<Insert Picture Here> Third Party Software Some Security Considerations



Similar documents
Put a Firewall in Your JVM Securing Java Applications!

Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.

Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD

REPORT State of Vulnerability Risk Management

GSAW 2015 Session 11B: Frameworks in Action A Foundation for Service Based Architectures

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Table of Contents. Background and Goal Crafting a Plan for SDN Define SDN Identify the Primary Opportunities...

Chapter 4 IT Infrastructure and Platforms

White Paper. Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1

2015 Vulnerability Statistics Report

Why you need an Automated Asset Management Solution

Open Source Grid Computing Java Roundup

Sygate Secure Enterprise and Alcatel

Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance

Adobe Systems Incorporated

What is it? What does it do? Benefits

Commercial Software Licensing

Open-Source vs. Proprietary Software Pros and Cons

Interactive Application Security Testing (IAST)

Integrigy Corporate Overview

Apache Jakarta Tomcat

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

The Information Technology Program Manager s Dilemma

Open-source content management. systems. Open-source content management is a viable option FEBRUARY Open-source strengths

LAMP Server A Brief Overview

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Why You Need an Application Security Program

Making software from the open source community ready for the enterprise

Intelligent Vulnerability Management The Art of Prioritizing Remediation. Phone Conference

Information Technology Policy

Getting Things Done: Practical Web/e-Commerce Application Stress Testing

Building a Corporate Application Security Assessment Program

OPEN SOURCE SECURITY

How To Choose Between Open Source And Proprietary Bpm Software

Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework

Understanding How to Choose a Database Platform for Siemens PLM Software s Teamcenter

Library Technology Reports

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Licensed CC-BY 3.0 For attribution, please link to

Oracle Desktop Virtualization

Expansion Through Acquisitions

Enhanced Virtualization on Intel Architecturebased

From Private to Hybrid Clouds through Consistency and Portability

CSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software

Open Source for SMEs. ICT Forum Wales 21 Nov

Zend Server 4.0 Beta 2 Release Announcement What s new in Zend Server 4.0 Beta 2 Updates and Improvements Resolved Issues Installation Issues

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

! Resident of Kauai, Hawaii

Software security specification and verification

McAfee Database Security. Dan Sarel, VP Database Security Products

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (

Backing up to the Cloud

Harness Your Robot Army for Total Vulnerability Management

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Microsoft Windows XP Vulnerabilities and Prevention

Improving Java Migration Outcomes with Rapid Assessment

Oracle JRockit JDK. Supported Configurations R27.6. April 2009

COMESA Guidelines on Free and Open Source Software (FOSS)

Metatron Technology Consulting s Strategic Guide to Open Source Software

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

Virtualization Reduces the Cost of Supporting Open Industrial Control Systems

EnergySync and AquaSys. Technology and Architecture

Getting Started with Open Source Compliance

The Security Development Lifecycle. Steven B. Lipner, CISSP Senior Director Security Engineering Strategy Microsoft Corp.

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Demand Generation vs. Customer Relationship Management David M. Raab Raab Associates Inc.

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

Web Application Security: Exercise Development Approaches

Open Source Software: the Intersection of IP and Security

Oracle Database. Products Available on the Oracle Database Examples Media. Oracle Database Examples. Examples Installation Guide 11g Release 2 (11.

The Hacker Strategy. Dave Aitel Security Research

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Northwestern University Dell Kace Patch Management

Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic

JBoss enterprise soa platform

Star System Deitel & Associates, Inc. All rights reserved.

Taking a Proactive Approach to Linux Server Patch Management Linux server patching

Oracle Application Server

CAN VENDORS EVER PROVIDE SECURE SOLUTIONS? Barry Greene - bgreene@senki.org

HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS Black Duck Software, Inc. All Rights Reserved.

FIREWALL POLICY November 2006 TNS POL - 008

Why subscribe to enterprise open source software? Top ten reasons to use JBoss Enterprise Middleware

Open source, commercial software or a coexistence strategy?

