Balancing Openness and Security
While InnerSource flourishes in environments with a high degree of shared code, Security/Legal prefers the limitation of source code access to only those that need it. By making Security/Legal part of the team, introducing explicit sharing levels and security policies for shared repositories, as well as defining what qualifies as sensitive information, code sharing can be facilitated while minimizing the associated risks.
A successful InnerSource program needs openness and transparency (e.g. access to code, issues, documentation, and roadmap), while good security practice is to minimize access, following the principle of least privilege. How to balance and address these seemingly contradicting requirements?
Most organizations developing proprietary software will have source code that they do not want to leave the organization, as this may harm their business. Think what would happen when the major competitors would have access to their latest features and would know what they are working on next.
Even when the source code management system is not compromised from the outside, malicious employees or interns could leak code to the competition. Or think about gaining access to sensitive systems and services using credentials that are hard-coded in source code. Or injection of malicious code into a product’s codebase.
Restricting access typically reduces the risk of these things from happening, but at the same time hampers collaboration and re-use.
- The organization has an InnerSource Program Office (ISPO), or a similar group, steering the success of the InnerSource initiative in the organization. One of their goals is to stimulate maximum openness and transparency in the organization.
- The organization has a Security Team constraining unnecessary data access to prevent the organization from data-leakage and malicious code injection.
- The Security Team, ISPO, and Engineering teams are not regularly talking with each other.
- "Closed Source" is the default in the organization when creating new repositories, i.e. only the team owning/maintaining the code has access to the given repo.
- "Shared Source" within the organization isn’t common practice. Organizational teams aren’t familiar with what code or information should or shouldn’t be placed in shared repositories.
- A successful InnerSource program needs openness and transparency (e.g. access to code, issues, documentation, and roadmap)
- Good security practice is to minimize access, following the principle of least privilege.
- The Security Team is more familiar with security principles at conceptual level than security practices at operation level. Some of the security policy is good at concept but hard to execute at operation level.
- Engineering Teams focus more on service/product development or knowledge sharing than on measures for data protection. While it is easy for Engineering Teams to decide to close or open the repository, they are usually not willing to spend time on judging how to reach a balance between both. Or to refactor their code in order to be able to share more.
- No one-fit-all guideline or rules to judge what data or process is to be secured or not. That much depends on data sensitivity and overall security policy/infrastructure.
To reduce the misalignment and possible misunderstanding between the teams involved, it is key to bring everybody together so that they can express their goals and concerns, and develop shared language together.
After that they can decide as a group how to drive the execution of the specific goals, and what to do to reduce the risks that were identified.
Start by bringing (representatives from) Engineering, Security, Legal, and the ISPO together, to discuss the goals of the InnerSource initiative, as well as any security concerns.
Some helpful practices are:
- Form an InnerSource task force with representatives from Security, Legal, Engineering, and the ISPO to align on the goals of InnerSource adoption.
- Start with a limited scope to lower the potential security impact caused by the adoption.
- List the security concerns and figure out mitigation plans together within the task force.
- Clearly define the different sharing levels of repositories that you want to use in your organization (Note: A more elaborate model is described under Extension: An Additional Sharing Level):
- PUBLIC - open source: accessible for all software developers in the world
- SHARED - inner source: accessible for all software developers in the organization
- CLOSED - closed source: only accessible to named individuals in the organization
How to allow for a greater amount of SHARED code in the organizations depends a lot on the specific business domain, related regulations, and concerns identified in the initial meetings of the InnerSource task force as mentioned above.
Following are some practices that have proven to be helpful in reducing security concerns and allowing for a greater amount of SHARED code.
- Employee training about security awareness and individual responsibility
- Enhanced security measures or policies on source code management (SCM) system to prevent malicious access to shared repositories and reduce the impact of the same:
- Eliminate anonymous access to source code (all users must be logged in to your Source Code Management tool), log the access to repositories
- regular review by organization owners on created repositories and granted permission to organization members.
- Set up Single Sign-On against your organization’s identity provider. This will automatically revoke access in case somebody leaves the organization.
- regular rotation of access token
- 2FA authentication enforced
- encourage the use of signed commits
- Monitoring the source code management system for suspicious access, e.g.:
- access from new accounts or new devices
- downloading source code from new devices
- downloading a great amount of source code in the monitoring period.
Separate highly specific, differentiating code (the 'secret sauce') from code that is considered commodity in the organization (e.g. infrastructure, platform, and UI components). By placing them in separate repositories, you increase your chances of offering the commodity code as SHARED repos, while the 'secret sauce' may stay CLOSED.
