Главная
Study mode:
on
1
Intro
2
The real cost of a vulnerable supply chain
3
SolarWinds attack
4
Secure supply chain frameworks
5
Software signing
6
Vulnerability databases
7
Vulnerabilities and PyPI
8
PyPI and malicious packages
9
SBOMS and VEX
10
Python container images
11
Scanning for vulnerabilities in source code
12
Python community initiatives
13
PEP 458 & PEP 480
14
PEP 708: Extending the Repository API to Mitigate Dependency Confusion Attacks
15
PEP 710: Recording the provenance of installed packages
16
SLSA Supply-chain Levels for Software Artifacts
17
Graph for Understanding Artifact Composition
Description:
Explore the critical topic of securing Python projects' supply chain in this DevConf.CZ 2023 conference talk. Delve into the rising threat of supply chain attacks targeting third-party Python software and learn about emerging standards for attesting to the integrity and provenance of software dependencies. Discover the latest tools and best practices for securing Python projects throughout their lifecycle, from development to building, packaging, and distribution. Gain insights into cryptographic signatures, Software Bills of Materials (SBOMs), and SLSA attestations. Examine real-world examples like the SolarWinds attack and understand the true cost of vulnerable supply chains. Investigate secure supply chain frameworks, software signing techniques, vulnerability databases, and the challenges surrounding PyPI and malicious packages. Learn about Python container images, vulnerability scanning in source code, and important Python community initiatives such as PEP 458, PEP 480, PEP 708, and PEP 710. Explore the concept of Supply-chain Levels for Software Artifacts (SLSA) and the Graph for Understanding Artifact Composition to enhance your understanding of secure Python project management. Read more

Securing Python Projects Supply Chain

DevConf
Add to list