<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Steve+Springett</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Steve+Springett"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Steve_Springett"/>
		<updated>2026-04-21T13:11:55Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256409</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256409"/>
				<updated>2019-12-16T21:27:49Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks application, library, framework, operating system, and hardware components&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Gems (Ruby)&lt;br /&gt;
** Hex (Erlang/Elixir)&lt;br /&gt;
** Maven (Java)&lt;br /&gt;
** NPM (Javascript)&lt;br /&gt;
** NuGet (.NET)&lt;br /&gt;
** Pypi (Python)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] Software Bill-of-Materials (SBOM) formats&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in OpenAPI format&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Dec 2019] v3.7.0 Released&lt;br /&gt;
* [01 Oct 2019] v3.6.1 Released&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/ozonru/dtrack-audit dtrack-audit]&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256387</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256387"/>
				<updated>2019-12-16T07:24:34Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks application, library, framework, operating system, and hardware components&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Hex (Erlang/Elixir)&lt;br /&gt;
** Gems (Ruby)&lt;br /&gt;
** Maven (Java)&lt;br /&gt;
** NPM (Javascript)&lt;br /&gt;
** NuGet (.NET)&lt;br /&gt;
** Pypi (Python)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] Software Bill-of-Materials (SBOM) formats&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in OpenAPI format&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Dec 2019] v3.7.0 Released&lt;br /&gt;
* [01 Oct 2019] v3.6.1 Released&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/ozonru/dtrack-audit dtrack-audit]&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=256386</id>
		<title>File:Integrations.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=256386"/>
				<updated>2019-12-16T07:22:55Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Steve Springett uploaded a new version of File:Integrations.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dependency-Track Ecosystem and Integrations&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256385</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=256385"/>
				<updated>2019-12-16T07:21:19Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks application, library, framework, operating system, and hardware components&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] Software Bill-of-Materials (SBOM) formats&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in OpenAPI format&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Dec 2019] v3.7.0 Released&lt;br /&gt;
* [01 Oct 2019] v3.6.1 Released&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/ozonru/dtrack-audit dtrack-audit]&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255462</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255462"/>
				<updated>2019-10-14T21:30:14Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: added dtrack-audit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks application, library, framework, operating system, and hardware components&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] Software Bill-of-Materials (SBOM) formats&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in OpenAPI format&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/ozonru/dtrack-audit dtrack-audit]&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255005</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255005"/>
				<updated>2019-09-29T06:27:03Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: doc update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks application, library, framework, operating system, and hardware components&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] Software Bill-of-Materials (SBOM) formats&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in OpenAPI format&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255004</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255004"/>
				<updated>2019-09-29T06:25:18Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: case&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBOM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [[OWASP Dependency Check|Dependency-Check]] reports to simplify the transition to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255003</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=255003"/>
				<updated>2019-09-29T06:23:51Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBoM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [[OWASP Dependency Check|Dependency-Check]] reports to simplify the transition to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [28 Sep 2019] v3.6.0 Released&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254302</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254302"/>
				<updated>2019-08-28T23:00:07Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The guide is licensed under the [https://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project Resources==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
* [https://owasp.slack.com/channels/project-scvs Slack Channel]&lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[Component Analysis|Supply Chain Component Analysis]]&lt;br /&gt;
* [[OWASP Dependency Check|Dependency-Check]]&lt;br /&gt;
* [[OWASP Dependency Track Project|Dependency-Track]] &lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Getting Involved=&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;OWASP SCVS&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
* Supply chain risk identification&lt;br /&gt;
* Documentation&lt;br /&gt;
* Strategy&lt;br /&gt;
* Messaging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   |project_description=&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_username1=Steve_Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
   | links_url1 = https://github.com/OWASP/Software-Component-Verification-Standard&lt;br /&gt;
   | links_name1 = GitHub Repository&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Steve_Springett&amp;diff=254294</id>
		<title>User:Steve Springett</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Steve_Springett&amp;diff=254294"/>
				<updated>2019-08-28T20:29:43Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: minor update to bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Steve Springett.jpg|left||thumb]]  Steve educates teams on the strategy and specifics of developing secure software.&lt;br /&gt;
He practices security at every stage of the development lifecycle by leading sessions on threat modeling, secure architecture and design, static/dynamic/component analysis, offensive research, and defensive programming techniques.&lt;br /&gt;
&lt;br /&gt;
Steve's passionate about helping organizations identify and reduce risk from the use of third-party and open source components. He is an open source advocate and leads the [[OWASP Dependency Track Project|OWASP Dependency-Track project]], [https://cyclonedx.org/ CycloneDX] bill-of-material specification, and participates in several related projects and working groups.&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254293</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254293"/>
				<updated>2019-08-28T20:24:22Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The guide is licensed under the [https://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project Resources==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
* [https://owasp.slack.com/channels/project-scvs Slack Channel]&lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[Component Analysis|Supply Chain Component Analysis]]&lt;br /&gt;
* [[OWASP Dependency Check|Dependency-Check]]&lt;br /&gt;
* [[OWASP Dependency Track Project|Dependency-Track]] &lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Getting Involved=&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;OWASP SCVS&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
