<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TT8R4P" height="0" width="0" style="display:none;visibility:hidden">

Sonatype Blog

Stay updated on the latest news from the makers of Nexus

Setting up a Secure, Private Nexus Repository

What an exciting first post, I’m sure. But it’s what I’m working on, I suppose.

A few things, first:

  • We’re using an LDAP server to identify team members.
  • LDAP and Nexus are on different domains (though, possibly, the same machine).
  • I’m not a system admin, so this is likely going to be painful.

Struts2 Exploited Again.  Did Anyone Bother to Tell You?

This week we saw the announcement of yet another Struts 2 Remote Code Exploit (RCE) vulnerability. What's notable about this instance is that POC code seems to have been released into the wild either just before, or immediately after the disclosure.  As was the case with previous Struts1 vulnerabilities, exploits are being observed at large scale in the wild.

Whenever critical vulnerabilities emerge -- attackers have first mover advantage. Therefore, the only thing that matters is speed.

  • How long before you even become aware?  
  • How long does it take you to assess your exposure?
  • How quickly can you remediate the vulnerability?

In today's world, different companies utilize different tools and processes to manage open source governance and security risk within the software development lifecycle.  Forward leaning organizations empowered with DevOps-native intelligence will respond in hours or days.  Traditional organizations equipped with waterfall-native intelligence will struggle to respond in weeks or months.

It's now been 3 days since the Struts2 fix and disclosure.  Here's the official description available from the Mitre database as of Friday, March 10th:

Set up your own Continuous Delivery Stack

Last week I wanted to try new things with ‘pipeline as code’ with Jenkins. The best way to try new things is running it as Docker containers. This way I can keep my MacBook clean and don’t mess up existing stuff I am working on (also see this article about what Docker can offer for a developer). Another big advantage by using Docker is that there is already a complete stack of Dockers available to set up the necessary tools. However, for some unclear reason this stack didn’t work on my MacBook (see this issue) so I took this opportunity to build my own stack with some Dockers of my own choice :-).
The tools in my stack are:

When it Comes to Application Security, “Doing Your Homework”​ Matters

They say software is eating the world, very true, but it has become even more clear that OSS components are eating the software world. This amazing revolution is driving unimagined gains in innovation and efficiency in our ability to deliver software. Think Uber, here is a new leader in the transportation industry without owning a single vehicle. Every major Enterprise and even most medium and small companies are software producers – and free and open software components are driving this dramatic shift in our world.

Improving Build Time of Java Builds on OpenShift

Improving Build Time of Java Builds on OpenShift

Since we released OpenShift 3 back in July 2015, one of the most common questions I get from developers is how to get better build time for Java based builds. In this post, I will guide you through the process of speeding up Java Maven based builds, and will explain other options that can be taken to the ones that I’ll be showing.

DevSecOps is Suddenly Strategic for Everyone in Software:  Here's Why

Software innovation is the core of every company's digital transformation; the strategic weapon by which modern organizations compete and win on a global playing field.  This is why executives and shareholders at every company, in every industry, are placing intense pressure upon IT teams to accelerate innovation.  

This insatiable demand for innovation has created a perfect storm which is wreaking havoc on many IT organizations around the world.   To counter the effects of this storm, forward leaning organizations have embraced DevOps as the preferred methodology for manufacturing quality software at scale and continuously delivering innovation.

Organizations everywhere are now transforming their development from waterfall-native to DevOps-native tools and processes.  Along the way, they are coming to grips with one simple fact:  DevOps is not an excuse to do application security poorly; rather it is an opportunity to do application security better than ever.

This realization is the reason why DevSecOps in suddenly strategic for anyone and everyone in software.

AppSec EU 2017 Belfast – What to Expect

In mid-May I’ll be joining the organizing team of AppSec EU 2017 in Belfast for a week of security and DevOps sessions. Listen in as Gary Robinson, Michelle Simpson and Owen Pendlebury talk about what’s planned for the week.