Open Source Software: the Intersection of IP and Security



Similar documents
Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments

An Open Source Software Primer for Lawyers

RoverPal - A Mobile Payment Application

UBS Training Course Catalog

Getting Started with Open Source Compliance

Presentation. Open Source is NOT Free. For ISACA. By Dave Yip / Gamatech Ltd. Agenda

Your Cloud, Your Data, Your Way! owncloud Overview. Club IT - Private and Hybrid Cloud. Austrian Chambers of Commerce Vienna, January 28th, 2014

Open Source Sustainability and RDM. Scott Wilson

PUBLISH YOUR COLLECTIONS TO THE WEB

The Corporate Counsel s Guide to Open Source Software Policy Implementation

ARE YOU RUNING LINUX RIGHT?

Open Source Software:

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE

Open Source Software and the impact on Mergers & Acquisitions

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

Open Source Policy Builder

An Introduction to the Legal Issues Surrounding Open Source Software

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:

Intellectual Property Group Presentation. Using Open Source Software Issues to Consider. Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009

BOM based on what they input into fossology.

Managing Security Risks in Modern IT Networks

Beginning in 2007 and, for the following five years, Open Source Software (OSS)

GiftCardXpress - Elavon Brief

HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING. By Robert J. Scott and Christopher Barnett

2015 Vulnerability Statistics Report

Put a Firewall in Your JVM Securing Java Applications!

Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.

Linux, Open Source, and IBM: The Next Decade

Foundations for your. portable cloud

What You Should Know About Open Source Software

Open Source. Knowledge Base. By: Karan Malik INTRODUCTION

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Software Requirements Specification

Legal Issues for FOSS-based Supply Chain Management. Herve Guyomard, Black Duck Software

THE OPEN SOURCE DEVELOPER REPORT

Open Source Server Product Description

Framework Adoption for Java Enterprise Application Development

HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS Black Duck Software, Inc. All Rights Reserved.

APPLICATION SECURITY FOR OPEN SOURCE SOFTWARE - THE NEW IMPERATIVE

nexb- Software Audit for Acquisition Due Diligence

Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance

Open-Source vs. Proprietary Software Pros and Cons

Fast, Low-Overhead Encryption for Apache Hadoop*

GPL AND SOFTWARE LICENSING ISSUES LESSONS FROM THE VERSATA LAWSUIT Black Duck Software, Inc. All Rights Reserved.

Open Source Software: Strategies and Risk Management

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Middleware Platforms for Application Development: A Product Comparison

Huawei and Open Source. Industry development department Shi Hao

Information Security Organizations trends are becoming increasingly reliant upon information technology in

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

CSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

White Paper. Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1

Successful Mobility. Matej Lavric Sales Leader for Mobile CEE

WHITE PAPER. Domo Advanced Architecture

Project Manager 1 Post == Experience years in Project Management in reputed company, Salary Rs.1,20,000/-

DOBUS And SBL Cloud Services Brochure

Closing the Vulnerability Gap of Third- Party Patching

Privacy and Data Breach Protection Modular application form

Intellectual Property& Technology Law Journal

Polycom RealPresence Resource Manager System

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Open Source in the Real World: Beyond the Rhetoric

Cloud Computing. What is Cloud Computing?

90% of data breaches are caused by software vulnerabilities.

Managing Cloud Computing Risk

27 th March 2015 Istanbul, Turkey. Performance Testing Best Practice

Google and Open Source. Jeremy Allison Google Open Source Programs Office

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software. Black Duck Software White Paper

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

FOSS Governance Fundamentals

IT Risk Management: Guide to Software Risk Assessments and Audits

McAfee Database Security. Dan Sarel, VP Database Security Products

Securing Data in the Cloud

Apache Jakarta Tomcat

Transcription:

Open Source Software: the Intersection of IP and Security Greg Kelton, Managing Director EMEA, Palamida Inc.

1995 F22 software (avionics only) ~1.7M LOC

2009 F22 software (avionics only) ~1.7M LOC It takes dozens of microprocessors running 100 million lines of code to get a premium car out of the driveway (IEEE Spectrum February 2009 Image: General Motors)

New Ways of Composing Services Cloud Computing a style of computing in which massively scalable IT-related capabilities are provided as a service using Internet technologies to multiple external customers. Definition: Gartner Group

Smarter Devices

The point is

More Software and Better

In Less Time

And with Smaller Budgets

Today s Reality A software development organization cannot be competitive without widespread use of open source

Gartner OSS Predictions By 2016, OSS will be included in mission-critical software portfolios within 99% of Global 2000 enterprises, up from 75% in 2010. By 2014, 50% of Global 2000 organizations will experience technology, cost and security challenges through lack of open-source governance. By 2015, OSS will be used and adopted to help enable over 60% of platform-as-a-service (PaaS) services. By 2014, 30% of applications running on proprietary versions of Unix will be migrated to OSS-based Linux on x86. By 2014, those organizations with effective, open-source community participation will consistently deliver high returns from their opensource investments. By 2013, up to 50% of Global 2000 non-it enterprises will contribute to at least one OSS project. By 2016, 50% of leading non-it organizations will use OSS as a business strategy to gain competitive advantage. Predicts 2011: Open-Source Software, the Power Behind the Throne 23 November 2010 ID:G00209180

Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Binaries/Archives/JARS 1207 What is This Software Project Trying To Tell You?