* Supply chain risk identification&lt;br /&gt;
* Documentation&lt;br /&gt;
* Strategy&lt;br /&gt;
* Messaging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   | project_description=&lt;br /&gt;
   |project_home_page=https://www.owasp.org/index.php/OWASP_Software_Component_Verification_Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_username1=Steve_Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254292</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254292"/>
				<updated>2019-08-28T20:23:55Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The guide is licensed under the [https://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project Resources==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
[https://owasp.slack.com/channels/project-scvs Slack Channel]&lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[Component Analysis|Supply Chain Component Analysis]]&lt;br /&gt;
* [[OWASP Dependency Check|Dependency-Check]]&lt;br /&gt;
* [[OWASP Dependency Track Project|Dependency-Track]] &lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Getting Involved=&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;OWASP SCVS&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
* Supply chain risk identification&lt;br /&gt;
* Documentation&lt;br /&gt;
* Strategy&lt;br /&gt;
* Messaging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   | project_description=&lt;br /&gt;
   |project_home_page=https://www.owasp.org/index.php/OWASP_Software_Component_Verification_Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_username1=Steve_Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254290</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254290"/>
				<updated>2019-08-28T19:55:22Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The guide is licensed under the [https://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project Resources==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[Component Analysis|Supply Chain Component Analysis]]&lt;br /&gt;
* [[OWASP Dependency Check|Dependency-Check]]&lt;br /&gt;
* [[OWASP Dependency Track Project|Dependency-Track]] &lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Getting Involved=&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;OWASP SCVS&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
* Supply chain risk identification&lt;br /&gt;
* Documentation&lt;br /&gt;
* Strategy&lt;br /&gt;
* Messaging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   | project_description=&lt;br /&gt;
   |project_home_page=https://www.owasp.org/index.php/OWASP_Software_Component_Verification_Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254289</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254289"/>
				<updated>2019-08-28T19:51:38Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project Resources==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[Component Analysis|Supply Chain Component Analysis]]&lt;br /&gt;
* [[OWASP Dependency Check|Dependency-Check]]&lt;br /&gt;
* [[OWASP Dependency Track Project|Dependency-Track]] &lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Getting Involved=&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;OWASP SCVS&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
* Supply chain risk identification&lt;br /&gt;
* Documentation&lt;br /&gt;
* Strategy&lt;br /&gt;
* Messaging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   | project_description=&lt;br /&gt;
   |project_home_page=https://www.owasp.org/index.php/OWASP_Software_Component_Verification_Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254288</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254288"/>
				<updated>2019-08-28T19:40:34Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Software Component Verification Standard==&lt;br /&gt;
This project is currently incubating... Stay tuned.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Documentation Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Documentation project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Documentation Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Documentation Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=Roadmap=&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254287</id>
		<title>OWASP Software Component Verification Standard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Component_Verification_Standard&amp;diff=254287"/>
				<updated>2019-08-28T19:35:05Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: incubating docs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Component Verification Standard&lt;br /&gt;
   |leader_name1=Steve Springett&lt;br /&gt;
   |leader_email1=steve.springett@owasp.org&lt;br /&gt;
   |project_license=Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Documentation Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Documentation Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Documentation Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Documentation project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Documentation Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of August, 2019, the highest priority is to get a usable rough draft which can be iterated on by December 31, 2019.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Documentation Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/Software-Component-Verification-Standard GitHub Repository]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto://steve.springett@owasp.org Steve Springett]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=253477</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=253477"/>
				<updated>2019-08-01T15:54:53Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Added community integrations. Limiting news to last five items.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBoM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [[OWASP Dependency Check|Dependency-Check]] reports to simplify the transition to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Community Integrations ==&lt;br /&gt;
* [https://github.com/pmckeown/dependency-track-maven-plugin Dependency-Track Maven plugin]&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=253180</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=253180"/>
				<updated>2019-07-21T21:31:11Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBoM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [[OWASP Dependency Check|Dependency-Check]] reports to simplify the transition to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [17 Jul 2019] v3.5.1 Released&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252490</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252490"/>
				<updated>2019-06-19T22:24:56Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: desc&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBoM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [[OWASP Dependency Check|Dependency-Check]] reports to simplify the transition to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252489</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252489"/>
				<updated>2019-06-19T21:55:24Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: updated description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is an intelligent Software [[Component Analysis|Supply Chain Component Analysis]] platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill-of-Materials (SBoM). This approach provides capabilities that traditional Software Composition Analysis (SCA) solutions cannot achieve.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track monitors component usage across all versions of every application in its portfolio in order to proactively identify risk across an organization. The platform has an API-first design and is ideal for use in Continuous Integration (CI) and Continuous Delivery (CD) environments.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Tracks component usage across all version of every application in an organizations portfolio&lt;br /&gt;
* Identifies multiple forms of risk including&lt;br /&gt;
