:
Skip Navigation

Software Composition Analysis

Understand how risks to projects from open source software can be managed through Software Composition Analysis.

What is software composition analysis?

Software composition analysis (SCA) is the ongoing, precise, and in-depth review of the open source components, dependencies, and license requirements embedded in a particular piece of software and/or across a software supply chain.

Open source components and risk

These days, software is rarely built from scratch. Development teams rely on third-party and open source components to ship code and innovate faster without reinventing the wheel. This reliance on open source software has drastically changed the amount of first-party code, or code written by your development team, in an application. According to the Sonatype State of the Software Supply Chain report, it's common for 90% of an application's code to be open-source software. These components are called dependencies, and each dependency introduces potential risks in the form of security vulnerabilities, license problems, or quality issues.

Many dependencies rely on other open source components, or transitive dependencies, making it harder to identify the original sources of risk. By using these third-party components in their applications, organizations are assuming responsibility for code that their teams did not write. The risk to a project from open source software can be managed and prevented through software composition analysis (SCA).

In short, SCA security is about looking at all the components in a project and determining the potential risk from those components. Software composition analysis is done using SCA security tools to find and identify risks in your applications. These SCA security tools can be automated and monitor components across the entire software development life cycle (SDLC).

How do SCA security tools work?

Software composition analysis tools take an application, identify the components in that application, and then identify any problems or risks with those components. Here's a high-level overview of how SCA tools achieve this.

Every SBOM provides general information for component identification.

This information includes:

  1. An application is sent to the SCA tool for analysis.

  2. The SCA tool identifies all the dependencies and third-party components in the application and produces a software bill of materials (SBOM). This is done in one of three ways.

    • Manifest scanning – The SCA tool generates a list of dependencies using the application's build manifest files, such as package-lock.json for JavaScript projects. This is best used when scanning applications without the final build artifacts or from a source control management (SCM) system

    • Binary scanning – The SCA tool examines the build artifacts and identifies the open source components using binary fingerprinting. This only identifies packages included in the final build of your application which reduces false positives and catches third-party software added to your application in a non-standard way. Not every software composition analysis tool is capable of binary scanning. Binary scanning is superior to manifest scanning as it assesses the actual artifacts released to production

    • A combined approach – Some SCA tools, like Sonatype Lifecycle, use a combination of binary scanning and manifest scanning to give more precise results.

  3. The SBOM is then checked against a variety of public and private databases for security vulnerabilities, license information, and other potential sources of risk. The data provided by SCA tools is not equal. Access to proprietary data and vulnerability research is a major value for most commercial SCA tools. This is because many vulnerabilities are not publicly disclosed or assigned a CVE score. Other component issues, such as quality issues or license information, might not be publicly tracked.

  4. The SCA security tool returns a list of vulnerabilities, license information, and other component metadata. This data is compared against the organization's governance policies to generate a list of policy violations prioritized by the threat score assigned to each policy. Ideally, the tool will also provide remediation information and an SBOM.

Benefits of SCA tools

Identifying every component and every risk from components is a daunting task. The State of the Software Supply Chain Report says that "development teams use an average of 135 software components." While it's theoretically possible for humans to monitor components for new vulnerabilities, license changes, and other potential issues, software composition analysis is a task much better handled by machines. SCA tools are fast, accurate, and provide benefits beyond risk identification.

Automated SCA tools allow teams to ship higher-quality code faster and take a proactive approach to risk management. By identifying risks across the software development life cycle (SDLC), software composition analysis tools can help your organization Shift Left or move security considerations earlier in the development process. Developers can use the information from a software composition analysis tool to select more secure components early in the development process, resulting in more secure code. This speeds up development time by preventing rework during security reviews. If a development team needs to use a component that has known risk elements, these flaws are known when the component is first introduced. The SCA security process lets organizations understand their application's risk and ensure they're using the component in a safe way.