Five New Optimizely Certifications are Here! Validate your expertise and advance your career with our latest certification exams. Click here to find out more

Daniel Ovaska
Jun 27, 2024
  35
(0 votes)

Keeping the website secure by updating external packages

Did you see the latest warning from Optimizely to update this package with a critical security warning?

https://world.optimizely.com/documentation/Release-Notes/ReleaseNote/?releaseNoteId=CMS-33553

No? 

Security vulnerabilities in third party components like nuget packages or npm modules are one of the top 10 vulnerabilities for website according to OWASP

What makes it even more serious is that hackers can often scan the website for these vulnerabilities and often use them to compromise the website. 

Fortunately the tools to keep the website up to date already exist but often the process is lacking and must be agreed upon with stakeholders to secure funding for it. Stakeholders and product owners are often focused on new features and it's easy to fall behind on non-functional requirements like performance and security if these are not part of the development process. One way is to set a fixed value like 25% of development time to allocate to these areas and let developments team and tech lead suggest best bang-for-the-buck in these areas.

For an ordinary Optimizely website I recommend the more structured approach to securing third party packages and integrate it into your development process:

  1. Update all Optimizely code packages to latest minor version at least every 6 months.
  2. Use Visual Studio 2022 nuget package manager to locate any other vulnerable dotnet packages.
    There is even a nice little checkbox to show all vulnerable packages.
  3. Use npm audit to get a list of vulnerable frontend packages. 
  4. Update all moderate or higher at least

For a more security concerned websites I recommend the more ambitious process:

  1. Update all Optimizely code packages to latest minor version at the start of every sprint or every month.
  2. Use Visual Studio 2022 nuget package manager to locate any other vulnerable dotnet packages.
    There is even a nice little checkbox to show all vulnerable packages 
  3. Use npm audit to get a list of vulnerable frontend packages. 
  4. Update all vulnerable packages
  5. Use Azure Advanced Security or similar code scanner in build pipeline
    Set it up as a separate pipeline and run it manually before every deploy. 
    For really large solutions it might require build agents with more than normal disk space I've noticed.

For more security related tips for Optimizely see my security checklist

Happy coding and stay safe!

Jun 27, 2024

Comments

Please login to comment.
Latest blogs
Optimizely Configured Commerce and Spire CMS - Figuring out Handlers

I recently entered the world of Optimizely Configured Commerce and Spire CMS. Intriguing, interesting and challenging at the same time, especially...

Ritu Madan | Mar 12, 2025

Another console app for calling the Optimizely CMS REST API

Introducing a Spectre.Console.Cli app for exploring an Optimizely SaaS CMS instance and to source code control definitions.

Johan Kronberg | Mar 11, 2025 |

Extending UrlResolver to Generate Lowercase Links in Optimizely CMS 12

When working with Optimizely CMS 12, URL consistency is crucial for SEO and usability. By default, Optimizely does not enforce lowercase URLs, whic...

Santiago Morla | Mar 7, 2025 |

Optimizing Experiences with Optimizely: Custom Audience Criteria for Mobile Visitors

In today’s mobile-first world, delivering personalized experiences to visitors using mobile devices is crucial for maximizing engagement and...

Nenad Nicevski | Mar 5, 2025 |

Unable to view Optimizely Forms submissions when some values are too long

I discovered a form where the form submissions could not be viewed in the Optimizely UI, only downloaded. Learn how to fix the issue.

Tomas Hensrud Gulla | Mar 4, 2025 |

CMS 12 DXP Migrations - Time Zones

When it comes to migrating a project from CMS 11 and .NET Framework on the DXP to CMS 12 and .NET Core one thing you need to be aware of is the...

Scott Reed | Mar 4, 2025