** Components with known vulnerabilities&lt;br /&gt;
** Out-of-date components&lt;br /&gt;
** Modified components&lt;br /&gt;
** License risk&lt;br /&gt;
** More coming soon...&lt;br /&gt;
* Integrates with multiple sources of vulnerability intelligence including:&lt;br /&gt;
** [https://nvd.nist.gov National Vulnerability Database] (NVD)&lt;br /&gt;
** [https://www.npmjs.com/advisories NPM Public Advisories]&lt;br /&gt;
** [https://ossindex.sonatype.org Sonatype OSS Index]&lt;br /&gt;
** [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]&lt;br /&gt;
** More coming soon.&lt;br /&gt;
* Ecosystem agnostic with built-in repository support for:&lt;br /&gt;
** Ruby Gems&lt;br /&gt;
** Maven&lt;br /&gt;
** NPM&lt;br /&gt;
** NuGet&lt;br /&gt;
** Python (Pypi)&lt;br /&gt;
** More coming soon.  &lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports importing of [https://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] software bill-of-materials&lt;br /&gt;
* Supports importing of [Dependency-Check] reports to simplify transitioning to SBoMs&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Native support for Kenna Security, Fortify SSC, and ThreadFix&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252284</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=252284"/>
				<updated>2019-06-09T17:46:59Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: 3.5.0 release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://plugins.jenkins.io/dependency-track Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [07 Jun 2019] v3.5.0 Released&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=251392</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=251392"/>
				<updated>2019-05-11T07:05:29Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://plugins.jenkins.io/dependency-track Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Apr 2019] v3.4.1 Released&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Check&amp;diff=249752</id>
		<title>OWASP Dependency Check</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Check&amp;diff=249752"/>
				<updated>2019-04-05T18:16:25Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Integrations */  Updated SQ plugin URL. Added Circle CI Orb&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Dependency-Check==&lt;br /&gt;
&lt;br /&gt;
Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities.  Currently, Java and .NET are supported; additional experimental support has been added for Ruby, Node.js, Python, and limited support for C/C++ build systems (autoconf and cmake). The tool can be part of a solution to the [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | OWASP Top 10 2017 A9-Using Components with Known Vulnerabilities]] previously known as [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | OWASP Top 10 2013 A9-Using Components with Known Vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 2013 contains a new entry: [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9-Using Components with Known Vulnerabilities]]. Dependency Check can currently be used to scan applications (and their dependent libraries) to identify any known vulnerable components.&lt;br /&gt;
&lt;br /&gt;
The problem with using known vulnerable components was described very well in a paper by Jeff Williams and Arshan Dabirsiaghi titled, &amp;quot;[https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf Unfortunate Reality of Insecure Libraries]&amp;quot;. The gist of the paper is that we as a development community include third party libraries in our applications that contain well known published vulnerabilities (such as those at the [https://nvd.nist.gov/vuln/search National Vulnerability Database]).&lt;br /&gt;
&lt;br /&gt;
Dependency-check has a command line interface, a Maven plugin, an Ant task, and a Jenkins plugin. The core engine contains a series of analyzers that inspect the project dependencies, collect pieces of information about the dependencies (referred to as evidence within the tool). The evidence is then used to identify the [https://nvd.nist.gov/products/cpe Common Platform Enumeration (CPE)] for the given dependency. If a CPE is identified, a listing of associated [https://cve.mitre.org/ Common Vulnerability and Exposure (CVE)] entries are listed in a report.&lt;br /&gt;
&lt;br /&gt;
Dependency-check automatically updates itself using the [https://nvd.nist.gov/vuln/data-feeds NVD Data Feeds] hosted by NIST. '''IMPORTANT NOTE:''' The initial download of the data may take ten minutes or more. If you run the tool at least once every seven days, only a small XML file needs to be downloaded to keep the local copy of the data current.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Version 4.0.2&lt;br /&gt;
* [https://dl.bintray.com/jeremy-long/owasp/dependency-check-4.0.2-release.zip Command Line]&lt;br /&gt;
* [https://dl.bintray.com/jeremy-long/owasp/dependency-check-ant-4.0.2-release.zip Ant Task]&lt;br /&gt;
* [https://search.maven.org/#artifactdetails%7Corg.owasp%7Cdependency-check-maven%7C4.0.2%7Cmaven-plugin Maven Plugin]&lt;br /&gt;
* [https://search.maven.org/#artifactdetails%7Corg.owasp%7Cdependency-check-gradle%7C4.0.2%7Cgradle-plugin Gradle Plugin]&lt;br /&gt;
* [https://plugins.jenkins.io/dependency-check-jenkins-plugin Jenkins Plugin]&lt;br /&gt;
* [https://brew.sh/ Mac Homebrew]:&amp;lt;br&amp;gt;&amp;lt;code&amp;gt;brew update &amp;amp;&amp;amp; brew install dependency-check&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other Plugins&lt;br /&gt;
* [https://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.vonbuchholtz%22%20a%3A%22sbt-dependency-check%22 sbt Plugin]&lt;br /&gt;
* [https://github.com/livingsocial/lein-dependency-check lein-dependency-check]&lt;br /&gt;
&lt;br /&gt;
== Integrations ==&lt;br /&gt;
* [https://github.com/SonarSecurityCommunity/dependency-check-sonar-plugin SonarQube Plugin]&lt;br /&gt;
* [https://github.com/entur/owasp-orb Circle CI Orb]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/jeremylong/DependencyCheck github]&lt;br /&gt;
* [https://github.com/jeremylong/dependency-check-gradle gradle source]&lt;br /&gt;
* [https://github.com/albuch/sbt-dependency-check sbt source]&lt;br /&gt;
* [https://github.com/jenkinsci/dependency-check-plugin jenkins source]&lt;br /&gt;
* [https://www.ohloh.net/p/dependencycheck Ohloh]&lt;br /&gt;
* [https://bintray.com/jeremy-long/owasp Bintray]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
* [https://jeremylong.github.io/DependencyCheck/ Documentation (on GitHub)]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:dependency-check+subscribe@googlegroups.com Subscribe]&lt;br /&gt;
* [mailto:dependency-check@googlegroups.com Post]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/dependency-check Archived Posts]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [https://jeremylong.github.io/DependencyCheck/general/dependency-check.pdf dependency-check (PDF)]&lt;br /&gt;
* [https://jeremylong.github.io/DependencyCheck/general/dependency-check.pptx dependency-check  (PPTX)]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=https://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Dependency-Check is developed by a team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [[User:Jeremy Long|Jeremy Long]]&lt;br /&gt;
* [[User:Steve Springett|Steve Springett]]&lt;br /&gt;
* [[User:Will Stranathan|Will Stranathan]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of March 2015, the top priorities are:&lt;br /&gt;
* Resolving all open [https://github.com/jeremylong/DependencyCheck/issues?state=open github issues/feature requests]&lt;br /&gt;
* Improving analysis for .NET DLLs&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of dependency-check is actively encouraged! You do not have to be a security expert in order to contribute. How you can help:&lt;br /&gt;
* Use the tool&lt;br /&gt;
* Provide feedback via the [https://groups.google.com/forum/?fromgroups#!forum/dependency-check mailing list] or by creating [https://github.com/jeremylong/DependencyCheck/issues?state=open github issues] (both bugs and feature requests are encouraged)&lt;br /&gt;
