Natale Vinto
Open Source Secure Software Supply Chain in action
#1about 2 minutes
Understanding the rising threat to software supply chains
The dramatic increase in supply chain attacks necessitates new security standards and government regulations to mitigate risk.
#2about 2 minutes
Exploring the core domains of supply chain security
Securing the supply chain involves understanding software composition with SBOMs, continuous scanning, content signing, and runtime policy enforcement.
#3about 5 minutes
Using open source tools to secure the entire SDLC
A suite of open source tools like Sigstore, Tecton, and Clair can be used to prevent malicious code, safeguard build systems, and monitor deployments.
#4about 2 minutes
Defining key standards and terminology in supply chain security
Understanding critical concepts like SALSA levels, CVEs, provenance, attestation, and SBOMs is essential for implementing robust security.
#5about 3 minutes
Building a secure and opinionated CI/CD pipeline
A secure pipeline can be constructed using Tecton for SALSA compliance and Sigstore for keyless signing of commits and artifacts.
#6about 4 minutes
Comparing a generic vs a security-augmented workflow
A security-augmented workflow integrates checks like local dependency scanning, commit signature verification, and SALSA compliance into the standard development process.
#7about 4 minutes
Demo: Initiating a secure code update for an application
The demonstration begins by scaffolding a microservice from a secure software template and making a code change to update inventory.
#8about 3 minutes
Demo: Scanning and remediating vulnerabilities locally in the IDE
Using an IDE extension, transitive dependencies are scanned for vulnerabilities, which are then fixed by updating the framework and base image versions.
#9about 4 minutes
Demo: Triggering the secure pipeline with a keyless signed commit
The developer uses keyless signing with an OIDC provider to sign the commit, which automatically triggers a secure pipeline that verifies the signature and generates an SBOM.
#10about 3 minutes
Demo: Verifying deployment and monitoring runtime security
The demo concludes by showing the successfully deployed application and using a security dashboard to check for runtime policy violations and visualize network traffic.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Kubernetes
Terraform
+1
ROSEN Technology and Research Center GmbH
Osnabrück, Germany
Senior
TypeScript
React
+3
Matching moments
05:32 MIN
Getting hired by contributing to open source projects
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
02:48 MIN
Building trust through honest developer advocacy
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
02:39 MIN
Establishing a single source of truth for all data
Cat Herding with Lions and Tigers - Christian Heilmann
14:14 MIN
Scripting presentations and demos in VS Code
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
How GitHub secures open source
Joseph Katsioloudes
How your .NET software supply chain is open to attack : and how to fix it
Andrei Epure
Reviewing 3rd party library security easily using OpenSSF Scorecard
Niels Tanis
Walking into the era of Supply Chain Risks
Vandana Verma
Overcome your trust issues! In a world of fake data, Data Provenance FTW
Jon Geater
Secure Code Superstars: Empowering Developers and Surpassing Security Challenges Together
Stefania Chaplin
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Talan SAS
Senior
DevOps
Continuous Integration
Amazon Web Services (AWS)

European Tech Recruit
Bash
Azure
DevOps
Python
Configuration Management
+1






