Curation

In today's software development landscape, organizations rely heavily on open-source and third-party packages to accelerate development. However, this introduces risks such as security vulnerabilities, license compliance issues, and supply chain attacks. JFrog Curation addresses these concerns by providing an automated, policy-driven approach to controlling software package usage.

Where JFrog Curation Sits in the Security Timeline

JFrog Curation is the first line of defense in securing an organization’s software supply chain. It operates at the package acquisition stage, preventing risky dependencies from entering repositories before they are even used in development, testing, or production.

JFrog Curation ( Pre-Download OSS Governance)

  • When? As OSS packages are fetched for use.
  • Purpose? Automate the enforcement of security and compliance policies.

Business Needs for JFrog Curation

Organizations face increasing challenges in managing the security and compliance of their software supply chain. These include:

  • Preventing Supply Chain Attacks: Attackers increasingly target public package repositories to inject malicious software. JFrog Curation prevents the download of risky or compromised packages before they enter the development environment.
  • Managing Open-Source Risks: Open-source software (OSS) dependencies come with security vulnerabilities, license restrictions, and potential legal risks. Organizations need a systematic way to control which packages can be used.
  • Regulatory Compliance & Governance: Compliance frameworks (e.g., GDPR, HIPAA, SOC 2) require organizations to ensure that external dependencies meet security and licensing standards.
  • Reducing Security Overhead: Security teams often struggle with manual reviews of dependencies. Automated package curation reduces this burden and ensures continuous compliance.
  • Enhancing Development Efficiency: Developers lose productivity when they unknowingly introduce non-compliant or vulnerable packages and must later rework their code. Curation proactively prevents these issues.
  • Minimizing Development Disruptions: When a requested package version is blocked, Compliant Version Selection automatically returns the highest version that passes all policies — so developers can keep working without failed builds or manual intervention.
  • Consistent Governance Across All Sites: Organizations operating multiple JFrog Platform Deployments (Instances) need a way to enforce the same curation rules everywhere. Curation Federation synchronizes policies, conditions, and Catalog labels from a central controller instance to all connected sites, eliminating manual replication and ensuring uniform compliance.
  • Securing Uncataloged Packages: Not all remote repositories are covered by the Public Catalog. On-Demand Curation extends policy enforcement to packages from internal, private, or ecosystem-specific repositories, applying real-time vulnerability, license, immaturity, and malicious code evaluation before the package reaches the developer.

Key Issues JFrog Curation Resolves

IssueHow JFrog Curation Solves It
Malicious Package DownloadsBlocks known malicious or compromised packages before they reach developers.
Security VulnerabilitiesUses real-time metadata from the JFrog Catalog to prevent the use of packages with critical CVEs.
License Compliance RisksAutomatically blocks packages that violate corporate legal policies.
Unapproved Open-Source UsageAllows only pre-approved or vendor-certified packages using allowlist policies.
Aging and Abandoned PackagesPrevents the use of outdated, unmaintained, or deprecated dependencies.
Operational InstabilityEnsures that only stable and secure package versions are used in production.
Blocked Versions Breaking BuildsCompliant Version Selection automatically returns the highest policy-compliant version instead of blocking the request, keeping development flowing.
Inconsistent Multi-Site RulesCuration Federation propagates policies and conditions from a central controller Instance to all follower Instances, keeping all sites in sync.
Uncataloged Repository PackagesOn-Demand Curation extends policy enforcement to packages from repositories not in the Public Catalog, applying real-time security evaluation.