Adventures in Estimating Open Source, Component Systems, Agile, and SOA Projects

!"#$%&%'($)*+,-",!./01#'/",'",234045'0'#6,4"7, 21&&/%#,

Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities

What is Open Source? Open source is defined by three key components:

Using Open Source Software in Product Development: A Primer

Guardium Change Auditing System (CAS)

JBoss security: penetration, protection and patching. David Jorm

Chapter 3 Technology adapted

Open Source Software and The Enterprise

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

A New Paradigm for COTS and SOUP

<Insert Picture Here> Oracle Premier Support Il Supporto di Oracle sulla Tecnologia e sulle Applicazioni

Simplifying and Empowering the Implementation of Enterprise Mobile Strategy

Security Patch Management

Transcription:

1

<Insert Picture Here> Third Party Software Some Security Considerations John Heimann Vice President, Security Program Management Global Product Security

Third Party Software Oracle products (and those of many other vendors) embed hundreds of third party libraries including Commercially-licensed Free and Open Source Software (FOSS) There are many reasons for using third party software Reduced development and/or support cost Time to market Best of breed Interoperability 3

Commercial Third Party Software Usually closed source (but may have open version) Typically requires payment of license and support fees Often have well established processes and schedules for: Functional releases Maintenance updates Support End of life 4

Commercial Third Party Software, cont. May have mature software security development lifecycle (SDLC) May have well-established: Security patch schedule Policies for security bug handling and vulnerability disclosure Can be single neck to choke in case of problems Assuming reasonable support contract for security fixes, end of life dates, etc. 5

Oracle Software Security Assurance (OSSA) Defined and managed by Global Product Security (GPS) The heart of GPS mission Evolved over two decades New programs added as software assurance process and technology matures Common methodology adapted for each business and technology area 6

Free and Open Source Software (FOSS) Often developed through a FOSS community effort Does not require license fees or support fees May have license terms with special considerations, such as GNU Public License (GPL) Commercial support may be available for a fee (e.g., Oracle Linux) Development and release practices vary widely May have predictable release or maintenance schedules Rarely have well established end-of-life dates 7

FOSS, cont. Typically does not have formal SDLC Software actively maintained by commercial companies, like Oracle Linux, Java, OracleVM and MySQL, are exceptions Security patches are usually ad hoc Patch quality is not uniform over time Security fixes may require upgrades to new versions with incompatible APIs e.g., Struts1 to Struts2 8

Loose vs. Tight Coupling Commercial third party software typically delivered as object code with documented APIs Typically loosely coupled to embedding product (e.g., at link time) FOSS allows tighter coupling of third party code and even modification of that code before it is embedded May allow better performance, coordination, etc. May allow customization of third party functionality Tighter coupling of third party code often means higher support cost 9

Some FOSS Myths Open source is free! Million Eyes means security 10

Open Source is Free! No license or support fees You get what you pay for, at least in support No support service level agreements are available Arbitrary release schedules for upgrades and fixes which may cause disruption to embedding product schedule Organizations may need to change APIs to consume upgrades/fixes Publicly known vulnerabilities aren t always fixed Review and approval for FOSS involves significant effort Security patch management for open source can be expensive 11

Million Eyes means Security Open source means that anyone could review the code Including the best minds in the world But do they? Reality Code review is hard work, time consuming Security tools require time, effort and money to run Thousands of cursory reviews is not worth one careful review Those who have time and money to find vulnerabilities in open source aren t always the good guys Open source makes attacker s job easier Vulnerabilities found by attackers have big impact if FOSS is widely used 12

Million Eyes Theory, cont. Unix BASH vulnerability (a.k.a., Shellshock ) BASH is widely used Was present in BASH since version 1.0.3 (Sept. 89) Not found until 25 years later (Sept. 14) Very serious vulnerability allows execution of arbitrary commands on unpatched servers Places serious doubt on effectiveness of million eyes Many other examples (e.g., OpenSSL, NSS) 13

Million Eyes Theory, cont. Customers often expect a patch each time there is a security patch release in a third party library Tightly coupled third party code typically means Oracle has to issue a patch based on third party patch Security patch releases in 2014: OpenSSL 5 releases NSS 15 releases Apache Tomcat 7 releases curl 6 releases PHP roughly one per month 14