There is probably a lot of content that you don t know about Audit Example Size Documented OS components Undocumented OS components 15.9GB 59.1M LOC 303 535 Total # 838 % LOC from Open Source 60-65%

With license terms that may be problematic 30% Audit Breakdown by License 25% 20% 15% 10% TOTAL % 5% 0% Source: 2010 Year to Date Audit Engagements Performed by Palamida Professional Services

Open Source is not somehow different Plaintiffs would be happy to settle this matter with Best Buy and Phoebe Micro if they either (i) ceased all distribution of BusyBox or (ii) committed to distribute BusyBox in compliance with the free and open source license terms under which Plaintiffs offer BusyBox to the world. Plaintiffs have patiently worked with Best Buy and Phoebe Micro to bring their products into compliance with the license, but unfortunately have now concluded that those efforts are destined to fail because neither Best Buy nor Phoebe Micro has the capacity and desire to meet either of Plaintiffs' demands for settlement. As such, Plaintiffs are forced to protect their interests in BusyBox by now respectfully moving for a preliminary injunction, pursuant to Rule 65, enjoining and restraining defendants Best Buy and Phoebe Micro from any further copying, distribution, or use of their copyrighted software BusyBox. PLAINTIFFS' MEMORANDUM OF LAW IN SUPPORT OF THEIR MOTION FOR PRELIMINARY INJUNCTION AGAINST DEFENDANTS BEST BUY, CO., INC. AND PHOEBE MICRO, INC. SOFTWARE FREEDOM CONSERVANCY, INC. and ERIK ANDERSEN, Filed 1/31/11

Software IP is a potent competitive weapon Love, Larry: Here Is the Oracle Statement and Final Complaint Versus Google by Kara Swisher Posted on August 12, 2010 at 6:46 PM PT This afternoon, the database software giant said it was suing Google (GOOG), alleging patent and copyright infringement of Java-related intellectual property in the development of Android mobile operating system software. http://kara.allthingsd.com/20100812/love-larry-here-is-the-oracle-statement-and-final-complaint-versus-google/

And Open Source Is Not Immune to Vulnerabilities 90 80 70 60 50 40 30 20 10 0 89 Apache Tomcat 1 jquery 27 31 GNU C Library 41 61 5 5 libpng LibTIFF OpenSSL Zlib Libcurl Libxml2 OpenSSH 11 60 Vulnerabilities in Popular Open Source Projects Source: National Vulnerability Database

Oh No, Kernel.org was Hacked by Susan Linton -Aug. 31, 2011 A notice appeared on www.kernel.org today informing visitors that the servers housing the Linux kernel source code had been hacked earlier this month. The breach was discovered yesterday and maintainers believe the source code itself is unaffected. Source: ostatic.com

August 2011 Devastating Apache bug leaves servers exposed Devs race to fix weakness disclosed in 2007 Attack code dubbed Apache Killer that exploits the vulnerability in the way Apache handles HTTP-based range requests was published Fridayon the Full-disclosure mailing list. By sending servers running versions 1.3 and 2 of Apache multiple GET requests containing overlapping byte ranges, an attacker can consume all memory on a target system. August 14, 2011

Mango OSS Components Quartz Enterprise Job Scheduler Apache Commons Logging Apache Jakarta Taglibs Spring Framework JfreeChart Apache Jakarta Commons Freemarker Jcommon Utility Classes Apache-db-derby Apache Log4J JavaMail API MySQL SAX: Simple API for XML J2EE Java2 SDK Activation AQP Alliance DWR Direct Web Remoting pngencoder git-mm JDBC driver Apache Xerces NVD Reported Vulnerabilities: 0 DWR OSS Components Apache Spring Framework Apache Struts Hibernate Scriptaculous Beehive WebWork Backport Util Concurrent Google Injection Framework NVD Reported Vulnerabilities: 4 Scriptaculous Components PrototypeJS 1.5.0 NVD Reported Vulnerabilities: 1

Risk is Risk And you can t mitigate risk you don t know you have

What to Do Tomorrow Set up an OSRB or equivalent Establish your policy for use of externally sourced software Don t stop at IP, include security Audit any software acquired via M&A Evaluate compliance alternatives, and get started

Open Source Review Board Comprised of Legal, Development and Security Review and Approve Policy for externally sourced software Establish the scope of information required and retained (the request form) Case-by-case use decisions Review and approve the policy for compliance with obligations Reports to CFO, GC, VP engineering or others periodically on compliance status

Policy What is the name and version of this software component? Where is it used? What is the license? Is this component in a software product that ships to customers? Does this component contain known vulnerabilities? Have we modified this component? When was the last time we checked this software for version and vulnerability? Does this component contain encryption? Have we added this component to the notices file?

Mergers and Acquisitions (and outsourced development) Make code audit a contract item Don t rely on reps regarding code content typically 3-5x more found than disclosed Use outside firms to maintain an arms-length relationship Factor in remediation costs Don t integrate the code with yours until you are confident of origin

What Acquiring Firms Are Concerned About Today GPL and other Viral Licenses (esp v3.0) Affero GPL Commercial Content and Libraries Restrictions on commercial use or field of use (e.g. no Military use) Cryptography Code with Unknown Licenses % of undisclosed content

Evaluate Compliance Alternatives, and Get Started In-house process External Professional Services periodic reports In-house system Owned by development Used by development, legal and security System of record for policy and content The first pass is the most time-consuming consider a outside audit to populate the internal system

Evaluate Compliance Alternatives, and Get Started

Open Source Software: the Intersection of IP and Security Greg Kelton, Managing Director EMEA, Palamida Inc. gkelton@palamida.com