* The project source code is hosted on [https://github.com/jeremylong/DependencyCheck/ github] - if you are so inclined fork it and provide push requests!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249490</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249490"/>
				<updated>2019-03-31T02:54:37Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Recommendations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Modern software is assembled using third-party and open source components, glued together in complex and unique ways, and integrated with original code to provide the desired functionality. Third-party (including commercially licensed, proprietary, and &amp;quot;source available&amp;quot; software) along with open source components provide the necessary building blocks that allow organizations to deliver value, improve quality, reduce risk and time-to-market. The benefits of open source are many. However, by using open source components, organizations ultimately take responsibility for code they did not write. Strategic alliances between organizations and open source projects can lead to healthy open source usage and overall risk reduction.&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Inventory =====&lt;br /&gt;
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.&lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components may improve quality or performance. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Outdated version identification may leverage ecosystem-specific repositories and is achievable through the use of dependency managers or [[#Component Identification|Package URL]]. Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Function =====&lt;br /&gt;
Identifying and analyzing the purpose of each component may reveal the existence of components with duplicate or similar functionality. For example, it's unlikely an application would need multiple XML parsers or cryptographic providers. Potential risk can be reduced by minimizing the number of components for each function and by choosing the highest quality components for each function. Evaluating component function should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The operational and maintenance cost of using open source will increase with the adoption of every new component. The impact can be significantly higher with micro-module ecosystems when there are hundreds or thousands of applications in a given environment. In addition to increased operational and maintenance cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the ''chain of custody''. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Bill-of-Materials (SBOM) ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients in a recipe. Both are an implementation of transparency.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Standardize on a single component for each component function&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of software bill-of-materials (SBOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within SBOMs&lt;br /&gt;
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM&lt;br /&gt;
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.insignary.com/ Clarity] || tool_owner = Insignary || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://fossa.com/ FOSSA] || tool_owner = FOSSA || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249489</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249489"/>
				<updated>2019-03-31T02:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Separated out function from type. Added some clarifications and feedback from community&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Modern software is assembled using third-party and open source components, glued together in complex and unique ways, and integrated with original code to provide the desired functionality. Third-party (including commercially licensed, proprietary, and &amp;quot;source available&amp;quot; software) along with open source components provide the necessary building blocks that allow organizations to deliver value, improve quality, reduce risk and time-to-market. The benefits of open source are many. However, by using open source components, organizations ultimately take responsibility for code they did not write. Strategic alliances between organizations and open source projects can lead to healthy open source usage and overall risk reduction.&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Inventory =====&lt;br /&gt;
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.&lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components may improve quality or performance. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Outdated version identification may leverage ecosystem-specific repositories and is achievable through the use of dependency managers or [[#Component Identification|Package URL]]. Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Function =====&lt;br /&gt;
Identifying and analyzing the purpose of each component may reveal the existence of components with duplicate or similar functionality. For example, it's unlikely an application would need multiple XML parsers or cryptographic providers. Potential risk can be reduced by minimizing the number of components for each function and by choosing the highest quality components for each function. Evaluating component function should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The operational and maintenance cost of using open source will increase with the adoption of every new component. The impact can be significantly higher with micro-module ecosystems when there are hundreds or thousands of applications in a given environment. In addition to increased operational and maintenance cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the ''chain of custody''. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Bill-of-Materials (SBOM) ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients in a recipe. Both are an implementation of transparency.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Standardize on a single component for each component type&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of software bill-of-materials (SBOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within SBOMs&lt;br /&gt;
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM&lt;br /&gt;
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.insignary.com/ Clarity] || tool_owner = Insignary || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://fossa.com/ FOSSA] || tool_owner = FOSSA || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Supply_Chain_Component_Analysis&amp;diff=249460</id>
		<title>Supply Chain Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Supply_Chain_Component_Analysis&amp;diff=249460"/>
				<updated>2019-03-30T01:53:27Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Redirected page to Component Analysis&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Component Analysis]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249162</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=249162"/>
				<updated>2019-03-21T22:58:23Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Added tool: Clarity&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Inventory =====&lt;br /&gt;
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.&lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Component type may also be used to determine if duplicate or similar functionally exists. For example, it's unlikely an application would need multiple XML parsers or cryptographic libraries. Risk can be reduced by minimizing the number of components for a given type. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Bill-of-Materials (SBOM) ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Standardize on a single component for each component type&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of software bill-of-materials (SBOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within SBOMs&lt;br /&gt;
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM&lt;br /&gt;
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.insignary.com/ Clarity] || tool_owner = Insignary || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://fossa.com/ FOSSA] || tool_owner = FOSSA || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=248977</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=248977"/>
