DevSecCon 2020 | Hardening your soft software supply chain
Software supply chain threats are real! As more developers and companies rely on open-source code - that anyone can contribute to, including attackers - this opens the door to a new vector of attack. There are increasing supply chain compromises which successfully sneak in new backdoored packages, use typosquatting, or even compromise build tooling and signing keys. What’s actually happening in the wild, how do you determine your dependencies, and properly secure yourself?
We’ll first cover common kinds of supply chain attacks, and when they’re likely to happen. Then, for developers, we’ll discuss what you can do to determine your dependencies, track metadata for these, and be notified of new security patches you should apply, including best practices to make this easier on your dev team. This includes not only your dependencies, but also good security hygiene internally, like scanning for secrets in code, and conducting code reviews.
We’ll also cover what you can do to contribute back - like how you should report vulnerabilities you discover in open-source. Lastly, for maintainers, we’ll review what security reporting should look like, and steps you can take today to increase security and trust.
You’ll come away with a better understanding of what you can do for supply chain security for your organization, the projects you depend on, and the projects you maintain.