際際滷

際際滷Share a Scribd company logo
Safeguarding artifact integrity in your
software supply chain
Giovanni Galloro - EMEA CE Specialist - Application Modernization - Google Cloud
@ggalloro
The need to secure the software supply chain
What is a
Software supply chain?
Source Build Package Run
Dependencies
Code Deploy
Safeguarding artifact integrity in your Software Supply Chain
Source Build Package Run
Dependency
(includes build toolchains)
Inject bad
code (A)
Compromise
source control
(B)
Build from
modified
source (C)
Compromise
build system
(D)
Compromised/
vulnerable
dependency (E)
Bypass CI/CD,
inject bad
artifact (F)
Compromise
package repo/signing
(G)
Use compromised
package
(H)
Attack Vectors
DevOps
SecOps
Dev
Deploy
Compromise Deploy
Process
(X)
Deploy
compromised
image
(Y)
Vulnerability
discovered
post-deployment
(Z)
A-H : SLSA standard
A-H + X-Z: Software Delivery Shield
What is Google doing in the community
Making the chain stronger: Google open source efforts
 Open Source Security Foundation  We co-founded Open Source Security Foundation in 2019, a
cross-industry forum on supply chain security.
 Supply-chain Levels for Software Artifacts (SLSA)  SLSA is an end-to-end framework for supply chain
integrity. It is an open-source equivalent of many of the processes we have been implementing
internally at Google. SLSA provides an auditable provenance of what was built and how.
 OpenSSF Scorecards  Scorecards use evaluation metrics like well-defined security policy, code review
process, and continuous test coverage with fuzzing and static code analysis tools to provide a risk
score for open-source projects.
 Open Source Insights - provides a transitive dependency graph so you can see your dependencies and
their dependencies, all down the dependency tree
 Grafeas & Kritis - Open metadata standard for software artifacts and admission controller to enforce
security policies at deployment.
SLSA Levels
Automation & Provenance
Build must be fully scripted/automated
and generate provenance
Version Control & Signed
Provenance
Requires using version control and hosted
build service that generates
authenticated provenance
Non-falsifiable, Ephemeral
Builds are fully trustworthy, with identity
attestations of underlying build
infrastructure/hardware. Ephemeral
builds leave nothing behind.
Hermetic Builds, Review
All build inputs/dependencies are specified
upfront with no internet egress during the
build. Two-party reviews.
Measure integrity levels for build, source and dependencies
See: slsa.dev
Safeguarding artifact integrity on GCP
Operate
Cloud Logging &
Monitoring
Package
Artifact Registry
Scanning
Artifact Analysis
Source
Cloud Source
Repositories
Build
Cloud Build
IDE
Cloud Code
Deploy
Cloud Deploy
Runtime
Kubernetes Engine
Firebase
Cloud Functions
Cloud Run
Anthos
Sw Supply Chain on GCP
Inner Dev
Loop
Build
Development
Cluster
Cloud Code
Cloud Code
Cloud Build -> Artifact Registry
/workspace
Build
step
Build
step
Build
step
Build
step
Source code
Artifact Registry
 Containers
 Non-container
(maven, Go,
Gradle, Bazel)
Source Image
Manifest
Render
Deploy
Environments
Progressions
Build (CI) Delivery (CD)
Measurement
Cloud Deploy
Google Cloud Deploy
Google Cloud Build
Binary
authorization
Cloud Build
Triggered & Automatic Scan
Container Analysis
Image metadata
Artifact Registry Kubernetes
Engine
Cloud Code
Google Cloud
Deploy
Software Delivery Shield
Cloud Run
Continuous scanning with
Container Analysis
Admission control
Cloud
Workstations
Assured OSS
Source
Control
API API
Questions ?
Ad