Build up agreed security requirement of InnerSource, such as:
- No hard-coded usernames, passwords or other access/security tokens in a repository.
- No client information in a repository.
- Business critical algorithms may not be placed in SHARED repositories.
- Code from SHARED repositories will not be distributed directly to Production.
- Leverage secrets scanning tools to scan the target repositories (including code, test cases, and helper scripts) for confidential data such as accounts, passwords, access tokens, keys, and other sensitive data.
- Keep repositories CLOSED, but expose metadata about the projects (i.e. through an InnerSource Portal), and create some kind of access request workflow. This way you could still give people access to the code, but not open it to everyone by default. (Note: The full model is described under Extension: An Additional Sharing Level)
In some cases, introducing additional sharing levels might be appropriate. Use cases include:
- semi-sensitive code that can be shared with larger groups of people, but for example not with all interns and contractors.
- Or not with people with certain nationalities or working in a specific country, in order to comply with export control regulations.
- Or legacy repositories that are not (yet) ready to be made available as SHARED.
Without the additional sharing levels, (too) many repositories will end up as CLOSED in an existing organization, as all businesses will considering their code 'special', requiring extra protection and/or 'not ready' for opening up organization-wide yet (e.g. hard-coded secrets, but also technical debt, lacking documentation).
And given discoverability is also important, adding the additional level that facilitates discoverability, but still provides a light-weight access gate could be an appropriate way to prevent too many CLOSED repositories.
As a concrete example, which allows repositories to be discovered, even though there is no organization-wide access, consider the following sharing levels:
- PUBLIC - open source: findable and accessible for all software developers in the world
- INTERNAL - inner source: findable and accessible for all software developers in the organization
- RESTRICTED - restricted source: findable for all software developers in the organization, low-friction process to gain full access.
- CLOSED - closed source: only accessible to named individuals and not findable via the search engine for other software developers in the organization.
Repositories with RESTRICTED sharing level are included in the central catalog and/or fed into the central search mechanism, together with their README.md
and some meta information. Their full content however, is not accessible without following a light-weight access request process. This can for example be contacting one of the code owners or some other request mechanism described in the README.md
file.
Notes:
- RESTRICTED repos will likely get fewer contributions due to the additional step to access the code. Where possible, INTERNAL repos should be preferred.
- It is possible to use a tool that automatically adds the
README.md
and some other metadata to an internal repository in GitHub, allowing the GitHub search feature to include this data in the search results.
Example Repository Sharing Levels
┌──────┐
│PUBLIC│ ───► open source: accessible for all software developers in the world
└──────┘
┌──────┐
│SHARED│ ───► inner source: accessible for all software developers in the organization
└──────┘
┌──────┐
│CLOSED│ ───► closed source: only accessible to named individuals in the organization
└──────┘
InnerSource adoption in an organization will often start as an experiment, with a small number of SHARED repositories.
If the task force (and with that Security and Legal) collaborate in this early phase already, they can make joint experiences with how security-related issues can be identified and addressed. This also allows the Security Teams to build up more confidence on InnerSource from a security angle.
The defined sharing levels for repositories provide guidance on what sharing level to use for what type of repository content. The increased security awareness of the engineers and more secure setup of the source code management systems increases overall software development security.
With the increased confidence and lessons learned from this experiment, the task force faces less pushback when rolling out InnerSource to more repositories.
Most importantly, the changes implemented through this pattern lead to more code being shared between teams, and closed source will no longer be the obvious default.
- Philips
- Verizon
- Initial
- Bart Golsteijn
- Jack Yang
- Sebastian Spier
- Conley Rogers
- Secure Discoverability
- Secure Code Sharing
- Secure InnerSource
These notes are meant for internal use within the InnerSource Commons Patterns Working Group only.
To level up this pattern to a higher maturity level, please consider the following modifications:
- adding short descriptions of the way that the orgs in the Known Instances are using this pattern
- identify further Known Instances
- e.g. RBC - for reference see Making InnerSource & Developer Experience Real at one of Canada's Top 5 Banks - by Anthony Vacca
- creating a Sketch that supports the main focus of this pattern (the current ASCII Diagram with the "Example Repository Sharing Levels" is mostly a placeholder)
- The current Story section isn't really a story. Consider working this into the Problem section, and using a story that some of the Known Instances (orgs) can share.
- Possibly renaming the pattern, if the extended content of this pattern makes that a new title more suitable.