IT disaster recovery, cloud computing and information security news

Many organizations still taking risks by not effectively managing open source use

A new report highlights trends and patterns in open source use. It finds that many organizations are not effectively managing open source applications and components, resulting in significant vulnerabilities.

The Synopsys 2019 Open Source Security and Risk Analysis (OSSRA) report, produced by the Synopsys Cybersecurity Research Center(CyRC), examines the results of more than 1,200 audits of commercial applications and libraries, performed by the Black Duck Audit Services team.

As shown in the report, many of the trends in open source use that have presented risk management challenges to organizations in previous years persist today. However, the data also suggest that an inflection point has been reached, with many organizations improving their ability to manage open source risk, possibly due to heightened awareness and the maturation of commercial software composition analysis solutions.

"Open source plays an increasingly vital role in modern software development and deployment, but to realize its value organizations need to understand and manage how it impacts their risk posture from a security and license compliance perspective," said Tim Mackey, principal security strategist of the Synopsys Cybersecurity Research Center. "The 2019 OSSRA report provides a glimpse into the state of open source risk management within commercial applications. It shows that there are still significant challenges, with the majority of applications containing open source security vulnerabilities and license conflicts. But it also highlights that these challenges can be addressed, as the number open source vulnerabilities and license conflicts have declined from the previous year."

Some of the most noteworthy open source risk trends identified in the 2019 OSSRA report include:

  • There has been a significant uptick in open source adoption. 96 percent of codebases audited in 2018 contained open source components, with an average of 298 open source components per codebase compared to 257 in 2017.
  • Open source license conflicts can put intellectual property at risk. 68 percent of codebases contained some form of open source license conflict, and 38 percent contained open source components with no identifiable license.
  • The use of 'abandoned' components is common. 85 percent of codebases contained components that were more than four years out-of-date or had no development in the past two years.  If a component is inactive and no one is maintaining it, that means no one is addressing its potential vulnerabilities.
  • Many organizations are failing to patch or update their open source components. The average age of vulnerabilities identified in 2018 Black Duck Audits was 6.6 years, slightly higher than 2017—suggesting remediation efforts haven't improved significantly. 43 percent of the codebases scanned in 2018 contained vulnerabilities over 10 years old. When viewed against the backdrop of the National Vulnerability Database adding over 16,500 new vulnerabilities in 2018, its clear patch processes need to scale to accommodate increased disclosures.
  • Not all vulnerabilities are created equal, but many organizations aren't even addressing the riskiest ones. Over 40 percent
    of codebases contained at least one high-risk open source vulnerability.

The report notes that the use of open source software is not a problem in and of itself, and is, in fact, essential to software innovation. But failing to proactively identify and manage any security and license risks associated with the usage of open source components can be very damaging. Despite the risk factors identified, the 2019 OSSRA data suggests that, in the wake of the Equifax breach, an increase in awareness of open source risk and the maturation of commercial software composition analysis solutions has led to forward progress:

  • Organizations are getting better at managing open source security vulnerabilities. 60 percent of the codebases audited in 2018 contained at least one vulnerability—still significant, but much better than the figure of 78 percent from 2017.
  • Overall, open source license compliance has improved as well. 68 percent of the 2018 audited codebases contained components with license conflicts, compared to 74 percent in 2017.

More details.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.