Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Why Core Open-Source Security Projects Need More Resources
Cybersecurity as a Business Enabler

Why Core Open-Source Security Projects Need More Resources

Bill DoerrfeldBy Bill DoerrfeldNovember 3, 2022Updated:December 1, 20225 Mins Read
Facebook Twitter LinkedIn Email
open source security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you don’t think you’re using open-source software (OSS) right now, think again. The Linux Foundation estimates that open source constitutes 70-90% of modern software. Consider the Linux kernel, the Apache web server, or the numerous open-source libraries supporting modern cloud infrastructure — it’s clear that the world now depends on open-source software to function. Yet, what isn’t clear are the security measures to prevent problems with these packages.

In recent years, we’ve seen open-source vulnerabilities rise into the public discourse. Exploits affecting major open-source projects, like Log4j or Spring4Shell, threaten the software supply chain at large. There’s also the issue of typosquatting and corrupt contributions to open-source projects. Open source relies on community contributions — yet verifying authenticity for millions of communal commits is inherently challenging to oversee — especially when many of these maintainers are hobbyists or contribute to open-source projects on the side of their day jobs.

Here’s a catch-22: If you don’t use open source, you’re not evolving. Yet if you do, you open your business to known and unknown vulnerabilities. I recently met with Aakash Shah, co-founder of cloud-native security company oak9, to consider what the industry needs to mature open-source security. According to Shah, the root issue these projects face is a lack of resources. As such, he believes large enterprises should invest more to support the open-source projects they rely upon.

Where’s the Support?

Not enough people understand that we live in a world that runs on open-source software. Shah credits the explosion of digital technology usage over the last 20 years primarily to the accessibility of free OSS. Nowadays, all major cloud service providers are built on open-source components, too. The question of whether or not we should use open-source is misguided when we are this deep in the proverbial open-source waters.

“Big Tech” companies such as Amazon, Google, and Microsoft have contributed core projects and invested considerably in sustaining these projects. Yet, on the whole, this amount of investment, especially into open-source security, is a drop in the bucket, says Shah. Most companies expect a “free lunch” from OSS yet don’t contribute resources to maintaining it.

A study conducted by Digital Ocean supports this notion. It found that although 75% of developers say their companies expect them to use open source as an integral part of their job, 66% must work on open source in their spare time. If a core maintainer leaves their full-time employment (which often happens, as engineering turnover is rampant), who then is supporting the maintenance of said projects?

Most enterprises don’t always have the mechanisms to support OSS, which is “one of the big core issues,” describes Shah. And when things go wrong, end users blame the project maintainers, even though supporting the project is not their full-time occupation. “It’s surprising to see things directed at them,” says Shah. “What they should be doing as citizens is contributing back.”

Open-Source Threats

Open-source packages face a multitude of unique vulnerabilities that hackers might exploit for differing ambitions. For example, a handful of instances are benign — white hat hackers have been known to make corrupt contributions simply to “generate awareness” around what’s possible. However, other potential risks are more severe, presenting threats such as ransomware, data downloads, denial-of-service attacks, and crypto-jacking.

“A lot of OSS can essentially be altered to capture secrets,” said Shah. With a secret, a hacker could make changes to core cloud infrastructure, opening many avenues of attack. At this point, an attacker could divulge sensitive information such as payment details or healthcare information to resell. Or they might seek to leech computing or storage from an unknowing host. As hyperscalers are dependent upon OSS, it potentially puts their customers at risk, too. And these risks are all-too-common — for evidence, just check out this list of all the publicly disclosed vulnerabilities from major public cloud providers. Shah asks: “If AWS, GCP, or Azure have these security issues, what does it mean for businesses that operate on them?”

Organizations continually are opting to give developers increased control over the entire release management lifecycle. This includes lending developers the freedom to use their favorite language, framework, or even cloud platform of choice. Yet, flexible multi-cloud strategies could potentially exacerbate the open-source security dilemma. Since procuring cloud technology relies on much OSS, multi-cloud essentially equates to a larger surface area to protect, says Shah.

Next Steps: Maintaining OSS Integrity

To maintain the integrity of open-source projects, every industry must be contributing back to open-source initiatives, says Shah. One strategy to uphold OSS integrity is to ensure the identity of contributors. This can be challenging with open-source projects since they rely on much communal input. Yet, the potential consequences of inaction are dire. For example, certain states may look to OSS as a vector to enhance their cyberwarfare capabilities by making malicious changes to core projects. This could, in turn, cripple a nation’s infrastructure.

To maintain code quality, maintainers must catch malicious code early on, and suspicious commits should be tagged and reviewed. Code signing, says Shah, could also go a long way to ensure the integrity of repositories and package managers. One standard gaining momentum to protect the cloud-native software supply chain is Sigstore, a method to bring cryptographic software signing to any digital artifact to prove it hasn’t been altered. Efforts like this will be required to secure the open-source pipeline as a whole.

Treat OSS as a Public Utility

“We have the maturity in the industry to protect open-source software, but it’s really a matter of open-source projects not having the resources,” said Shah. “That’s where I really see the gap.” Instead of viewing open source as a free lunch, it should be thought of as the “public utilities we all depend upon,” said Shah.

Enacting this change will require thought leaders to lead initiatives that drive improvements to open source and encourage enterprises to invest additional resources in the form of capital and expertise. Through these means, the ecosystems could be matured significantly.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Cybersecurity featured Open-Source Software Ransomware software
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

Quantum Era Begins: IBM, Cleveland Clinic Attack Deadly Diseases

March 28, 2023

Why CEOs Must Understand Applications, Benefits, and Risks of ChatGPT

March 28, 2023

How to Adapt Cybersecurity Processes to Strengthen Multi-Cloud Incident Response

March 28, 2023

How Informatica Is Helping Grocery Giant Kroger Fine-Tune Its Supply Chain

March 28, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Quantum Era Begins: IBM, Cleveland Clinic Attack Deadly Diseases
  • Why CEOs Must Understand Applications, Benefits, and Risks of ChatGPT
  • How to Adapt Cybersecurity Processes to Strengthen Multi-Cloud Incident Response
  • Why Information, or Data With Context, Is More Valuable Than Data Alone
  • How Informatica Is Helping Grocery Giant Kroger Fine-Tune Its Supply Chain

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.