				<updated>2019-03-19T22:32:34Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Added FOSSA&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Inventory =====&lt;br /&gt;
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.&lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Component type may also be used to determine if duplicate or similar functionally exists. For example, it's unlikely an application would need multiple XML parsers or cryptographic libraries. Risk can be reduced by minimizing the number of components for a given type. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Bill-of-Materials (SBOM) ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Standardize on a single component for each component type&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of software bill-of-materials (SBOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within SBOMs&lt;br /&gt;
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM&lt;br /&gt;
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://fossa.com/ FOSSA] || tool_owner = FOSSA || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=248976</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=248976"/>
				<updated>2019-03-19T21:38:26Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Added component inventory and clarifications to existing risks. Removed from draft&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Inventory =====&lt;br /&gt;
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.&lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Component type may also be used to determine if duplicate or similar functionally exists. For example, it's unlikely an application would need multiple XML parsers or cryptographic libraries. Risk can be reduced by minimizing the number of components for a given type. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Bill-of-Materials (SBOM) ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Standardize on a single component for each component type&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of software bill-of-materials (SBOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within SBOMs&lt;br /&gt;
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM&lt;br /&gt;
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246463</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246463"/>
				<updated>2019-01-08T17:23:42Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Added Renovate to tool listing&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;DRAFT&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component, the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.&lt;br /&gt;
&lt;br /&gt;
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Transparency ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of bill-of-materials (BOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within BOMs&lt;br /&gt;
* Contractually require BOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM&lt;br /&gt;
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://renovatebot.com/ Renovate ] || tool_owner = Key Location || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246457</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246457"/>
				<updated>2019-01-08T04:52:46Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Removed several occurrances of hardware - keeping just brief mentions of hardware&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;DRAFT&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component, the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.&lt;br /&gt;
&lt;br /&gt;
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Transparency ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of bill-of-materials (BOM) for all deliverables&lt;br /&gt;
* Leverage Package URL for describing components within BOMs&lt;br /&gt;
* Contractually require BOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM&lt;br /&gt;
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246456</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246456"/>
				<updated>2019-01-08T04:45:24Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: added additional tools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;DRAFT&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component (hardware or software), the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers. Reliability engineers will also site a lower Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF) on older hardware components.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Hardware components also come in both serviceable and non-serviceable varieties, each having varying degrees of risk. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.&lt;br /&gt;
&lt;br /&gt;
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Transparency ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of bill-of-materials (BOM) for all deliverables (hardware and software)&lt;br /&gt;
* Leverage Package URL for describing components within BOMs&lt;br /&gt;
* Contractually require BOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM&lt;br /&gt;
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://clearlydefined.io/ ClearlyDefined] || tool_owner = Open Source Initiative || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://grafeas.io/ Grafeas] || tool_owner = Grafeas || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://greenkeeper.io/ Greenkeeper] || tool_owner = Greenkeeper || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/heremaps/oss-review-toolkit OSS Review Toolkit] || tool_owner = HERE || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://ionchannel.io/ Ion Channel SA] || tool_owner = Ion Channel || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://mergebase.com MergeBase ] || tool_owner = MergeBase || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246392</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246392"/>
				<updated>2019-01-06T06:11:09Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: added purl to recommendation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;DRAFT&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component (hardware or software), the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers. Reliability engineers will also site a lower Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF) on older hardware components.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Hardware components also come in both serviceable and non-serviceable varieties, each having varying degrees of risk. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.&lt;br /&gt;
&lt;br /&gt;
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Transparency ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of bill-of-materials (BOM) for all deliverables (hardware and software)&lt;br /&gt;
* Leverage Package URL for describing components within BOMs&lt;br /&gt;
* Contractually require BOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM&lt;br /&gt;
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Software_Composition_Analysis&amp;diff=246391</id>
		<title>Software Composition Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Software_Composition_Analysis&amp;diff=246391"/>
				<updated>2019-01-06T06:03:33Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Initial commit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Component Analysis]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246390</id>
		<title>Component Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Component_Analysis&amp;diff=246390"/>
				<updated>2019-01-06T05:59:12Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Initial commit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;DRAFT&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).&lt;br /&gt;
&lt;br /&gt;
Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.&lt;br /&gt;
&lt;br /&gt;
== Common Risk Factors == &lt;br /&gt;
&lt;br /&gt;
===== Component Age =====&lt;br /&gt;
