logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Ian Lewis, Asra Ali
2023-04-21

tldr - powered by Generative AI

The importance of attestation data in securing the software delivery pipeline and the need for a verification process to establish trust in the attestation data.
  • Attestation data provides proof of an event and allows tracing of outputs from inputs in the software delivery pipeline.
  • Verification process is necessary to ensure integrity and authenticity of the attestation data.
  • Integrity ensures that the attestation data cannot be tampered with, while authenticity ensures identification of the attestation creator.
  • Non-forigibility and non-perishability ensure that the attestation content cannot be influenced by users operating the pipeline.
  • Complete zero trust in the system is necessary to establish trust in the attestation data.
Authors: Christie Warwick, Priya Wadhwa
2023-04-19

tldr - powered by Generative AI

The presentation discusses the use of Salsa standards and Tecton in threat modeling and securing CI/CD systems on Kubernetes.
  • Salsa sets standards for build system execution to ensure trustworthiness
  • Threat modeling for build system on Kubernetes identifies additional threats and ways to mitigate them
  • Tecton can do more to verify image provenance and address volume isolation
  • Spire can be used to catch tampering with Tecton CRDs
  • Trusted resources in Tecton ensure execution of intended tasks and pipelines
Authors: Jesse Sanford, Jason Hall
2022-10-26

Secure software supply chain practices have begun to permeate all aspects of software development. But what about the orchestration of our infrastructure? With the proliferation of infrastructure as code, many of the same threats posed to software supply chains are also threats to our IaC ecosystems. IaC provides clear advantages to platform teams, bringing uniformity and productivity to developers, but with the great power bestowed to it, it also presents a juicy target for supply chain attacks, often while no one is looking. It's only a matter of time before our Site Reliability Engineers will need to defend against the same attack vectors as their Software Engineer counterparts. How can DevSecOps practitioners learn from the patterns and practices being developed by projects like SLSA? Can IaC pipelines build on tooling like Sigstore and in-toto? This talk covers the application of software supply chain security principles to modern IaC pipelines. Jesse and Jason discuss design changes to the Crossplane package management system and it’s forthcoming integration with Sigstore, enabling IaC provenance and attestations. Finally, a demo showcasing the equivalent of “admission control” for IaC will provide inspiration for further work on Secure IaC Supply Chains.
Authors: Brandon Lum, Parth Patel
2022-06-21

tldr - powered by Generative AI

The presentation discusses the challenges of locking down Providence metadata fields in Tecton and proposes a solution using Spiffy Inspire for strong attestation and verification.
  • Tecton users have direct access to objects and metadata fields, making it difficult to lock down Providence metadata fields
  • Kubernetes cluster classes are managed by different entities, making it challenging to restrict access to metadata fields
  • The Task Run object becomes a main attack point for malicious actors
  • The proposed solution involves creating a trusted computing base and restricting access to metadata fields
  • Spiffy Inspire provides strong attestation and verification for the trusted computing base
  • Future work includes extending the solution to other custom resources and validating artifacts passed between tasks
Authors: Daniel Nebenzahl
2022-06-21

tldr - powered by Generative AI

The presentation discusses the implementation of the Salsa standard in supply chain security and the challenges faced in complying with its requirements.
  • Salsa is an emerging standard that puts many requirements on the table for supply chain security implementation
  • Compliance-driven implementation of the framework may result in minimal value and negotiation with suppliers is necessary
  • Provenance documents can be built from APIs and log files to avoid opening up all pipelines
  • Level three of Salsa promises better protection from developer workstations and adjacent build systems
  • Strongly authenticated actors and retention of sources indefinitely are challenging requirements to comply with
  • The Salsa standard provides solutions but they are hard to implement and may result in loss of accreditation
Authors: Josh Bressers
2022-06-21

tldr - powered by Generative AI

The presentation discusses the importance of understanding the order of steps in supply chain management and the need to prioritize solutions based on the problem at hand.
  • Understanding the order of steps in supply chain management is crucial to effectively addressing problems
  • Prioritizing solutions based on the problem at hand is more effective than blindly implementing solutions
  • The speaker shares an anecdote about the challenges of vulnerability scanning and the importance of building a vulnerability management system
  • The speaker emphasizes the importance of having an S-bomb as the foundation of supply chain management
Authors: Shane Lawrence
2022-05-19

tldr - powered by Generative AI

The presentation discusses the importance of securing software supply chains and the techniques that Shopify has learned in protecting millions of businesses. The talk highlights the challenges of software supply chain attacks and the need for collaboration in addressing the issue.
  • Recent compromises of Codecov and Solar Winds have put a spotlight on software supply chain attacks.
  • Lessons that Shopify has learned in protecting millions of businesses and demonstrate these techniques using open source software.
  • Traditional defensive techniques can be applied in the cloud.
  • Voucher and grafeas implementations can give you control over the software that runs in your clusters.
  • The SLSA framework can guide you toward establishing trust in your software.
  • Falco can be used to detect malicious behaviour or indicators that your supply chain has been compromised.
  • Specific techniques for mitigating supply chain attacks include scanning or reviewing the code, using static analysis, and looking at the reputation and response to previous incidents of the maintainers.
  • We can expect more from our suppliers by asking for receipts, an S-bomb, and what your software is made of.
Authors: Priya Wadhwa, Laurent Simon
2022-05-19

tldr - powered by Generative AI

The presentation discusses practical steps to secure container native build systems using SLSA, Github, and Tekton.
  • SLSA is a framework used to quantify the security of supply chains
  • Sixdoor is a project used for signing and verification
  • SLSA and Sigstore are brought together to achieve higher security levels in Tecton and Github workflows
  • Demos are provided for each platform