Java Standard Edition (SE) is an interesting case study Prior to Oracle s acquisition of Sun, Java SE relied heavily on the million eyes of the community for security Some vulnerabilities were found and fixed through the community process Many more were found by professional researchers, and made public after Oracle s acquisition of Java Since Oracle s acquisition, Java has adopted Oracle security practices Java development process has much greater pre-release security analysis and testing Java security architecture has been improved Better tools to manage Java security and remove old, vulnerable versions Java Significantly fewer vulnerabilities have been reported in Java Java is still open source, but security improvements have come from Oracle s active investment in Java security 15

FOSS Vulnerabilities Can Have Severe Impact FOSS vulnerabilities can affect many vendors and end users, increasing Public (and customer) awareness Attention from hackers Fear uncertainty and doubt in the media Rush to fix, risk of poor fix quality Fix schedule is unpredictable, cannot be coordinated with vendor or customer schedule 16

FOSS Vulnerabilities, cont. Publicity surrounding FOSS vulnerabilities increases pressure on Oracle and other vendors to issue fixes May be disproportionate to actual severity of bug Customers often demand one-off patches Compared with patching in regularly scheduled security patch releases, one-off patches increase Patching cost for vendor and customers Customer pain (out of cycle urgent patching) Risk of negative publicity for vendor 17

Choosing Third Party Software Commercial or FOSS Development teams who choose to embed third party software must consider the security lifecycle cost and risk. Oracle has a centralized, corporate-level third party software approval system since poor choice of third party software can lead to risk: License Competitive Security 18

Before Choosing Commercial or FOSS Third Party Software Get Security Relevant Information Determine what if any Secure Development Lifecycle was used in software development Review vulnerability and security patch history Determine what the support process, support life, and security patching process may be 19

Assess Software Secure Development Process Commercial software vendors may have mature secure development processes (but should be reviewed) Some FOSS also has this Commercial software may include FOSS Oracle s OSSA or Microsoft s SDLC are good benchmark processes A mature secure development process helps prevent (but does not guarantee absence of) security vulnerabilities 20

Check Publicly Reported Vulnerabilities National Vulnerability Database is a good source of information https://nvd.nist.gov/ Important to use correct software name and version Assumes some knowledge of Common Weakness and Enumeration (CWE), Common Vulnerability Scoring System (CVSS) Software with many past vulnerabilities may be suspect May reflect poor design or development process May reflect unusual hacker attention Note that commercial software may do silent bug fixing 21

Review Security Patch History Frequent security patches for software may complicate development and maintenance of products which embed that software Security fixes which require API changes make adoption of those fixes difficult A history of these should raise concern 22

Ensure Support Path Determine if software is supported in an acceptable manner and if end-of-life is specified Library should have consistent, multi-year history of security fixes Third party software must have support path through life of the embedding product Do not choose third party software already past end-of-life May require your product development team to support third party software Ensure upgrade path is available if third party end-of-life falls within support life of embedding product 23

Before Releasing Third Party Software in Your Products or Systems Get approvals, keep records Treat third party code like it s your code 24

Get Approvals, Keep Records Third party software use can introduce risk to your organization A formal approval process for using third party software is recommended Sign off from internal experts (corporate architecture, security, legal, etc.) where relevant Keeping record of third party software use is strongly recommended Which specific third party libraries are in which specific product releases Important for determining which products a third party vulnerability affects and/or where third party patches or upgrades must be applied 25

Treat Third Party Code Like It s Your Code Customers/users are affected by vulnerabilities in your software whether they are in your code or embedded third party code Whose fault it may be is irrelevant if customer/user is hacked Burden of due security diligence is on you If security analysis and testing of embedded third party product is possible, do it! FOSS (or commercial code if you get source) can be subjected to static analysis Open or closed source software can be subject to dynamic analysis tools, fuzzing, architectural risk analysis, etc. 26

Third Party Security Patches Depending on how tightly coupled a third party library is to software you develop which embeds that library, a third party security patch may Require you to prepare a security patch based on third party patch and distribute it as a security patch to your software s customers/users (tightly coupled) Allow your product s customers/users to download patch directly from third party source and install it themselves (loosely coupled) 27

28