Transforming Application Security: Introducing Software Lineage

In application development, keeping track of where software is deployed, which versions are running, and ensuring they're secure pose formidable challenges. A vast majority of teams still depend on manual processes, using spreadsheets and documentation to catalog their Apps and APIs. One recent report outlines that 74% of companies are still using traditional documentation and 68% relying on spreadsheets to catalog their apps and APIs. As deployment velocity increases, driven by AI-assisted coding and a push for greater developer autonomy, the complexity of accurately managing these deployments intensifies.
July 23, 2024

In application development, keeping track of where software is deployed, which versions are running, and ensuring they're secure pose formidable challenges. A vast majority of teams still depend on manual processes, using spreadsheets and documentation to catalog their Apps and APIs. One recent report outlines that 74% of companies are still using traditional documentation and 68% relying on spreadsheets to catalog their apps and APIs. As deployment velocity increases, driven by AI-assisted coding and a push for greater developer autonomy, the complexity of accurately managing these deployments intensifies.

When Heeler embarked on this journey, one initial goal was clear yet daunting—automate the tracking of software deployments to a precision never before considered possible. Skeptics doubted, claiming "That just isn’t possible." Nonetheless, our resolve was firm, propelled by the urgent need to answer critical questions in vulnerability response processes:

  • Which services (or code bases) are affected?
  • Where is this code deployed, containerized or otherwise?
  • What changes are required, and who will implement them?
  • When and how were these changes deployed?

Heeler's answer to these challenges is our pioneering solution: Software Lineage.

The Revolutionary Approach of Software Lineage

Heeler’s innovative software lineage technology automates the tracking of software deployments and manages the lifecycle of security issues in real-time—without the need for updating builds, tracking external sources, or deploying agents to machines running the software.

Leveraging our team’s profound expertise across programming languages, we developed a unique algorithm to correlate deployed software artifacts back to codebases.

As Heeler finds changes to the source code it develops a unique fingerprint for that changeset by analyzing the source code for language features, which we are calling structural features. Structural features include: what functions or methods are defined, what are the arguments of those functions or methods, what are the return types, what variables are defined, what dependencies are used, and finally where do all of these structural components exist in the code base. These structural features build the unique fingerprint of the codebase at a specific changeset.

Heeler then inspects the binaries, containers, and software packages to complete a similar fingerprinting process, in a reverse engineering operation, to extract the same features.

Starting with the deployed service and correlating back to the code and changeset that built it is done by prioritizing and scoring the matches, removing certain mismatches, and completing a second level of correlation using other features that are native to its deployment or packaging. The output of this is a confidence score that can be used to find the correct source of the software artifact.

The amazing part of this: It doesn’t matter what libraries, components, or features of the language that you use within your software nor how it is deployed: our Software Lineage capabilities can correlate deployments to code across VMs, containers, and even Serverless functions.

Our advanced correlation matching algorithm compares the deployed or running software with its originating codebase, enabling Heeler to:

  • Associate deployed software artifacts back to the repository and precisely identifies the changeset from which the code was developed.
  • Detect "shadow builds" – Software artifacts that were not built from any recorded change in the source, highlighting potential security risks.

Streamlining Security Management Across Deployments

By utilizing the correlation process to determine the exact changeset, Heeler not only pinpoints the deployed software but also blends all security signals detected in the runtime environment with those from the codebase. This holistic security view is crucial, as infrastructure and software are inherently linked in application security.

This capability provides Heeler with:

  • Complete lifecycle management of security issues, starting with the contributors through commits and builds, how it travels through each and every environment all the way to production.
  • The ability to prioritize security concerns effectively by blending code, deployment, business, and application contexts.

In addition, Heeler’s software lineage system is designed to operate in real-time, updating application lineage as new updates are rolled out across your cloud footprint. We detect changes made in the source code, fingerprint each changeset, and continuously update our scalable fingerprint database to support even the largest organizations. Heeler detects changes in cloud environments through different infrastructure events and completes the fingerprinting process every time that a change is detected.

Now instead of Infrastructure graphs, you can visualize Application and Service graphs which include the code of the service, databases, network access control lists, identity, service-to-service communication, and more:

Beyond Security: Ensuring Compliance and Best Practices

With Heeler, organizations gain real-time visibility into their security posture, with the ability to answer pressing questions about their deployments:

  • Where is this service deployed, and how extensive is its presence across my cloud footprint?
  • What percentage of these services are running in our production (or high-security) environments?
  • Have all identified security issues been fully remediated?
  • Are any deployments experiencing issues or non-compliance with best practices?

Heeler’s technology doesn’t just inform you where issues occur; it also tracks how far along they are in their remediation process—from detection to fix and deployment. This not only streamlines the process of resolving security issues but also ensures adherence to best practices and organizational standards across all deployments.

Join the Heeler Revolution in Application Security

At Heeler, we're not merely solving today's problems; we're redefining what's possible in application security. Stay connected with us through LinkedIn and follow our journey as we continue to innovate and lead in securing applications across diverse environments. Heeler is here to transform application security, ensuring your applications are secure, resilient, and ready for the future.

What’s new on Heeler
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trever McKee
Chief Technology Officer

Related resources

See All Resources