Recommended

Safeguarding Container Supply Chain - Anshul Patel
Safeguarding Container Supply Chain - Anshul Patel
Anshul Patel
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
Jim Bugwadia
Tracy Miranda_DevOps Loop, May 2022.pdf
Tracy Miranda_DevOps Loop, May 2022.pdf
VMware Tanzu
Room 3 - 2 - Tr畉n Tu畉n Anh - Defending Software Supply Chain Security in Bank...
Room 3 - 2 - Tr畉n Tu畉n Anh - Defending Software Supply Chain Security in Bank...
Vietnam Open Infrastructure User Group
Oh The Places You'll Sign.pdf
Oh The Places You'll Sign.pdf
LibbySchulze
apidays Australia 2023 - Building Trust Brick by Brick, Dasith Wijesiriwarden...
apidays Australia 2023 - Building Trust Brick by Brick, Dasith Wijesiriwarden...
apidays
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
sparkfabrik
OpenSSF.Repository.WG.Presentation.OpenSSF.Repository.WG.Presentation
OpenSSF.Repository.WG.Presentation.OpenSSF.Repository.WG.Presentation
kedofef453
All You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source Software
Javier Perez
(Micro)chips and SLSA: Securing the Software Supply Chain
(Micro)chips and SLSA: Securing the Software Supply Chain
Richard Boyd, II
Software Supply Chains for DevOps @ InfoQ Live 2021
Software Supply Chains for DevOps @ InfoQ Live 2021
Aysylu Greenberg
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
Deep dive nella supply chain della nostra infrastruttura cloud
Deep dive nella supply chain della nostra infrastruttura cloud
sparkfabrik
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
Software rotting - DevOpsCon Berlin
Software rotting - DevOpsCon Berlin
Giulio Vian
Protecting your organization against attacks via the build system
Protecting your organization against attacks via the build system
Louis Jacomet
The Rocky Cloud Road
The Rocky Cloud Road
Gert Drapers
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
Open stack
Open stack
Luan Cestari
Open Source Clouds at VIRTu Alley
Open Source Clouds at VIRTu Alley
Dell Cloud Services
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Weaveworks
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
Fwdays
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
NETWAYS
DevOps Service | Mindtree
DevOps Service | Mindtree
AnikeyRoy
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Tim Mackey
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays

More Related Content

Similar to Safeguarding artifact integrity in your Software Supply Chain (20)

All You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source Software
Javier Perez
(Micro)chips and SLSA: Securing the Software Supply Chain
(Micro)chips and SLSA: Securing the Software Supply Chain
Richard Boyd, II
Software Supply Chains for DevOps @ InfoQ Live 2021
Software Supply Chains for DevOps @ InfoQ Live 2021
Aysylu Greenberg
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
Deep dive nella supply chain della nostra infrastruttura cloud
Deep dive nella supply chain della nostra infrastruttura cloud
sparkfabrik
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
Software rotting - DevOpsCon Berlin
Software rotting - DevOpsCon Berlin
Giulio Vian
Protecting your organization against attacks via the build system
Protecting your organization against attacks via the build system
Louis Jacomet
The Rocky Cloud Road
The Rocky Cloud Road
Gert Drapers
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
Open stack
Open stack
Luan Cestari
Open Source Clouds at VIRTu Alley
Open Source Clouds at VIRTu Alley
Dell Cloud Services
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Weaveworks
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
Fwdays
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
NETWAYS
DevOps Service | Mindtree
DevOps Service | Mindtree
AnikeyRoy
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Tim Mackey
All You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source Software
Javier Perez
(Micro)chips and SLSA: Securing the Software Supply Chain
(Micro)chips and SLSA: Securing the Software Supply Chain
Richard Boyd, II
Software Supply Chains for DevOps @ InfoQ Live 2021
Software Supply Chains for DevOps @ InfoQ Live 2021
Aysylu Greenberg
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
Deep dive nella supply chain della nostra infrastruttura cloud
Deep dive nella supply chain della nostra infrastruttura cloud
sparkfabrik
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
Software rotting - DevOpsCon Berlin
Software rotting - DevOpsCon Berlin
Giulio Vian
Protecting your organization against attacks via the build system
Protecting your organization against attacks via the build system
Louis Jacomet
The Rocky Cloud Road
The Rocky Cloud Road
Gert Drapers
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
Open Source Clouds at VIRTu Alley
Open Source Clouds at VIRTu Alley
Dell Cloud Services
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Webinar: End to End Security & Operations with Chainguard and Weave GitOps
Weaveworks
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
Fwdays
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
NETWAYS
DevOps Service | Mindtree
DevOps Service | Mindtree
AnikeyRoy
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Tim Mackey

