) has been in the headlines for several reasons. The positive side is that OSS continues to offer free, community-supported software for the masses. The downside is that many of these packages showcase their vulnerabilities out in the open, which, if exploited by hackers, could cause detrimental harm to an organization. For this reason, the software supply chain is becoming a new common avenue of attack.

With software supply chain threats rising, having complete visibility into a company’s software reliances is becoming more crucial to maintain security. So, how can organizations discover potential vulnerabilities latent within their software architectures and remediate them before they are exploited? I recently met with Tim Kenney, President and Chief Operations Officer, at SOOS to explore best practices concerning OSS management. According to Kenney, continuous scanning paired with greater use of SBOMs will be vital to spotting these vulnerabilities.

Problems With Open-Source Security

Many factors at play compound to worsen the OSS security dilemma. First off is the fact that most applications incorporate a huge number of dependencies. “The tree gets deep really fast since these projects have dependencies themselves,” describes Kenney. This is partially due to the extremely low barrier to OSS — developers can instantly install OSS from a package manager such as NPM or RubyGems with a single command. This is great for accessibility but could have negative security repercussions without the proper security scanning.

Another fact is that “new vulnerabilities are coming out every day,” reminds Kenney. He points to exploits like Solar Winds, Log4j, Spring4Shell, and NAME:WRECK as evidence.

Open-source software vulnerabilities can have huge ramifications since so many users depend on the same project. For example, in December 2020, vulnerabilities in open-source TCP/IP stacks were found to affect millions of IoT devices. These vulnerabilities are most often discovered after initial deployment, requiring patching which may not always be swiftly executed. (For example, researchers estimate that 68,000 public servers are still affected by the Log4j flaw).

What’s more, new attack vectors continue to arise as companies adopt varying backend database styles, third-party APIs, and frontend frameworks — “vulnerabilities really can be anywhere in that stack,” said Kenney. Yet, most dependencies are left opaque since the software industry has yet to widely use Software Bill of Materials (SBOMs). All these issues are weighted heavily against SMBs, Kenney describes, which often can’t afford the investment into vulnerability auditing and remediation.

Identifying Open Source Vulnerabilities

So, what can organizations do to stay ahead of vulnerabilities concerning open-source software? Kenney shared some best practices that CISOs and other security leaders should consider.

Get Ahead of CVE Databases

Following databases of Common Vulnerabilities and Exposures (CVEs) is essential, yet this isn’t always enough, said Kenney. “You need to look at Github issues to be in front of it,” he said. This will necessitate checking for vulnerabilities earlier in the development lifecycle.

Scan All New Packages

Consider scanning any new package you pull in and implement a deep tree scan for known vulnerabilities. Verification here is also necessary to avoid typosquatting in package managers, in which hackers fork a functional copy of the original package, insert nefarious code, and rehost it with a slight name variation.

Request an SBOM From Your Third-Party Software Supplier

According to Kenney, people buying software should ask for a Software Bill of Materials (SBOM) from their vendor. An SBOM is similar to the nutrition facts on a food label, but instead lists the various components behind a piece of software. The movement toward SBOMs is gaining real traction lately, thanks to a presidential executive order that will mandate vendors working with the U.S. government to provide SBOMs.

Continuously Scan Production Environments for Vulnerabilities

Since threats are changing daily, vulnerability testing needs to be continuously run, said Kenney. The onus is not just on software vendors themselves, but software consumers should be looking at this more closely, too, said Kenney. Doing so will likely require automation to continually scan a manifest of open-source packages.

Solutions: SBOMs And Constant CVE Scanning

As the studies show, many applications contain far more open-source code than proprietary code. Collaboration around open libraries is necessary for rapid software development. But, cybersecurity is still catching up to this major shift in transparency. “We’re in our infancy of securing all this,” explained Kenney.

Part of the issue is how software is becoming increasingly obfuscated and cloud-based. Most applications will soon be developed using cloud-native components. The next turn of that wheel, predicts Kenney, is going totally serverless — meaning consumers won’t have root access to the systems they use. Abstracted by remote calls, software consumers will have no way to actively test the hundreds of open-source packages behind the infrastructure they depend upon.

We may face intransigence if cloud vendors prefer to withhold the inner workings behind their proprietary Software-as-a-Service and Infrastructure-as-a-Services. This further substantiates the need for SBOMs. “It’s the Software Bill of Materials that will make everyone behave,” said Kenney. “With SBOMs, you can’t hide it anymore.”

Kenney points to RKVST SBOM Hub as an easy method to publish an SBOM and check the SBOMs of public dependencies. There are also emerging standards around what exactly SBOMs entail and their structure, such as The Linux Foundation’s SPDX Specification. Other ongoing initiatives like Sigstore and SLSA seek to establish better validation and accreditation of OSS dependencies.

The other side of the coin will be continuous vulnerability detection so that the current branch is always secure. “It’s got to sit in every check-in and at every build,” said Kenney. He argues that increased automation in security scanning will be necessary to bring this to fruition.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured Open-Source Software
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Microsoft’s Mission to Make Your Company AI First

May 14, 2025

Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

May 14, 2025

Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration

May 14, 2025

Arvind Krishna’s Next IBM Miracle

May 13, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft’s Mission to Make Your Company AI First
  • Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.