We Are All Equifax
Derek E. Weeks
Vice President, Sonatype
Co-founder, All Day DevOps
@weekstweets
“Emphasize performance of the entire system
and never pass a defect downstream.”
Gene Kim
The Phoenix Project
2013
Say Hello to Your Software Supply Chain…
@weekstweets
THE SSC INDEX
Open Source Component Download
Requests, The Central Repository,
2008 - 2017
87
2017
80% to 90% of
modern apps
consist of
assembled
components.
80% to 90% of
modern
operations
consist of
assembled
containers.
Containers
Hand-built
applications and
infrastructure
NOT ALL PARTS ARE CREATED EQUAL
@weekstweets
@weekstweets
CYBERSECURITY HYGIENE RATIO IS 1 IN 8
@weekstweets
170,000
Java component
downloads annually
18,870
11.1% with known
vulnerabilities
7,500 ORGANIZATIONS ANALYZED
@weekstweets
6-IN-10 HAVE OPEN SOURCE POLICIES
@weekstweets
DEFECT PERCENTAGES FOR JAVASCRIPT
@weekstweets
5 Month Opportunity to Take Corrective Action
Large Scale Exploit
March 10
Equifax applications
breached through
Struts2 vulnerability
AprMar May Jun Jul Aug Sept
March 7
Apache Struts releases
updated version to
thwart vulnerability
CVE-2017-5638
July 29
Breach is discovered
by Equifax.
Sept 7
A new RCE vulnerability
is announced and fixed.
CVE-2017-9805
Probing Hack
Crisis Management
3 DAYS BEFORE EXPLOIT
Source: Adapted from IBM X-Force / Analysis by Gartner Research (September 2016)
Year of Date Reported
2006 2007 2008 2009 2010 2011 2012 2013 2104 2015
10
20
30
40
50
0
AverageDaystoExploit
Average
45
15
2017
Struts vulnerability
announced
The
breach
Breach
discovered.
New Struts and
Spring vulnerabilities.
12 months since
Equifax breach.
0
20,000
40,000
60,000
80,000
100,000
120,000
Mar-17 Apr-17 May-17 Jun-17 Jul-17 Aug-17 Sep-17 Oct-17 Nov-17 Dec-17 Jan-18 Feb-18 Mar-18
Total
Breach
disclosed.
80% SHOW POOR CYBER HYGIENE
Number of vulnerable Struts component downloads per month
Source: Maven Central Repository, March 2018
VULNERABLE SPRING FRAMEWORK DOWNLOADS
CVE-2017-8046
72%
see security
pros in the
role of “nag”.
Check in
Trigger
Feedback Trigger
Which application security tools are critical to your organization?
TRUSTED SOFTWARE SUPPLY CHAINS
The question is not:
Can we build secure software?
Businesses decide where and how to invest in
cybersecurity based on a cost-benefit assessment
but they are ultimately liable for the security of
their data and systems.
U.K.’s National Cyber Security Strategy
2016 - 2021
“Emphasize performance of the entire system
and never pass a defect downstream.”
Gene Kim
The Phoenix Project
2013
weeks@sonatype.com
RSAC DevSecOpsDays 2018 - We are all Equifax

RSAC DevSecOpsDays 2018 - We are all Equifax