OPEN SOURCE SUPPLY CHAIN SECURITY (AND WHY YOU SHOULD CARE)
3
OVERVIEW
4
AFFECTING OPEN SOURCE ECOSYSTEMS
5
UNAUTHORIZED CHANGES
6
COMPROMISED SOURCE REPO
7
BUILD FROM MODIFIED SOURCE
8
COMPROMISED BUILD PROCESS
9
USE COMPROMISED DEPENDENCY
10
UPLOAD MODIFIED PACKAGE
11
COMPROMISE PACKAGE REPO
12
USE COMPROMISED PACKAGE
13
WHAT QUESTIONS MIGHT WE WANT TO ANSWER?
14
TERMINOLOGY
15
SIGSTORE
16
SLSA EXPLAINED
17
SLSA 1.0
18
EVALUATING RISKS
19
TRANSITIVE DEPENDENCIES
20
WHAT'S THE LATEST AND GREATEST?
21
SUPPORT OPEN SOURCE
Description:
Explore the critical importance of open source supply chain security in this PyCon US talk. Delve into the nature of supply chain attacks, their impact on open source ecosystems, and common intrusion points. Learn essential concepts and terminology in supply chain security, discover open source projects and frameworks for protecting software integrity, and gain insights on evaluating the security practices of dependencies. Understand the mechanics of supply chain attacks, their detection challenges, and acquire actionable solutions to prepare for future threats. Examine unauthorized changes, compromised repositories, modified builds, and package vulnerabilities. Investigate risk evaluation methods, transitive dependencies, and the latest developments in the field. Conclude with a call to support open source initiatives for a more secure software ecosystem.
Why You Should Care About Open Source Supply Chain Security