The Dangers of Open Source Software and Best Practices for Securing Code

More and more organizations are incorporating open source software into their development pipelines. After all, embracing open source products such as operating systems, code libraries, software and applications can reduce costs, introduce additional flexibility and help to accelerate delivery. Yet, open source software can introduce additional concerns into the development process—namely, security.

Unlike commercial, or proprietary software, open source software code bases are not protected from prying eyes. In other words, the very nature of open source is one in which the code base is available to the world at large—which means flaws, vulnerabilities and other security concerns are discovered and reported. Of course, one would hope that would be a catalyst to fix those flaws, and in many cases that is true. However, discovered vulnerabilities often go unnoticed and busy DevOps teams may let those vulnerabilities slip through the cracks.

It is a situation that makes open source attractive to those will ill intent as well. Cybercriminals are constantly looking for chinks in the armor of applications, and those unpatched and vulnerable open source components may very well be an unintended invitation to intrusions. Since 2004, more than 139,000 vulnerabilities have been disclosed by the National Vulnerability Database (NVD), and that number increases daily.

Simply put, if developers using open source are unaware of newly discovered vulnerabilities, it is likely that open source components will not be patched, introducing vulnerabilities into production code.

This complimentary download is offered by Security Boulevard. Download Now

Recent Posts

Top Ways Your Cloud Security Approach is Burning Cash

Through our work across hundreds of clouds and tens of thousands of containers and workloads, we've captured the top ways organizations…

4 weeks ago

The Cloud Has Evolved. Are Your Security Tools Keeping Pace?

Organizations that purchased early cloud security products are finding that those tools are not able to keep up with dynamic…

4 weeks ago

Cisco Tetration: Securing All Phases of the Hybrid Cloud Journey

Tetration is a solution that offers many unique capabilities that are particularly well suited to help enterprises at all phases…

2 months ago

Enterprise SSL Solutions: A Buyers Guide

Having SSL certificates, or what are now officially known as TLS certificates, has always been a requirement for corporate IT…

2 months ago

How the New COVID-19 Normal Will Accelerate the Shift from Tokens to Digital Certificates

Among the most common methods employed to verify identity are hard and soft tokens. Hard tokens most often take the…

2 months ago

Managing the AppSec Toolstack

The best cybersecurity defense is always applied in layers—if one line of defense fails, the next should be able to…

3 months ago