Learning Library

← Back to Library

Triple A Approach to Open Source Security

Key Points

  • A recent OpenSSF survey revealed that 41% of organizations lack confidence in the security of the open‑source software they use, highlighting widespread concern.
  • The speaker proposes the “Triple A” framework—Assess, Adopt, Act—to build open‑source security confidence, starting with a thorough assessment of project health (license clarity, governance, community activity) and security posture (architecture, code reviews, policies, and dependency management via SBOMs).
  • Adoption involves establishing internal policies that define ownership, issue‑reporting procedures, and contingency plans for unaddressed upstream vulnerabilities.
  • Ongoing action (the “Act” phase) includes continuously monitoring projects, contributing fixes, and improving security processes to maintain a resilient open‑source supply chain.

Full Transcript

# Triple A Approach to Open Source Security **Source:** [https://www.youtube.com/watch?v=baZH6CX6Zno](https://www.youtube.com/watch?v=baZH6CX6Zno) **Duration:** 00:04:23 ## Summary - A recent OpenSSF survey revealed that 41% of organizations lack confidence in the security of the open‑source software they use, highlighting widespread concern. - The speaker proposes the “Triple A” framework—Assess, Adopt, Act—to build open‑source security confidence, starting with a thorough assessment of project health (license clarity, governance, community activity) and security posture (architecture, code reviews, policies, and dependency management via SBOMs). - Adoption involves establishing internal policies that define ownership, issue‑reporting procedures, and contingency plans for unaddressed upstream vulnerabilities. - Ongoing action (the “Act” phase) includes continuously monitoring projects, contributing fixes, and improving security processes to maintain a resilient open‑source supply chain. ## Sections - [00:00:00](https://www.youtube.com/watch?v=baZH6CX6Zno&t=0s) **The Triple A's of Open Source Security** - The speaker introduces a three‑step framework—Assess, Adopt, Act—to build confidence in open‑source software, beginning with evaluating project health and security architecture. - [00:03:08](https://www.youtube.com/watch?v=baZH6CX6Zno&t=188s) **Open Source Security and Upgrade Policies** - Discusses the need for version‑upgrade policies, risk management, and active user contributions to maintain and improve open‑source security. ## Full Transcript
0:00Are you uncomfortable with open source security?  You are not alone. According to a recent survey 0:05by Open SSF, 41% of organizations out of more  than 500 surveyed said they don't have high 0:12confidence in the security of open source software  they use. Security is a big topic, but there are 0:18ways to understand it and gain confidence about  it. I view it as three interconnected angles -- 0:24or what I call the triple A's of open source  security considerations: Assess, Adopt, and Act. 0:32You can view them from any order, but let's look  at the Assess first. Under Assess, there are two main 0:39things. First one is the assessment of project  health. If you're not happy about project health, 0:43you won't be happy about the security. So first,  look at the project health. Look at the license 0:50and governance. A healthy project should have a  clear information about the license and there should 0:55be an open governance. Also, look at the community  and the current state of development. Look at the 1:01open pull requests, look at the open issues. See  how timely they are being addressed. Also, look 1:09at the merge pull requests and see the quality of  reviews and what kind of codes [changes] are being merged. 1:15This will tell a lot about the project health.  You can check mark it and move to the assessment 1:20of security. Under security there are a few  things. First one is studying the architecture and 1:26security model. Also checking out the use cases  and see the ease of use of software securely. 1:33Second thing is the code review. Review the code  with your security team. Let us review things 1:40like how user access management is being  done. How about data validations? And file 1:45permission handling? If there are anywhere  they are logging confidential information. 1:52You ought to look at the test coverage  for the security functionalities. 1:55Third thing is understanding their security  policies. A good project should have well 2:01documented security policies about how  to report an issue, how they handle CVEs. 2:08How they do periodic improvements in  the security postures and things like that. 2:15The first thing is to understand the dependencies.  A good project should have maintainers looking at 2:22any new dependencies and studying them. But you  also should study the dependencies yourself. 2:27If the project has provided a software bill of  material or SBOM, look at it. If it's not there, 2:33you can create one using third-party tools as  well. SBOM provides an inventory of dependencies 2:40and transitory dependencies that can help you  understand your risk related to dependencies. 2:46Check mark it. The second aspect is  Adopt. Adopting in-house policies for 2:52these security considerations. Have policies  around who will own the software internally. How 2:58we will be reporting issues to the upstream  project. Consider a situation when any of 3:03those issues are not being addressed by  the project team on time as you wanted. 3:09What will be your plan there? Also think about  version upgrade policies. Are there versions just 3:15coming out? Maybe part of security fixes, maybe a  major release. You want to have policies to upgrade 3:21your version to keep at least to a level where  the version is supported so that you can get help. 3:27Then, overall you need to  have policies for the risk management. 3:34The next aspect is Act. To act upon the maintaining and improving the security 3:39of open source. The security aspect  is not only responsibilities of the 3:44communities and the maintainers -- it should  be also responsibilities of users. You can 3:51contribute to the project in many ways: with the  code, with the documentation, review of code. 3:59Issue management -- anyone be part of user group  and be active there. By contributing, you're not 4:06only making the software better that you use and  helping the community, but you are also staying 4:11on top of the security and overall development  of the project. Thanks for watching. If you want 4:19to see more videos like this in the future,  please like and subscribe.