All articles

Building the business case for a secure open source supply chain

Adeel Saeed, SVP, CTO, Global Cyber Resilience and Technology Strategy and Execution, Kyndryl

Open source is the engine of innovation. It powers modern cloud platforms, SaaS products, and security tools. It accelerates engineering velocity and shortens time-to-market. It also introduces hidden operational costs.

At Chainguard Assemble 2026, I shared how organizations are reframing vulnerability management and building a clear business case for a secure open source supply chain. This post reflects that session. You can watch the full recording embedded below.

The executive conversation

Open source already powers the enterprise. That part is settled. What is less understood is how to manage it in a way that aligns with business outcomes.

Security teams often frame open source risk in terms of CVEs, scanner output, and patch cycles. Boards and executive leaders ask different questions.

  • How much risk are we carrying?

  • What is it costing us?

  • Is this slowing growth?

  • What changes if we manage this differently?

These are not technical questions. They are business questions. If you want executive support for a trusted open source strategy, you have to answer them in financial and operational terms.

One of the biggest challenges is that the value of improving open source security is often framed in negative terms. It focuses on avoiding incidents or reducing vulnerabilities. Those outcomes matter, but they are hard to tie directly to revenue, growth, or customer experience.

To move forward, the conversation has to shift. Trusted open source should be positioned as a driver of productivity, resilience, and delivery speed.

At Kyndryl, that required us to rethink vulnerability management in a cloud native world.

Why traditional vulnerability management breaks down

The historic vulnerability management cycle is straightforward: discover, assess, remediate, validate, report. That model struggles in modern environments.

Enterprises today depend heavily on open source components, often making up the majority of the application stack. At the same time, engineering practices have evolved toward continuous delivery, distributed systems, and rapidly changing dependencies.

We operate across global cloud infrastructure in compliance with several regulatory requirements. Our engineering teams deploy continuously. Container images are rebuilt frequently. Dependencies shift with every change. This creates a scale problem.

A single missed vulnerability in a shared base image can propagate across environments. Static testing provides only a snapshot in time. Manual CVE triage becomes repetitive, expensive, and difficult to sustain.

The means of remediation have changed. The scale has changed. The cost has changed.

Adding more gates or slowing down delivery does not solve the problem. It creates friction between teams and undermines both velocity and security.

From patching to rebuilding

One of the most important mindset shifts we adopted was simple: do not patch in place. Rebuild.

In containerized environments, pipelines act as the system of record. Scheduled rebuilds into lower environments ensure that changes are codified and repeatable. Policy enforcement in Kubernetes, workload identities instead of static secrets, and tighter control over source images reduce drift.

This approach improves consistency and reduces operational overhead. It also aligns security practices with how modern systems are actually built and deployed.

As teams adopt this model, another question emerges.

What happens when the upstream open source packages themselves are compromised?

Trusted open source as a control point

Supply chain attacks have shifted the threat landscape. Attackers increasingly target upstream repositories and build systems. When malicious code enters a widely used dependency, it spreads quickly through downstream applications.

Consuming open source directly from public registries without additional controls introduces risk that is difficult to measure and even harder to manage at scale. Trusted open source changes that equation.

By relying on curated, continuously maintained components, organizations reduce uncertainty. Security teams spend less time chasing vulnerabilities. Developers spend less time evaluating dependencies. Platform teams gain a consistent foundation to build on.

This is where the business case begins to take shape. Having a secure open source supply chain reduces developers' cognitive load, improves operational stability, and makes delivery more predictable. Those outcomes translate into measurable impact across engineering, security, and the business.

The next step is making that impact visible in terms that executives understand.

Aligning security with growth

Secure open source supply chain programs support broader strategic initiatives: reducing attack surface, simplifying continuous compliance, accelerating DevOps adoption, and enabling secure by default development practices.

When positioned correctly, these initiatives are not cost centers. They are growth enablers.

The narrative that wins executive support is grounded in data:

  1. Quantify the cost of current CVE remediation workflows.

  2. Model risk reduction from improved build integrity.

  3. Tie reclaimed engineering capacity to revenue-generating initiatives.

Open source remains foundational to innovation. Treating it as a trusted, controlled input to the build process transforms it from a hidden operational burden into a strategic lever.

Security leaders who translate technical risk into financial impact change the conversation. That is how you build executive support for trusted open source.


Catch all the sessions from Assemble on-demand here.

Share this article

Related articles

Want to learn more about Chainguard?

Contact us