On-demand open source audits aren’t enough. The Equifax data breach highlights the need for post-audit vigilance, particularly for security vulnerabilities.
The Equifax disaster underscores the importance of vigilance even after completing open source audits, particularly with respect to security vulnerabilities.
Much has been written about the recent breach. Here’s a good overview. In a nutshell, germane to this discussion, the exploited vulnerability was in a popular open source component, Apache Struts, that was made public in March, prior to the Equifax attacks. A patch was made available along with the disclosure; Equifax just didn’t apply it.
One can only speculate as to why, but it is the case that most companies can’t effectively identify let alone manage the open source components in their codebase. This is why companies perform audits, the purpose being to identify all of the open source in a code base and to highlight current risks. Given most companies don’t do this very well on their own, such audits have become an important tool in M&A transactions, giving the parties an understanding of potential problems that can be addressed in pre-close.
But an audit is a snapshot in time and security vulnerabilities are dynamic in nature. They may lay latent in code for years before being discovered (often by good actors, sometimes by bad). That’s why just knowing about the composition of a codebase isn’t enough. Let’s say a private equity firm had acquired Equifax in December and performed an audit as part of the acquisition. They would have been learned that Struts 2 was being used—probably among a hundred or more other open source components—but would not have been aware of CVE-2017-5638, the exploited vulnerability, which was not discovered and publicly disclosed until March.
The audit is an important first step, but after identifying the components of a code base, those responsible for a codebase need to monitor for newly identified security vulnerabilities. Unlike with commercial code, no one is pushing patches at users. Someone needs to be paying attention. The fictional Equifax acquirer would have done well to put a monitoring process in place soon after close.
Every day about 10 new open source vulnerabilities are disclosed. The average codebase contains about 150 open source components. So it can be nontrivial to stay on top of manually. Tools like Black Duck automate monitoring and track remediation. At minimum, a company needs a process to flag relevant new vulnerabilities.
Open source audits should be part of due diligence whenever software assets represent a significant part of the value of an acquired company. But Equifax reminds us that companies must remain vigilant post-close as well.
Phil is General Manager, Black Duck On-Demand. He works closely with Black Duck’s law firm partners and the open source community. A frequent speaker at industry events, Phil chairs the Linux Foundation's Software Package Data Exchange (SPDX) working group. With over 20 years’ software industry experience, Phil came to Black Duck from Empirix where he served as Vice President of Business Development and in other senior management positions, and was a pioneer in VoIP testing and monitoring. Prior to Empirix, Phil was a partner and ran consulting at High Performance Systems, a startup computer simulation modeling firm. He began his career with Teradyne's electronic design and test automation (EDA) software group in product, sales and marketing management roles. Phil has an AB in Engineering Science and an MS in System Simulation from the Thayer School of Engineering at Dartmouth College.