Software Supply Chain Security

Software Supply Chain Security PDF Author: Cassie Crossley
Publisher: "O'Reilly Media, Inc."
ISBN: 1098133676
Category : Business & Economics
Languages : en
Pages : 243

Get Book Here

Book Description
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: Pinpoint the cybersecurity risks in each part of your organization's software supply chain Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement Design initiatives and controls for each part of the supply chain using existing frameworks and references Implement secure development lifecycle, source code security, software build management, and software transparency practices Evaluate third-party risk in your supply chain

Software Supply Chain Security

Software Supply Chain Security PDF Author: Cassie Crossley
Publisher: "O'Reilly Media, Inc."
ISBN: 1098133676
Category : Business & Economics
Languages : en
Pages : 243

Get Book Here

Book Description
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: Pinpoint the cybersecurity risks in each part of your organization's software supply chain Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement Design initiatives and controls for each part of the supply chain using existing frameworks and references Implement secure development lifecycle, source code security, software build management, and software transparency practices Evaluate third-party risk in your supply chain

Securing the Software Supply Chain

Securing the Software Supply Chain PDF Author: Michael Lieberman
Publisher: Manning
ISBN: 9781633438767
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
Secure your entire software supply chain, including the code you write, the libraries you use, and the platforms you run on. Modern software relies on a collection of original code, libraries, open source tools, plugins, packages, and platforms. Securing the Software Supply Chain teaches you to secure those dependencies to the same rigorous standards as the rest of your systems. Inside this insightful guide, you’ll learn how to: Understand your whole software supply chain Model threats to your software development lifecycle Implement controls to preempt and protect against attack Use cutting-edge security tools and scalable processes Organize and plan improvements Supply chain tools like Sigstore, in-toto, and Kyverno It’s easy to be blissfully unaware of the dangerous vulnerabilities lurking in your software systems. This book reveals techniques securing all components of the software delivery lifecycle. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the book Securing the Software Supply Chain teaches you everything you need to know to identify and protect the code, data, and infrastructure of your applications. You’ll get a comprehensive breakdown of the kind of threats your software supply chain faces, and how they can be dramatically different from traditional dangers. Learn how to implement a chain of custody throughout your software development lifecycle, with techniques ranging from securing developer workstations to implementing dependency proxies. Real-world examples from a financial services company illustrate each concept, including key signing ceremonies, establishing trust roots, and generating a Software Bill of Materials (SBOM)—vital documentation for supply chain risk management. About the reader For software senior engineers and architects with experience in DevSecOps. About the author Michael Lieberman is CTO and co-founder of Kusari, a cybersecurity startup focused on software supply chain security. Michael has previously worked in the financial industry, architecting cloud migrations with a focus on security. In addition, he is an OpenSSF TAC member; a member of the SLSA steering committee, an emerging supply chain security standard; as well as a CNCF Security TAG lead. Brandon Lum is a co-chair of the CNCF Security TAG, and as a part of Google’s Open Source Security Team, he works on improving the security of the Open Source ecosystem. Previously at IBM Research, Brandon worked on various security areas, such as container content protection via encryption and image signing, identity, Zero Trust architectures, and kernel attack surface reduction.

Software Supply Chain Security

Software Supply Chain Security PDF Author: Cassie Crossley
Publisher: O'Reilly Media
ISBN: 9781098133702
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: Pinpoint the cybersecurity risks in each part of your organization's software supply chain Find the cybersecurity frameworks and resources that can improve security Identify the roles that participate in the supply chain--including IT, development, operations, manufacturing, and procurement Design initiatives and controls for each part of the supply chain using existing frameworks and references Evaluate third-party risk in your supply chain

Software Transparency

Software Transparency PDF Author: Chris Hughes
Publisher: John Wiley & Sons
ISBN: 1394158491
Category : Business & Economics
Languages : en
Pages : 257

Get Book Here

Book Description
Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations. The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. You’ll also discover: Use cases and practical guidance for both software consumers and suppliers Discussions of firmware and embedded software, as well as cloud and connected APIs Strategies for understanding federal and defense software supply chain initiatives related to security An essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals.

Defending Against Software Supply Chain Attacks

Defending Against Software Supply Chain Attacks PDF Author: Department of Homeland Security. Cybersecurity and Infrastructure Security Agency
Publisher:
ISBN:
Category :
Languages : en
Pages : 16

Get Book Here

Book Description
This document provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the National Institute of Standards and Technology (NIST) Cyber Supply Chain Risk Management (C-SCRM) framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate risks.

Building Secure and Reliable Systems

Building Secure and Reliable Systems PDF Author: Heather Adkins
Publisher: O'Reilly Media
ISBN: 1492083097
Category : Computers
Languages : en
Pages : 558

Get Book Here

Book Description
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure. Two previous O’Reilly books from Google—Site Reliability Engineering and The Site Reliability Workbook—demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture that’s supportive of such change. You’ll learn about secure and reliable systems through: Design strategies Recommendations for coding, testing, and debugging practices Strategies to prepare for, respond to, and recover from incidents Cultural best practices that help teams across your organization collaborate effectively

Software Supply Chain Security

Software Supply Chain Security PDF Author: Cassie Crossley
Publisher: "O'Reilly Media, Inc."
ISBN: 1098133668
Category : Computers
Languages : en
Pages : 281

Get Book Here

Book Description
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: Pinpoint the cybersecurity risks in each part of your organization's software supply chain Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement Design initiatives and controls for each part of the supply chain using existing frameworks and references Implement secure development lifecycle, source code security, software build management, and software transparency practices Evaluate third-party risk in your supply chain

The Rise of Continuous Packaging

The Rise of Continuous Packaging PDF Author: Dan McKinney
Publisher:
ISBN:
Category : Computer software
Languages : en
Pages : 40

Get Book Here

Book Description
How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you consume and artifacts you create. And you need to own the process of packaging your software artifacts, all the way from build to deployment and delivery. You need a global hub of trusted software. That's where continuous packaging (CP) comes in. In this report, you'll learn how CP gives your teams security, control, visibility, and management over incoming and built assets. You will: Understand how CP helps to secure a supply chain Learn what continuous packaging is and why it's crucial to CI/CD pipelines Discover software supply chain risks and their solutions Define strategies to mitigate those risks Identify the ways continuous packaging helps secure software development.

Building Secure Software

Building Secure Software PDF Author: John Viega
Publisher: Pearson Education
ISBN: 0321624009
Category : Computers
Languages : en
Pages : 906

Get Book Here

Book Description
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all computer security problems. Traditional solutions simply treat the symptoms, not the problem, and usually do so in a reactive way. This book teaches you how to take a proactive approach to computer security. Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use—from managers to coders—this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the devel-opment cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped. Inside you'll find the ten guiding principles for software security, as well as detailed coverage of: Software risk management for security Selecting technologies to make your code more secure Security implications of open source and proprietary software How to audit software The dreaded buffer overflow Access control and password authentication Random number generation Applying cryptography Trust management and input Client-side security Dealing with firewalls Only by building secure software can you defend yourself against security breaches and gain the confidence that comes with knowing you won't have to play the "penetrate and patch" game anymore. Get it right the first time. Let these expert authors show you how to properly design your system; save time, money, and credibility; and preserve your customers' trust.

Building a Secure Software Supply Chain

Building a Secure Software Supply Chain PDF Author: Simon Lipke
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description