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component (hardware or software), the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers. Reliability engineers will also site a lower Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF) on older hardware components.&lt;br /&gt;
&lt;br /&gt;
===== Outdated Components =====&lt;br /&gt;
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:&lt;br /&gt;
&lt;br /&gt;
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)&lt;br /&gt;
* Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)&lt;br /&gt;
&lt;br /&gt;
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.&lt;br /&gt;
&lt;br /&gt;
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.&lt;br /&gt;
&lt;br /&gt;
Component analysis can identify outdated components as well as provide information about newer versions.&lt;br /&gt;
&lt;br /&gt;
===== Known Vulnerabilities =====&lt;br /&gt;
Historically, known vulnerabilities referred to entries (CVEs) in the [https://nvd.nist.gov/ National Vulnerability Database] (NVD). The NVD describes (via [https://nvd.nist.gov/products/cpe CPE]) three types of components:&lt;br /&gt;
* Applications (includes libraries and frameworks)&lt;br /&gt;
* Operating Systems&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a ''known'' vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being ''known''.&lt;br /&gt;
&lt;br /&gt;
Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.&lt;br /&gt;
&lt;br /&gt;
===== Component Type =====&lt;br /&gt;
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Hardware components also come in both serviceable and non-serviceable varieties, each having varying degrees of risk. Evaluating the type should be part of every Component Analysis strategy.&lt;br /&gt;
&lt;br /&gt;
===== Component Quantity =====&lt;br /&gt;
The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.&lt;br /&gt;
&lt;br /&gt;
===== Repository Trust =====&lt;br /&gt;
Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:&lt;br /&gt;
&lt;br /&gt;
* Typosquatting - naming a component in such as way as to take advantage of common misspelling&lt;br /&gt;
* Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust&lt;br /&gt;
* Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another&lt;br /&gt;
* Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones&lt;br /&gt;
&lt;br /&gt;
Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. ''Golden repositories'' containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.&lt;br /&gt;
&lt;br /&gt;
===== Pedigree =====&lt;br /&gt;
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.&lt;br /&gt;
&lt;br /&gt;
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.&lt;br /&gt;
&lt;br /&gt;
===== License =====&lt;br /&gt;
Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.&lt;br /&gt;
&lt;br /&gt;
=====Inherited Risk =====&lt;br /&gt;
Third-party and open source components often have dependencies on other components. A ''transitive dependency'' is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.&lt;br /&gt;
&lt;br /&gt;
===== Project Health =====&lt;br /&gt;
There are many datapoints to consider when evaluating the health of an open source project. &lt;br /&gt;
* Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools. &lt;br /&gt;
* Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.&lt;br /&gt;
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation. &lt;br /&gt;
&lt;br /&gt;
== Software Transparency ==&lt;br /&gt;
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.&lt;br /&gt;
&lt;br /&gt;
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.&lt;br /&gt;
&lt;br /&gt;
== Component Identification ==&lt;br /&gt;
Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the [https://nvd.nist.gov/products/cpe CPE Product Dictionary] maintained by [https://www.nist.gov/ NIST] adds additional fragmentation as the CPE vendor and product names often do not reflect reality.&lt;br /&gt;
&lt;br /&gt;
Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The [https://github.com/package-url Package URL] [https://github.com/package-url/purl-spec specification] provides a decentralized and uniform way to represent components.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
scheme:type/namespace/name@version?qualifiers#subpath&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
pkg:deb/debian/curl@7.50.3-1?arch=i386&amp;amp;distro=jessie&lt;br /&gt;
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c&lt;br /&gt;
pkg:gem/jruby-launcher@1.1.2?platform=java&lt;br /&gt;
pkg:maven/org.apache.xmlgraphics/batik-anim@1.9.1?packaging=sources&lt;br /&gt;
pkg:npm/%40angular/animation@12.3.1&lt;br /&gt;
pkg:nuget/EnterpriseLibrary.Common@6.0.1304&lt;br /&gt;
pkg:pypi/django@1.11.1&lt;br /&gt;
pkg:rpm/fedora/curl@7.50.3-1.fc25?arch=i386&amp;amp;distro=fedora-25&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Open Source Policy ==&lt;br /&gt;
Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:&lt;br /&gt;
* Restrictions on component age&lt;br /&gt;
* Restrictions on outdated and EOL/EOS components&lt;br /&gt;
* Prohibition of components with known vulnerabilities&lt;br /&gt;
* Restrictions on public repository usage&lt;br /&gt;
* Restrictions on acceptable licenses&lt;br /&gt;
* Component update requirements&lt;br /&gt;
* Blacklist of prohibited components and versions&lt;br /&gt;
* Acceptable community contribution guidelines&lt;br /&gt;
&lt;br /&gt;
While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
* Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant&lt;br /&gt;
* Prohibit the use of end-of-life (EOL) components&lt;br /&gt;
* Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.&lt;br /&gt;
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies&lt;br /&gt;
* Reduce the number of suppliers and use the highest quality components from those suppliers&lt;br /&gt;
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.&lt;br /&gt;
* Automate component updates (from trusted repositories only)&lt;br /&gt;
* Provide time-boxed allowances every sprint to maintain component hygiene&lt;br /&gt;
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses&lt;br /&gt;
* Automate the creation of bill-of-materials (BOM) for all deliverables (hardware and software)&lt;br /&gt;
* Contractually require BOMs from vendors and embed their acquisition in the procurement process&lt;br /&gt;
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM&lt;br /&gt;
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blackducksoftware.com/ Black Duck Hub] || tool_owner = Synopsys || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.nexb.com/ DejaCode] || tool_owner = nexB || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Check|Dependency-Check]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [[OWASP Dependency Track Project|Dependency-Track]] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://dependabot.com/ Dependabot] || tool_owner = Dependabot || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://depshield.github.io DepShield] || tool_owner = Sonatype || tool_licence = Open Source || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/RetireNet/dotnet-retire DotNET Retire] || tool_owner = Retire.NET Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.flexera.com/products/software-composition-analysis/flexnet-code-insight.html FlexNet Code Insight] || tool_owner = Flexera || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.fossology.org/ FOSSology] || tool_owner = Linux Foundation || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://libraries.io/ Libraries.io ] || tool_owner = Tidelift || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.npmjs.com/ NPM Audit] || tool_owner = NPM || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://github.com/sensiolabs/security-checker PHP Security Checker] || tool_owner = SensioLabs || tool_licence = Open Source || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://snyk.io/ Snyk] || tool_owner = Snyk || tool_licence = Commercial / Freemium || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sourceclear.com/ SourceClear] || tool_owner = Veracode || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.sonatype.com/ Nexus IQ] || tool_owner = Sonatype || tool_licence = Commercial || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.whitesourcesoftware.com/ Open Source Lifecycle Management] || tool_owner = WhiteSource Software || tool_licence = Commercial || tool_platforms = Cross Platform / SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://retirejs.github.io/retire.js/ Retire.js] || tool_owner = RetireJS Project || tool_licence = Open Source || tool_platforms = Cross Platform}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://vulndb.cyberriskanalytics.com/ VulnDB] || tool_owner = Risk Based Security || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)&lt;br /&gt;
