Actions in the Wild: Usability and ease of use of open source security tools - OCX 2024

Subscribers:
24,000
Published on ● Video Link: https://www.youtube.com/watch?v=YS8nfvSFjfA



Duration: 0:00
23 views
0


"Eclipse Tractus-X" [1] is the official open-source project in the Catena-X [2] ecosystem supported by the Eclipse Foundation [3], serves as the official open-source initiative. It has a central landing page on GitHub [4] with all the information the developer community needs to use or contribute to our open-source software and community. The goal is to provide an environment to create a digital infrastructure that enables seamless data exchange and collaboration across the entire supply chain ecosystem. Tractus-X consists of 60 repositories and has three active Special Interest Groups (SIG); SIG-Release, SIG-Infra and SIG-Security [5]. SIG-security specifically focuses on engaging in security-related activities and collaborating with other SIG’s to build a comprehensive understanding and influence the project's security framework. With constant engagements and meaningful contributions coming from around180 contributors, the project encourages members to progress towards to become a committer [6]. The engagement of the security related activities was systematically conducted and refined through their integration into the GitHub platform, leveraging its capabilities to automate and streamline security checks. With the possibility to implement “security-by-design” approach, the project has evolved throughout various security controls across the Software Development Life Cycle (SDLC). With the help of CodeQl to perform Static Application Security Testing (SAST), Dependabot to perform Software Composition Analysis (SCA), Trivy to perform Infrastructure-as-Code (IAC) scanning and many other open-source tools are implemented to tighten the security measures. The developers' insights led to practical adjustments, making the tools more user-friendly and effective. This strategy not only reduced risks but also enabled a deeper understanding and smoother adoption of open-source security tools, leading to a more secure and streamlined software development lifecycle. With this talk, the attendees of the session would ideally learn something new about the vulnerability analysis, lessons learnt and best practices while implementing such open-source tools based on real scenarios that was experienced during the development of Tractus-X. The criticality and the impact of the vulnerabilities identified will be presented with the respective Common Vulnerabilities and Exposures (CVE) and Common Vulnerability Scoring System (CVSS) scores and how an automated approach using GitHub actions plays a vital role in continuous monitoring of the presence of vulnerabilities. The takeaway of this brief explanation would include how the CVE scoring is performed and what parameters are looked upon to derive the CVSS score , e.g., CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This would substantially provide a deeper insight to the audience especially to understand why certain tools differ from CVSS score for a particular CVE and understand how CVSS score differs from certain security databases in contrast to National Vulnerability Database (NVD). [1] Hello from Eclipse Tractus-X | Eclipse Tractus-X (eclipse-tractusx.github.io) [2] Catena-X Automotive Network | Catena-X [3] The Community for Open Collaboration and Innovation | The Eclipse Foundation [4] Eclipse Tractus-X (github.com) [5] eclipse-tractusx/sig-security (github.com) [6] sig-security/security-committer-pathway.md at main · eclipse-tractusx/sig-security (github.com) Attendee Pre-requisites -Nice to have knowledge on GitHub actions -Interest to learn about CVE and CVSS scores




Other Videos By Eclipse Foundation


2024-11-16Unleashing Organizational Potential Embracing Open Source Principles - OCX 2024
2024-11-16Collaborative Approaches to License Compliance OpenHarmony and Eclipse Oniro Compliance Toolchain
2024-11-16Crafting a Cloud Development Environment with Eclipse Che and Personal AI Assistants - OCX 2024
2024-11-16Your Journey to Inner Source - OCX 2024
2024-11-16Sustaining Git performance under heavy workloads: GHS, an AI driven approach (spons. by GerritForge)
2024-11-16Zero-Downtime Development (sponsored by Data in Motion & Kentyou) - OCX 2024
2024-11-16GitHub for Fun, Profit, and Security - OCX 2024
2024-11-16Eclipse IDE: A Chance for Every Java Developer and Java Using Company - OCX 2024
2024-11-16Mastering your Eclipse IDE - Java tooling, Tips & Tricks! - OCX 2024
2024-11-16Security Audits Panel - OCX 2024
2024-11-15Actions in the Wild: Usability and ease of use of open source security tools - OCX 2024
2024-11-14Conformity Assessment to build data pipelines between organisations, from PDF to source code-OCX 24
2024-11-14The reality of CDT's LSP and Tooling situation - OCX 2024
2024-11-14Chisel: a bottom up build strategy for minimal and secure Ubuntu containers - OCX 2024
2024-11-14BigCode: Building Open LLMs for Code - OCX 2024
2024-11-14Behind the scenes of JUnit 5 – running an independent open source project by example - OCX 2024
2024-11-14Eclipse Xpanse – Portable Managed Services to drive Cloud Autonomy sponsored by Huawei - OCX 2024
2024-11-14Disrupting the SW Composition Analysis market with OSS and open data - OCX 2024
2024-11-14Eclipse Apoapsis - Open Source based Software Composition Analysis at scale - OCX 2024
2024-11-14Leverage the evolution of Eclipse PDE - OCX 2024
2024-11-14Build and CI Observability for Open Source Communities (sponsored by Gradle) - OCX 2024