Laurie Williams
Laurie_williams@ncsu.edu
1
Supply Chain Security: Vulnerable and Malicious Components
A6: Vulnerable and Outdated Components
Source: OWASP.ORG| CC by 3.0
Software Supply Chain
… anything that touches your code from development through �CI/CD pipelines until it is deployed in production
SLSA/Apache 2.0
Growth in Software Supply Chain Attacks
Accidental dependency vulnerability
Dependencies as an attack vector
Siridhata/stock.adobe.com
Sergey Nivens /stock.adobe.com
Biggest growth in attacks
What needs to be done with third-party components?
https://www.explainxkcd.com/wiki/index.php/2347:_Dependency
Bad �choice
Ponder this …
When you bring a third-party component into your project, it’s like you are adding the developers of that component to your team. �Do you trust them?
Transitive dependencies
(also called indirect dependencies ⇒ dependencies of dependencies)
* Snyk: State of Open Source Dependencies 2020
OpenSSF Scorecard
2023 SONATYPE 9TH ANNUAL STATE OF THE SOFTWARE SUPPLY CHAIN REPORT
Purpose: help developers and organizations assess the security postureof open-source software by providing a set of automated checks that evaluate various software security practices
OpenSSF Scorecard
Critical Metrics
High metrics
High metrics - 2
Medium metrics
Low metrics
Pinning dependencies
Dependency Confusion
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610�https://dhiyaneshgeek.github.io/web/security/2021/09/04/dependency-confusion/
Dependency confusion - 3
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610�https://dhiyaneshgeek.github.io/web/security/2021/09/04/dependency-confusion/
Dependency Confusion - 2
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610�https://dhiyaneshgeek.github.io/web/security/2021/09/04/dependency-confusion/
OpenSSF Scorecard
Deps.dev
Exercise
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics. IEEE Secur. Priv. 21(6): 76-88 (2023)
What needs to be done with third-party components?
Software Component Analysis (SCA) Tools help
and more….
Dependency Check example
Imtiaz, Thorn, Williams, A comparative study of vulnerability reporting by software composition analysis tools, ESEM 2021
Overlap in finding same vulnerable components
Imtiaz, Thorn, Williams, A comparative study of vulnerability reporting by software composition analysis tools, ESEM 2021
Mean Time to Remediate (MTTR)
2024 Sonotype State of the Software Supply Chain Security
Secure Repository Process Flow