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)&lt;br /&gt;
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)&lt;br /&gt;
*https://cyclonedx.org/ - CycloneDX specification&lt;br /&gt;
*https://spdx.org/ - Software Package Data Exchange (SPDX)&lt;br /&gt;
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)&lt;br /&gt;
*https://github.com/package-url - Package URL specification and reference implementations&lt;br /&gt;
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)&lt;br /&gt;
*https://safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf - Managing Security Risks Inherent in the Use of Third-party Components (SAFECode)&lt;br /&gt;
*https://www.mitre.org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf - Deliver Uncompromised (MITRE)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;br /&gt;
[[Category:OWASP_Best_Practices]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Tool_Info&amp;diff=246340</id>
		<title>OWASP Tool Info</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Tool_Info&amp;diff=246340"/>
				<updated>2019-01-03T07:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: added optional description column&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-  &lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_name|}}} | {{{tool_name}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_owner|}}} | {{{tool_owner}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_website|}}} | {{{tool_website}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_licence|}}} | {{{tool_licence}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_stable_release|}}} | {{{tool_stable_release}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_release_date|}}} | {{{tool_release_date}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_platforms|}}} | {{{tool_platforms}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_technologies|}}} | {{{tool_technologies}}} | N/A }}&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; align=&amp;quot;left&amp;quot; | {{#if: {{{tool_description|}}} | {{{tool_description}}} | N/A }}&lt;br /&gt;
|-&lt;br /&gt;
|}&amp;lt;/incldueonly&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
Tool information template.&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=246265</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=246265"/>
				<updated>2018-12-25T04:22:51Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://plugins.jenkins.io/dependency-track Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [22 Dec 2018] v3.4.0 Released&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=245906</id>
		<title>File:Integrations.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=245906"/>
				<updated>2018-12-10T00:48:37Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Steve Springett uploaded a new version of File:Integrations.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dependency-Track Ecosystem and Integrations&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=245193</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=245193"/>
				<updated>2018-11-16T15:03:20Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: Jenkins plugin URL change&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://plugins.jenkins.io/dependency-track Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=245122</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=245122"/>
				<updated>2018-11-14T03:01:13Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: 3.3.1 released&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [13 Nov 2018] v3.3.1 Released &lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244651</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244651"/>
				<updated>2018-10-25T19:05:38Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [25 Oct 2018] v3.3.0 Released &lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Dependency_Track_Project/Roadmap&amp;diff=244393</id>
		<title>Projects/OWASP Dependency Track Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Dependency_Track_Project/Roadmap&amp;diff=244393"/>
				<updated>2018-10-19T15:46:46Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dependency-Track utilizes GitHub milestones for roadmap and backlog tracking. Refer to https://github.com/DependencyTrack/dependency-track&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244392</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244392"/>
				<updated>2018-10-19T15:41:32Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects|Flagship Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:Flagship Projects]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244391</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244391"/>
				<updated>2018-10-19T15:23:06Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|250px|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature_projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages|Mature Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;middle&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;100%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244376</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244376"/>
				<updated>2018-10-19T07:21:53Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* OWASP Dependency-Track */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:400px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;400&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Mature_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages|Mature Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244375</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244375"/>
				<updated>2018-10-19T07:15:36Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless|700x700px]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:400px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;400&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Mature_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages|Mature Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244339</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244339"/>
				<updated>2018-10-18T02:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
[[File:Integrations.png|frameless|700x700px]]&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:400px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;400&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Midlevel_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects|Lab Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=244338</id>
		<title>File:Integrations.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Integrations.png&amp;diff=244338"/>
				<updated>2018-10-18T02:14:15Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dependency-Track Ecosystem and Integrations&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244337</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=244337"/>
				<updated>2018-10-18T02:08:53Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: banner change&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:400px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;400&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Midlevel_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects|Lab Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=243952</id>
		<title>OWASP Dependency Track Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Dependency_Track_Project&amp;diff=243952"/>
				<updated>2018-10-03T14:18:00Z</updated>
		
		<summary type="html">&lt;p&gt;Steve Springett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Dependency-Track==&lt;br /&gt;
&lt;br /&gt;
