Главная
Study mode:
on
1
Intro
2
Infrastructure as Code
3
Software Supply Chain
4
Software Security
5
(some) laC Efficiency
6
Find a HELM chart
7
Levels of Typosquatting
8
Supply Chain Security & laC
9
Container Supply Chain
10
debian:buster-slim
11
You're wrong, because...
12
The importance of metadata
13
Verifiable metadata
14
Distroless containers
15
Reproducible Builds
16
Reproducibility
17
Signatures (e.g. cosign)
18
These would also be signed..
19
What is the solution?
20
Securing Container Creation
21
Already adopted by GitLab
22
key takeaways
Description:
Explore the intersection of software supply chain security and Infrastructure as Code (IaC) in this informative conference talk. Delve into the risks associated with reusing IaC snippets and templates, such as HELM charts, and learn how these practices can make infrastructure vulnerable to similar issues found in software packages and dependencies. Discover the open-source project KICS (Keep Infrastructure as Code Secure) and its role in addressing these challenges. Examine the potential future risks in the IaC world and their impact on lower levels of the software stack. Gain insights into leveraging IaC scanning to mitigate software supply chain problems in infrastructure. Explore topics including container supply chain security, the importance of metadata, distroless containers, reproducible builds, and signature verification. Learn about securing container creation and key takeaways for maintaining a robust and secure IaC environment.

Software Supply Chain Aspects in Infrastructure as Code

Linux Foundation
Add to list