Fundamental Disconnect . We have developed tremendous tooling and automation that allows us to create secure, reliable software at a scale not previously considered
4
Threat Modeling Overview
5
Confidentiality Impact
6
Availability Impact
7
Supporting Infrastructure
8
The Perimeter is the Problem
9
Example CI/CD Pipeline Dataflow
10
Follow a Code Change
11
General/Overarching Concerns
12
Source Repository and Workflow Engine
13
Open Source Component Management
14
Open Source Backdoor Concerns
15
Build Management
16
Security Testing and Backdoors
17
Software Packaging and Distribution
18
Software Packaging - Monolithic applications vs. Microservice applications
19
Software Distribution
20
Using the Threat Model
21
Vendor Management
22
Potential Argument Discussion Points
23
Questions
Description:
Explore threat modeling techniques for CI/CD pipelines to enhance software supply chain security in this 28-minute OWASP conference talk. Delve into notable incidents, fundamental disconnects in modern software development, and the importance of threat modeling. Examine confidentiality and availability impacts, supporting infrastructure, and perimeter-related challenges. Analyze a sample CI/CD pipeline dataflow, following code changes through various stages. Address general concerns, source repository management, open source component risks, build management, security testing, and software packaging and distribution. Learn how to apply threat modeling insights to improve vendor management and engage in potential argument discussions. Gain valuable knowledge to strengthen your organization's software supply chain security posture.
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security