Open-source software community releases plan to boost application security

Share post:

Under pressure after the discovery of several open source vulnerabilities including Log4Shell, leading open-source groups and software firms have created a 10-point plan for ensuring ongoing improvements in the security of open-source code. The plan, released Thursday with the encouragement of the White House, includes commitments of US$30 million in funding from Amazon, Google, Intel, Microsoft, and VMware. It was announced by senior members of the Linux Foundation and the Open Source Security Foundation (OpenSSF). The plan “represents a collective effort against 10 different targets where meaningful work can be applied to make a substantial improvement in the state of open source security,” Brian Behlendorf, general manager of the OpenSSF told reporters. “They should be viewed as a first draft,” he added, “with some specific goals to addressing those key problems. We will continue to work with stakeholders. Now that it’s public we will also be looking for new participants in further development of that plan.” The process officially started in January with a meeting at the White House between software companies, U.S. government experts, and open source software foundations to find ways of preventing security defects and vulnerabilities from getting into open source code, improving vulnerability discovery and remediation, and shorten the response time for distributing and implementing fixes. Open-source software and components have become increasingly used not only in open source applications but also in commercial software. However, many components are created by individual developers working on packages on their own time. Often they don’t have the time, or the financial incentive, to look for or respond to reports of vulnerabilities. As a result some serious bugs can lurk in software for years. The vulnerabilities in the Log4j2 logging library are only the latest example. The Mobilization Plan released Thursday is a series of 10 so-called activity streams proposed to meet the three goals set out in the January meeting. While there are commitments for US$30 million to help fund the streams, plan creators think it will take US$150 million to achieve the targets. Briefly, the streams are:
  • to deliver baseline secure software development education and certification by improving training materials so they can be considered an industry standard and used in courses and certifications;
  • establish a public, vendor-neutral, objective, metrics-based risk assessment dashboard for the up to 10,000 open-source software components;
  • accelerate the adoption of digital signatures on software releases so developers and end-users can verify the components they use haven’t been compromised;
  • eliminate root causes of many vulnerabilities through replacement of non-memory-safe languages like C and C++ with languages like Go and Rust;
  • establish the OpenSSF Open Source Security Incident Response Team, perhaps up to 40 experts who would assist developers when responding to a vulnerability. They could work full time for a number of days or weeks to help fix serious bugs;
  • accelerate the discovery of new vulnerabilities by maintainers and experts through advanced security tools and expert guidance;
  • conduct third-party code reviews, and any necessary remediation work, of up to 200 of the most critical open-source software components once a year;
  • co-ordinate industry-wide data sharing to improve the research that helps determine the most critical open-source software components;
  • improve software bill of materials (SBOM) tooling and training to encourage its use everywhere. A software bill of materials would help IT departments figure out what is in the applications they use and measure the risks if vulnerabilities are found;
  • enhance the 10 most critical open-source software build systems, package managers, and distribution systems with better supply chain security tools and best practices.
MORE TO COME The post Open-source software community releases plan to boost application security first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways