Keeping Dependencies Up to Date: How Beta Systems Secures the Software Supply Chain

Blog Article·5 min
Robert Gützkow
Product Security Engineer
Sebastian Mende
Software Engineer Platform Services

Key Takeaways

  • Open source is both an opportunity and a risk. Every dependency adds functionality but also expands the attack surface.

  • The complexity of modern software demands full visibility. Hundreds of direct and transitive dependencies make structured management essential.

  • Automation combined with expert review is critical. Tools alone are not enough, final decisions remain a human responsibility.

  • An integrated toolchain ensures control and compliance. Standardized CI/CD pipelines, automated scans, SBOMs, and continuous monitoring work together.

  • A strong security culture makes the difference. Security is embedded across the entire SDLC and every release.

Find out more

Open-source dependencies are the backbone of modern software development. They speed up innovation, reduce development effort, and make it possible to build complex systems in short timeframes. But this efficiency comes with a trade-off: every external library becomes part of your own product’s security posture. In this article, we explain how Beta Systems secures the software supply chain through effective dependency management and automation.

A Growing Attack Surface

The risk landscape is evolving at high speed. In the first three months of 2025 alone, the MITRE Foundation registered more than 12,000 new Common Vulnerabilities and Exposures (CVEs), averaging around 130 new entries per day. Each could, in principle, affect third-party code within a product. High-profile incidents such as Log4Shell (CVE-2021-44228) and the compromise of npm packages by the Shai-Hulud worm show how quickly a single weakness can cascade through millions of systems.

Without a clear and structured approach to dependency management, organizations lose visibility and control. To understand why this challenge is so demanding, it helps to look at the structure of today’s software supply chains.

The Complexity of the Modern Software Supply Chain

Most software products rely on hundreds of direct and transitive dependencies, quickly forming a complex supply chain graph with thousands of packages. Each can become an entry point for vulnerabilities, sometimes indirectly.

Just as physical manufacturing requires every component to be tested and safe, software supply chain security depends on visibility and control across all dependencies. Without this, organizations face:

  • Zero-day and n-day exploits (patches reversed by attackers)

  • Compliance violations (e.g. against the NIS-2 Regulation, DORA, or the Cyber Resilience Act)

  • Reputational damage and financial loss from breaches

Beta Systems’ Strategy: Automation and Expertise

Beta Systems simplifies both dependency and vulnerability management by automating repetitive tasks while letting experts make critical decisions. This balanced approach has proven more reliable than extreme. Manual checks alone can’t keep pace with constant change, but relying solely on automation isn’t safe either. Supply chain attacks have shown how quickly a malicious update can slip through if no one is watching.

Rather than following a fixed recipe, our framework continues to evolve. Its foundation rests on three pillars:

  • Automation to flag outdated dependencies and known vulnerabilities

  • Standardized CI/CD pipelines built from reusable GitLab Components

  • Expert review and a strong security culture ensuring final decisions stay human-driven

Core Building Blocks of Secure Dependency Management

1. CI/CD Pipelines and Components with GitLab

  • Reusable pipeline components help teams to follow consistent DevSecOps practices

  • Central maintenance by the Platform Services team cuts duplicate effort

  • Standardized jobs for dependency updates and security scans

  • Unified tooling increases developer productivity

2. Automated Dependency with Renovate

  • Detects version drift across npm, Maven, Gradle, Docker, and IaC

  • Automatically creates merge requests for upgrades

  • Supports patch, minor, and major version strategies

  • No auto-merge – each update is reviewed by a developer to reduce supply chain risks

3. Vulnerability & Security Scans with Trivy

  • Scans for CVEs during development and build phases using multiple vulnerability databases

  • Detects misconfigurations in Infrastructure-as-Code (IaC) and hardcoded secrets in repositories

  • Relies on lock files for integrity and version pinning

4. SBOMs & OWASP with Dependency Track

  • Software Bill of Materials (SBOMs) as input from cdxgen and DejaCode in CycloneDX format

  • Systematic monitoring of dependencies in released software through OWASP Dependency Track

  • Automatically creates tickets for identified CVEs

  • Uses Vulnerability Exploitability eXchange (VEX) and Vulnerability Disclosure Report (VDR) for standardized reporting of vulnerability management results

  • Provides documentation for compliance with the Cyber Resilience Act and transparency for NIS-2 and DORA

Beyond Tools: Building a Security Culture

Technology alone cannot secure the software supply chain. The real strength comes from people and the processes:

  • A Secure Software Development Lifecycle (SDLC) framework that guides teams from start to finish

  • Developer training based on real-world incidents, not just theory

  • Daily cooperation between developers and AppSec experts, making security an integral part of development and not an afterthought

  • Clear and transparent vulnerability reporting with every release, ensuring risks remain visible and decisions are traceable

  • Security culture at Beta Systems is not abstract. It actively shapes how dependency decisions are made, documented, and aligned with compliance expectations.

