CIO Influence
CIO Influence News IT and DevOps

JFrog Curation Redefines “Shift Left” Security for Enterprise Software Supply Chains

JFrog Curation Redefines “Shift Left” Security for Enterprise Software Supply Chains

JFrog Ltd., the Liquid Software company and creators of the JFrog Software Supply Chain Platform, introduced JFrog Curation, an automated DevSecOps solution designed to thoroughly vet and block malicious open source or third-party software packages and their respective dependencies before entering an organization’s software development environment. Natively integrated with JFrog Artifactory binary repository, JFrog Curation is unique in its use of binary metadata for identification of malicious packages with higher-severity CVEs, operational, or license compliance issues – removing the need to download each package for scanning before use, which preserves developer speed and ease.

Software developers use millions of open source components to accelerate project delivery and gain a competitive edge, but this practice could be abused to inject malicious packages and vulnerabilities to the code – increasing the risk of software supply chain attacks,” said Asaf Karas, CTO of Security, JFrog.Application security must be taken seriously and looked at holistically from the point of creation through runtime on edge devicesJFrog Curation takes the ‘shift left’ concept to the next level by automatically blocking use of risky open source software packages before entry to an organization, drastically reducing a company’s overall attack surface without compromising on speed or the developer experience.”

CIO INFLUENCE: CIO Influence Interview with Herb Kelsey, Federal CTO at Dell Technologies

The use of open source software for development of commercial applications is now mainstream, with 87 percent of respondents to an IDC survey indicating open source would be their first choice over other commercial options. However, in 2022, more than 10 million people were impacted by software supply chain attacks targeting roughly 1,700 entities worldwide – nearly all of which included some element of faulty or nefarious open source code.

“Security incidents such as log4Shell, Spring4Shell, etc., have taught us that what’s safe today may not be safe tomorrow when using public open source libraries,” said Jim MercerIDC Research Vice President of DevOps and DevSecOps. “A tool that simplifies the developer experience while ensuring packages comply with established, regularly updated security policies, and are validated against relevant vulnerability databases, is essential for securing modern DevOps workflows.”

CIO INFLUENCE: Top Challenges for CTOs in 2023

JFrog Curation also validates incoming software packages against JFrog’s Security Research library of recorded Critical Vulnerabilities Exposures (CVE) and publicly available information to help establish a trusted repository of pre-approved, third-party software components for use in development. By effectively bridging public package repositories, developers, production, and security personas, JFrog Curation helps improve efficiency while preventing time-consuming and costly remediation efforts later.

JFrog Curation is designed to enable developers, security leaders, and DevSecOps engineers to:

  • Vet and block open source software components without compromising the developer experience or speed.
  • Have central visibility and governance of every open source package requested by a developer or build tool with accurate, metadata-based insights on all infected packages, with actionable advice on ways to remediate.
  • Create a comprehensive and transparent audit trail to help organizations comply with current and emerging regulatory requirements.
  • Optimize the developer experience with frictionless, validated software component retrieval.
  • Avoid the unruly sprawl of various tool suites through its integration with the JFrog Software Supply Chain Platform, which provides consistent, automated processes across development environments.

CIO INFLUENCE: General Data Protection Regulation (GDPR) Anniversary

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Cymulate Launches Co-Managed Solution to Help Companies Close Critical Security Blind Spots

CIO Influence News Desk

84% of Organizations Experienced Phishing & Ransomware Type Threats in the Past 12 Months

Discover Business Intelligence’s Transformative Role in CIO Leadership