Third-party library mismanagement: How it can derail your plans

Slides:



Advertisements
Similar presentations
High level QA strategy for SQL Server enforcer
Advertisements

©2013 Software AG. All rights reserved. alex Burggraf Principal Systems Engineer (415) Software AG IT Health Check Overview IT Health Check Diagnostics.
Simplifying Application Management CIO Strategies SummIT, Mumbai 23 Jun 2011 Rajesh Raghavan.
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
SE 555 Software Requirements & Specification Requirements Management.
Test Environments Arun Murugan – u Rohan Ahluwalia – u Shuchi Gauri – u
U-Mail System Design Specification Joseph Woo, Chris Hacking, Alex Benson, Elliott Conant, Alex Meng, Michael Ratanapintha April 28,
IT:Network:Microsoft Applications
PopMedNet Software Development Life Cycle Chayim Herzig-Marx Harvard Pilgrim Health Care Institute Daniel Dee Lincoln Peak Partners.
Debunking the Top 10 Myths of Small Business Server: Using Windows SBS in Larger Environments Abstract: This session will debunk some of the common myths.
WAO 2007 Andrej Košiček Dealing with the Obsolescence in state-of- the-art Electronic Components 27 September 2007.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Oracle Patching and Maintenance A practical guide for System Administrators October 2009.
BT Young Scientists & Technology Exhibition App Risk Management.
Viking Quality Report Team Assignment 9 Team 2-1.
Code and Asset Branching Best Practices Session 315 Philip Wolfe, Lead Developer Farm Credit Services of America.
Universal Acceptance of All TLDs ALAC 24 June 2012.
Theories of Agile, Fails of Security Daniel Liber CyberArk.
Cruise Training Introduction of Continuous Integration.
| Lausanne Successful Migration to SharePoint Planning Considerations & Migration Strategies Roberto V. Delgado Sr. Technical Solutions Professional.
Best Practices Topic Presenters Steve Cisick, Technology Copilot, LLC Roxanne Brown, Professional Business Solutions 4 U, LLC CommCon 2015.
CSE403 Software Engineering Autumn 2001 Gary Kimura Lecture #2 October 3, 2001.
Founded by Big Five Consulting ex-employees Oracle Gold Partner Focus on PeopleSoft 15 years of PeopleSoft experience Worked in both technical and functional.
About Me learn Professor 3 startups. Simplifying Agile – Delivering Value Quickly.
Tool Support for Testing
Dynamics GP – You Own It … Why Not Use It
UNLEASH YOUR FULL POTENTIAL
Optimize CRM to Increase Sales
Continuous Delivery- Complete Guide
UNLEASH YOUR FULL POTENTIAL
EMI 1 (Kebnekaise) Updates
Managing the Project Lifecycle
Security Testing Methods
Managing Changes in the Real World
The Right Selective Adoption Strategy for Greater ROI
Chapter 18 Maintaining Information Systems
Quality Assurance: Early Work Items
[Project Name] [Presenter Name]
Speaker’s Name, SAP Month 00, 2017
Debunking the Top 10 Myths of Small Business Server: Using Windows SBS in Larger Environments Abstract: This session will debunk some of the common myths.
Software Life Cycle Models
Content protection for 4k
Automated Code Coverage Analysis
Data Security Team 1.
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
WEBINAR: Becoming Agile In Software Testing: The Government Edition
X in [Integration, Delivery, Deployment]
How Not To Build A Trojan Horse
[Presented by] [Presented DATE]
Johanna Rothman Know What “Done” Means Chapter 11
Software Quality Engineering
Software Quality Engineering
[Project Name] [Presenter Name]
[Project Name] [Presenter Name]
Project insights using mining software repositories
Tord Glad Nordahl Program Manager - Microsoft
[Project Name] [Presenter Name]
ABHISHEK SHARMA ARVIND SRINIVASA BABU HEMANT PRASAD 08-OCT-2018
Sprint Planning April 2018.
Gathering Systems Requirements
Herding Cats and Security Tools
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
The Agile Inception Deck
Development Lifecycle
Software Engineering I Fall 2017
Discussing an OVS/OVN Split
Gathering Systems Requirements
Desktop App Assure Service Microsoft Representative Name June 7, 2019
Escalation 5 (cont.): Broadcast Media Coverage
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

Third-party library mismanagement: How it can derail your plans SOFTWARE QUALITY CONFERENCE PACIFIC NW Third-party library mismanagement: How it can derail your plans RUCHIR GARG 17TH OCT 2016 How many developers in the room; QA? Have you ever used 3rd party libraries in your code? I’m sure you have. Integral part of modern software Often overlooked – fire and forget doesn’t work (unlike military) These have the potential to derail all our plans by springing up surprizes PNSQC ™