Case Study: Supply Chain Attack Prevention

The compromise of the npm packages chalk and debug, along with the Shai-Hulud worm outbreak in September and November 2025 highlighted a key lesson: blind automation is risky. In that case, attackers inserted malicious code into libraries that were downloaded billions of times. Had those updates been auto-merged, infected versions would have reached production almost immediately.

At Beta Systems we’ve chosen a different path. Renovate still prepares the updates, but they only proceed after engineer review. This deliberate pause maintains the right balance between speed, automation, and risk control.

Benefits of Beta Systems’ Approach

By combining CI/CD automation, security tooling, and expert oversight, Beta Systems achieves:

  • Faster vulnerability fixes without compromising stability

  • A reduced attack surface through proactive dependency monitoring

  • Compliance with the Cyber Resilience Act, and support for customers under NIS-2 and DORA

  • Less time spent on CI maintenance thanks to shared GitLab Components

  • Greater transparency for customers through SBOM-based reporting

Conclusion

  • Keeping software dependencies up to date is not optional. It is essential to secure the software supply chain. With thousands of new CVEs published monthly, organizations need an approach that is automated, scalable, and compliant but still keeps experts in control.

  • At Beta Systems, we deliver exactly that: Automated detection and scanning with Trivy and Renovate, continuous monitoring using SBOMs and OWASP Dependency Track, standardized pipelines with GitLab Components, and a strong security culture across the SDLC.

  • The result: secure, compliant, and resilient software our customers can trust.

Authors

Robert Gützkow
Product Security Engineer

Robert Gützkow is DevSecOps Specialist and Product Security Engineer at Beta Systems. Since September 2022, he has been continuously promoting the improvement of the internal development infrastructure, the implementation of security tools in CI/CD pipelines and the modernization of the Software Development Lifecycle (SDLC). By advising development on design and security issues, evaluating CVEs, leading security training, creating the cryptographic security policy and conducting penetration tests, he contributes significantly to the quality of Beta Systems’ products.

Sebastian Mende
Software Engineer Platform Services

Since 2022, Sebastian Mende has been a pillar of the technological advancement and new development of central core components as a Senior Software Engineer at Beta Systems. With a keen eye for architecture, sustainability, and quality, he plays a key role in developing the foundations of a modern CI/CD landscape and establishing best practices for frameworks, code structures, and software quality that set standards across teams.

In addition to his conceptual and operational work, he is responsible for the technical leadership of the new license management tooling, driving its architecture, integration, and further development. Furthermore, he is actively committed to knowledge transfer: he supports colleagues with complex technical questions, offers knowledge transfer and enablement sessions regarding CI/CD pipelines, and ensures that modern development standards are not only defined but also put into practice.

Through his combination of deep technical understanding, strategic thinking, and pragmatic implementation, Sebastian Mende makes a decisive contribution to the innovative strength and technological excellence of Beta Systems.

Further Resources

Blog Article
it-and-dora.jpg

Strategic Transformation: IT Security and Compliance Aligned with DORA

Instead of relying on standard software solutions, many companies choose to develop their own applications – as these are optimally tailored to their specific business requirements and often offer long-term cost advantages. This customer example highlights why in-house developments can also lead to problems – particularly in terms of compliance – and how the new EU regulation DORA (Digital Operational Resilience Act) relates to this.
Blog Article
it-security-and-logistic.jpg

IT Security in Logistics: Why IAM Is Important for Logistics Companies

In a world where global supply chains form the backbone of our economy, the logistics industry is facing enormous opportunities, but also challenges. Efficient and timely delivery of goods is now more important than ever, but increasing digitalization also comes with greater risks and requirements. While digital innovations boost efficiency, they also make the industry more vulnerable to cyber threats and associated data loss. In this context, Identity and Access Management (IAM) is becoming an indispensable tool to protect logistics companies and maximize their efficiency. This article explains why IAM is so essential for the logistics industry and how it can help overcome the many challenges it faces.
Blog Article
Schwarzes Buch mit der Aufschrift EU Regulation neben Europa-Flagge

NIS-2 Regulation: How Midsize Companies Can Efficiently Meet the Requirements

The EU’s NIS-2 Directive poses one of the most significant challenges in recent years for midsize companies in Europe. NIS-2 demands not only extensive technical and organizational measures but also a cultural shift in how companies approach cybersecurity. For organizations handling sensitive design data, customer information, or production data, compliance with NIS-2 requirements is not optional – it’s mandatory and non-compliance may result in heavy fines and personal liability for management. But how can companies implement these complex requirements in a pragmatic and cost-efficient way?