Recently uploaded (20)

Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Ad

Safeguarding artifact integrity in your Software Supply Chain

  • 1. Safeguarding artifact integrity in your software supply chain Giovanni Galloro - EMEA CE Specialist - Application Modernization - Google Cloud @ggalloro
  • 2. The need to secure the software supply chain
  • 3. What is a Software supply chain? Source Build Package Run Dependencies Code Deploy
  • 5. Source Build Package Run Dependency (includes build toolchains) Inject bad code (A) Compromise source control (B) Build from modified source (C) Compromise build system (D) Compromised/ vulnerable dependency (E) Bypass CI/CD, inject bad artifact (F) Compromise package repo/signing (G) Use compromised package (H) Attack Vectors DevOps SecOps Dev Deploy Compromise Deploy Process (X) Deploy compromised image (Y) Vulnerability discovered post-deployment (Z) A-H : SLSA standard A-H + X-Z: Software Delivery Shield
  • 6. What is Google doing in the community
  • 7. Making the chain stronger: Google open source efforts Open Source Security Foundation We co-founded Open Source Security Foundation in 2019, a cross-industry forum on supply chain security. Supply-chain Levels for Software Artifacts (SLSA) SLSA is an end-to-end framework for supply chain integrity. It is an open-source equivalent of many of the processes we have been implementing internally at Google. SLSA provides an auditable provenance of what was built and how. OpenSSF Scorecards Scorecards use evaluation metrics like well-defined security policy, code review process, and continuous test coverage with fuzzing and static code analysis tools to provide a risk score for open-source projects. Open Source Insights - provides a transitive dependency graph so you can see your dependencies and their dependencies, all down the dependency tree Grafeas & Kritis - Open metadata standard for software artifacts and admission controller to enforce security policies at deployment.
  • 8. SLSA Levels Automation & Provenance Build must be fully scripted/automated and generate provenance Version Control & Signed Provenance Requires using version control and hosted build service that generates authenticated provenance Non-falsifiable, Ephemeral Builds are fully trustworthy, with identity attestations of underlying build infrastructure/hardware. Ephemeral builds leave nothing behind. Hermetic Builds, Review All build inputs/dependencies are specified upfront with no internet egress during the build. Two-party reviews. Measure integrity levels for build, source and dependencies See: slsa.dev
  • 10. Operate Cloud Logging & Monitoring Package Artifact Registry Scanning Artifact Analysis Source Cloud Source Repositories Build Cloud Build IDE Cloud Code Deploy Cloud Deploy Runtime Kubernetes Engine Firebase Cloud Functions Cloud Run Anthos Sw Supply Chain on GCP
  • 12. Cloud Build -> Artifact Registry /workspace Build step Build step Build step Build step Source code Artifact Registry Containers Non-container (maven, Go, Gradle, Bazel)
  • 13. Source Image Manifest Render Deploy Environments Progressions Build (CI) Delivery (CD) Measurement Cloud Deploy Google Cloud Deploy Google Cloud Build
  • 14. Binary authorization Cloud Build Triggered & Automatic Scan Container Analysis Image metadata Artifact Registry Kubernetes Engine Cloud Code Google Cloud Deploy Software Delivery Shield Cloud Run Continuous scanning with Container Analysis Admission control Cloud Workstations Assured OSS Source Control API API