securing-the-supply-chain-a-practical-guide-to-slsa-compliance-from-build-to-runtime-dun-chi-daepai-chan-zha-slsamao-zhi-enguerrand-allamel-ledger-1.pdf

编号:627322 PDF 30页 1.04MB 下载积分:VIP专享
下载报告请您先登录!

securing-the-supply-chain-a-practical-guide-to-slsa-compliance-from-build-to-runtime-dun-chi-daepai-chan-zha-slsamao-zhi-enguerrand-allamel-ledger-1.pdf

1、Securing the Supply ChainA Practical Guide to SLSA Compliance from Build to RuntimeAugust 21 2024 Enguerrand Allamel,LedgerAbout MeEnguerrand Allamel-Academic Experience:Studied for one year at Tsinghua University-Current Role:Senior Cloud Security Engineer at Ledger-Company Overview:Ledger speciali

2、zes in secure hardware wallets and cutting-edge security productsAgenda1.Why is Supply Chain Security Important?2.What is SLSA Supply-chain Levels for Software Artifacts)?3.Possible Milestones for Supply Chain Security Defense4.Example Implementations4.1.On the Build Side4.2.On the Runtime Side5.Goi

3、ng Further with HSM Hardware Security Module)Example of a Supply Chain AttackGit RepositoriesBuild PlatformCorruptRegistryKubernetes+attacker applicationBuildPublishPull Malicious imageAttacker applicationMalicious PublishAn attacker gain access to the registryRegistryKubernetesPull imageWhy is Supp

4、ly Chain Security Important?Gartner predicts that by 2025,45%of organizations will have experienced a software supply chain attack*Type attackKnown exampleSubmit unauthorized change to source git repositorySushiSwap:Contractor with repository access pushed a malicious commit redirecting cryptocurren

5、cy to itselfMore than$3 millions of users funds impactedCompromise build processSolarWinds:Attacker compromised the build platform and installed an implant that injected malicious behavior during each buildMassive data breachAround 18 000 organisations impactedSolarWinds stock price drop by 40%Sourc

6、e:Gartner reportWhat is SLSA?-SLSA Security Levels for Software Artifacts-Backing:Sponsored by the OpenSSF Open Source Security Foundation),associated with the Linux Foundation-Collaborative Framework:Developed through cross-industry collaboration-Purpose:Establishes standards and guidelines for sec

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(securing-the-supply-chain-a-practical-guide-to-slsa-compliance-from-build-to-runtime-dun-chi-daepai-chan-zha-slsamao-zhi-enguerrand-allamel-ledger-1.pdf)为本站 (山海) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