A6:2021 | Vulnerable and Outdated Components (13) | Cycubix Docs

Summary

  • Open source consumption in modern day applications has increased.
  • Open source is obtained from many different repositories with different quality standards.
  • Security information on vulnerabilities is scattered everywhere.
  • License information is often difficult to validate.
  • Most teams don’t have a component upgrade strategy.
  • Open source components are the new attack vector.

What to do

  • Generate an OSS Bill of Materials.
  • Baseline open source consumption in your organization.
  • Develop an open source component risk management strategy to mitigate current risk and reduce future risk.