SOFTWARE QUALITY CONFERENCE PACIFIC NW Does anyone identify that vehicle? Wagon wheels! Any guesses how your ride is gonna be on that!! Consider that vehicle to be our fancy software, and those wheel as 3rd party I don’t wanna refer to that the other way around, coz don’t we love what we build!!! Wheels to modern software; bit not THEEEESE wheels  Don’t reinvent the wheels PNSQC ™

Agenda Why manage third-party libraries Real life examples SOFTWARE QUALITY CONFERENCE Agenda PACIFIC NW Why manage third-party libraries Real life examples Best practices PNSQC ™

Why manage third-party libraries SOFTWARE QUALITY CONFERENCE PACIFIC NW Indispensable part of modern software Indiscriminate usage Frequent updates to such libraries is expected: Defects Vulnerabilities Features Updates may result in: API change Platform deprecation End-of-support for older versions Failure to manage third-party libraries may result in: Multiple hotfixes Unhappy customers Delayed product releases Lawsuits Don’t integrate a library without proper due diligence VULNERABILITY management is the most important aspect on managing 3rd party libs; its often overlooked Lawsuits :- Exaggeration, but not ruled out  PNSQC ™

Example…Library enumeration SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: A new high severity vulnerability has been reported for a 3rd party library, say ‘x’, which is shipped with our product Solution: Upgrade ‘x’ to its latest version to address the vulnerability and ship the hotfix No action is taken as the product team was ignorant of the fact that ‘x’ was used in the product Recommendation: We should enumerate a list of all libraries used in our product and keep it updated with every product release Gotcha! PNSQC ™

Example…Vulnerability tracking SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: Libraries enumeration is complete and yet another high severity vulnerability is reported for ‘x’ Solution: Upgrade ‘x’ to its latest version to address the vulnerability and ship the hotfix No hotfix was released as engineering was unaware of the existence of the vulnerability. Customer’s systems were exploited using vulnerable ‘x’ shipped with your product Recommendation: Actively track vulnerabilities in all libraries used. Many organizations have dedicated teams for this task E.g. NVD, library websites, vulnerability scanners… Gotcha! PNSQC ™

Example…Keeping things updated SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: All libraries are enumerated and vulnerabilities tracked and yet another high severity vulnerability is reported for ‘x’ Solution: Upgrade ‘x’ to its latest version to address the vulnerability and ship the hotfix The latest version of ‘x’ has API changes and platform deprecation, hence the hotfix cannot be delivered in time (SLAs) Recommendation: Let’s keep updating the libraries incrementally and don’t allow the version difference to grow out of control Gotcha! PNSQC ™

Example…Selection and support SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: All libraries are enumerated, vulnerabilities tracked, and the latest version used in the product. Another high severity vulnerability is reported for ‘x’ Solution: Upgrade ‘x’ to its latest version to address the vulnerability and ship the hotfix An updated version of the library ‘x’ is not available as it went End-of-Support (EoS) last year Recommendation: Have a system in place to pick libraries that are actively maintained. We’ve to keep track of their end-of-support dates to avoid surprises. Track alternatives too Gotcha! PNSQC ™

Example…Quality Matters SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: An attacker, using your product’s buffer overflow vulnerability, compromises multiple systems of our customer Solution: Provide an immediate fix within a week that fixes the vulnerability The vulnerability actually lies with the third-party library ‘x’ that is bundled with our product Recommendation: Third-party libraries should be tested (if possible) for quality to uncover potential vulnerabilities Gotcha! PNSQC ™

Example…Priorities SOFTWARE QUALITY CONFERENCE PACIFIC NW Problem: Our product is using an older version of library ‘x’ and an upgrade is pending since long time Solution: Upgrade the library to its latest version in the current release Management does not prioritize the library upgrade over other product features, leading to a hurried hotfix immediately after the product release due to a new vulnerability in the older version Recommendation: Management investment to reduce technical backlog is critical to reduce the number of hotfixes Gotcha! PNSQC ™

Lifecycle of a 3rd-party library & Best Practices SOFTWARE QUALITY CONFERENCE Lifecycle of a 3rd-party library & Best Practices PACIFIC NW Library selection is the key. Stringent selection process is needed An active Security Incidence Response program will help Management commitment is critical to meet Incidence Response SLAs PNSQC ™

Resources SOFTWARE QUALITY CONFERENCE PACIFIC NW National Vulnerability Database: https://web.nvd.nist.gov/view/vuln/search Vulnerability scanner: https://www.tenable.com/products/nessus-vulnerability-scanner PNSQC ™

Thank you Reach me at: linkedin.com/in/ruchirgarg SOFTWARE QUALITY CONFERENCE PACIFIC NW Reach me at: linkedin.com/in/ruchirgarg Ruchir.Garg@Intel.com / RuchirG@Gmail.com PNSQC ™