Do you have and use security tools for Software Composition Analysis?

ID

esf_s3c_dev/sca_in_use

Severity

high

Category

Levels

Optional

false

Tags

sca, security, slsa-4, supply-chain

Description

Do you have and use security tools for Software Composition Analysis?

Rationale

Automatic scanning for vulnerabilities detects known vulnerabilities in packages and dependencies in use, allowing faster patching when one is found. Such vulnerabilities can lead to a massive breach if not handled as fast as possible, as attackers will also know about those vulnerabilities and swiftly try to take advantage of them. Scanning packages regularly for vulnerabilities can also verify usage compliance with the organization’s security policy.

Gathering the dependencies graph and analyzing each dependency for vulnerabilities and other issues is named "Software Composition Analysis" or SCA. Tools that automate such analysis are called SCA tools.

Verification

Ensure automatic dependency scanning for vulnerabilities is enabled.

Remediation

Add dependency scanning tool to pipeline.

Small Print

Requiring reviews for all changes is infeasible for some projects, such as those with only one active participant. Even a project with multiple active contributors may not have enough active participation to be able to require review of all proposed changes. Projects with a small number of active participants instead sometimes aim for a review of a percentage of proposals (e.g., "at least half of all proposed changes are reviewed").