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components however, comes at a cost. Organizations that build on top of existing components assume risk for software they did not create. Vulnerabilities in third-party components are inherited by all applications that use those components. The [[OWASP Top Ten]] (2013 and 2017) both recognize the risk of [[Top 10 2013-A9-Using Components with Known Vulnerabilities|using components with known vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is a Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It integrates with multiple vulnerability databases including the [https://nvd.nist.gov/ National Vulnerability Database] (NVD), [https://www.npmjs.com/advisories NPM Public Advisories], [https://ossindex.sonatype.org/ Sonatype OSS Index], and [https://vulndb.cyberriskanalytics.com VulnDB] from [https://www.riskbasedsecurity.com Risk Based Security]. Dependency-Track monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk. Use of Dependency-Track can play a vital role in an overall [https://csrc.nist.gov/Projects/Supply-Chain-Risk-Management Cyber Supply Chain Risk Management] (C-SCRM) program by fulfilling many of the recommendations laid out by [https://www.safecode.org/wp-content/uploads/2017/05/SAFECode_TPC_Whitepaper.pdf SAFECode].&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is designed to be used in an automated DevOps environment where BoM (bill-of-material) formats are automatically ingested during CI/CD. Use of the [https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Track+Plugin Dependency-Track Jenkins Plugin] is highly recommended for this purpose and is well suited for use in Jenkins Pipeline. In such an environment, Dependency-Track enables your DevOps teams to accelerate while still keeping tabs on component usage and any inherited risk.&lt;br /&gt;
&lt;br /&gt;
Dependency-Track can also be used to monitor vulnerabilities in COTS (commercial off-the-shelf) software.&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
* Increases visibility into the use of vulnerable and outdated components&lt;br /&gt;
* Flexible data model supporting an unlimited number of projects and components&lt;br /&gt;
* Tracks vulnerabilities and inherited risk&lt;br /&gt;
** by component&lt;br /&gt;
** by project&lt;br /&gt;
** across entire portfolio&lt;br /&gt;
* Tracks usage of out-of-date components&lt;br /&gt;
* Includes a comprehensive auditing workflow for triaging results&lt;br /&gt;
* Configurable notifications supporting Slack, Microsoft Teams, Webhooks, and Email&lt;br /&gt;
* Supports standardized SPDX license ID’s and tracks license use by component&lt;br /&gt;
* Supports [http://cyclonedx.org CycloneDX] and [https://spdx.org/ SPDX] bill-of-material formats and Dependency-Check XML&lt;br /&gt;
* Easy to read metrics for components, projects, and portfolio&lt;br /&gt;
* Provides a reliable mirror of the NVD data feed&lt;br /&gt;
* API-first design facilitates easy integration with other systems&lt;br /&gt;
* API documentation available in Swagger 2.0 (OpenAPI 3 support coming soon)&lt;br /&gt;
* Supports internally managed users, Active Directory/LDAP, and API Keys&lt;br /&gt;
* Simple to install and configure. Get up and running in just a few minutes&lt;br /&gt;
&lt;br /&gt;
==Distributions==&lt;br /&gt;
Dependency-Track supports the following three deployment options:&lt;br /&gt;
&lt;br /&gt;
* Executable WAR&lt;br /&gt;
* Conventional WAR&lt;br /&gt;
* Docker container&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Dependency-Track is licensed under the [https://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:400px;&amp;quot; | &lt;br /&gt;
[[File:Dependency-Track-logo-300x100.png|link=File:Dependency-Track-logo-large.png]]&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Ready-to-deploy distributions are available from the Dependency-Track website&lt;br /&gt;
* [https://dependencytrack.org/ Website]&lt;br /&gt;
* [https://github.com/DependencyTrack Source Code]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [02 Oct 2018] v3.2.2 Released &lt;br /&gt;
* [21 Sep 2018] v3.2.1 Released &lt;br /&gt;
* [06 Sep 2018] v3.2.0 Released &lt;br /&gt;
* [19 Jun 2018] v3.1.0 Released &lt;br /&gt;
* [02 May 2018] v3.0.4 Released &lt;br /&gt;
* [13 Apr 2018] v3.0.3 Released &lt;br /&gt;
* [30 Mar 2018] v3.0.2 Released &lt;br /&gt;
* [27 Mar 2018] v3.0.1 Released &lt;br /&gt;
* [26 Mar 2018] v3.0.0 Released &lt;br /&gt;
* [08 Oct 2017] v3.0 [https://groups.google.com/forum/#!topic/dependency-track/0PUJI5rNgzI Updates to community]&lt;br /&gt;
* [16 Jun 2017] [https://www.youtube.com/watch?v=88YAlzuDH04&amp;amp;t=50s Presentation at OWASP Summit 2017]&lt;br /&gt;
* [10 Dec 2016] Work begins on v3.0&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/channel/UC8xdttysl3gNAQYvk1J9Efg OWASP Dependency-Track Channel (YouTube)]&lt;br /&gt;
&lt;br /&gt;
[https://www.appsecpodcast.org/2018/04/12/dependency-check-and-dependency-track-s03e13/ AppSec Podcast (S03E13)]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.dependencytrack.org Dependency-Track Documentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency-Check]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;400&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Midlevel_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects|Lab Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;300px&amp;quot;&amp;gt;&lt;br /&gt;
File:Dependency-Track_Screenshot-_Dashboard.png|Dashboard&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Projects.png|Projects&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerable_Component.png|Vulnerable Component&lt;br /&gt;
File:Dependency-Track_Screenshot_-_Vulnerability.png|Vulnerability&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
This project would not be possible without the existence of the [[OWASP_Dependency_Check]] project. Special thanks to Jeremy Long and the Dependency-Check core team for their hard work.&lt;br /&gt;
&lt;br /&gt;
==Dependency-Track Core Team==&lt;br /&gt;
* [[User:Steve_Springett|Steve Springett]]&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
&lt;br /&gt;
Dependency-Track is created by a worldwide group of volunteers who have dedicated their time, talent, or provided financial support to the project. &lt;br /&gt;
&lt;br /&gt;
The project would like to acknowledge and thank the following organizations that have helped move this project forward&lt;br /&gt;
&lt;br /&gt;
* [https://www.riskbasedsecurity.com/ Risk Based Security]&lt;br /&gt;
&lt;br /&gt;
OWASP Dependency-Track is an open source project, created by people who believe that the knowledge of using vulnerable components should be accessible to anyone with a desire to know. By supporting this project, you'll allow the team to outsource testing, infrastructure, further research and development efforts, and engage in outreach to various communities that would benefit from this technology.&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP Dependency-Track&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
Dependency-Track uses [https://github.com/DependencyTrack/dependency-track/milestones GitHub milestones] to track roadmaps and future releases.&lt;br /&gt;
&lt;br /&gt;
=Community=&lt;br /&gt;
Feedback from the community is always encouraged. Tell us what you like, what needs to be improved, and what features would be beneficial to your organization.&lt;br /&gt;
&lt;br /&gt;
Three ways to get involved:&lt;br /&gt;
* [https://github.com/DependencyTrack/dependency-track/issues GitHub Issues] - Collaborate on open issues &lt;br /&gt;
* [https://gitter.im/dependency-track/Lobby?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge Gitter] - Chatroom built around GitHub&lt;br /&gt;
* [https://owasp.slack.com/messages/proj-dependency-track Slack] - The Dependency-Track Slack channel&lt;br /&gt;
&lt;br /&gt;
Pull requests are highly encouraged. No contribution is too small. Do you know how to create test cases? Help us out. Want to write (or correct) some docs? Yes please... All contributions are appreciated.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Dependency_Track_Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Steve Springett</name></author>	</entry>

	</feed>