• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google releases new framework to prevent software supply chain attacks

Google Releases New Framework to Prevent Software Supply Chain Attacks

You are here: Home / General Cyber Security News / Google Releases New Framework to Prevent Software Supply Chain Attacks
June 18, 2021

As computer software provide chain attacks arise as a issue of problem in the wake of SolarWinds and Codecov security incidents, Google is proposing a alternative to guarantee the integrity of application deals and protect against unauthorized modifications.

Named “Source chain Degrees for Software package Artifacts” (SLSA, and pronounced “salsa”), the finish-to-stop framework aims to secure the computer software growth and deployment pipeline — i.e., the resource ➞ create ➞ publish workflow — and mitigate threats that come up out of tampering with the supply code, the make platform, and the artifact repository at each individual backlink in the chain.

Stack Overflow Teams

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Google mentioned SLSA is influenced by the company’s very own inside enforcement mechanism identified as Binary Authorization for Borg, a set of auditing resources that verifies code provenance and implements code identity to determine that the deployed production software is effectively reviewed and licensed.

“In its recent condition, SLSA is a set of incrementally adoptable security tips getting recognized by business consensus,” explained Kim Lewandowski of Google Open Supply Security Team and Mark Lodato of the Binary Authorization for Borg Workforce.

code dependencies

“In its closing form, SLSA will differ from a list of best tactics in its enforceability: it will support the automated development of auditable metadata that can be fed into policy engines to give “SLSA certification” to a specific package deal or develop platform.”

The SLSA framework promises conclude-to-finish software package offer chain integrity and is designed to be both of those incremental and actionable. It comprises four diverse degrees of progressive application security sophistication, with SLSA 4 supplying a high diploma of assurance that the software program has not been improperly tinkered.

  • SLSA 1 — Demands that the create system be fully scripted/automatic and generate provenance
  • SLSA 2 — Requires employing edition regulate and a hosted create assistance that generates authenticated provenance
  • SLSA 3 — Needs that the resource and build platforms meet certain standards to ensure the auditability of the resource and the integrity of the provenance
  • SLSA 4 — Calls for a two-person overview of all adjustments and a hermetic, reproducible establish course of action

“Increased SLSA ranges require more robust security controls for the build system, creating it additional complicated to compromise and acquire persistence,” Lewandowski and Lodato famous.

Even though SLA 4 represents the best close condition, the reduce ranges supply incremental integrity ensures, at the exact same time making it difficult for malicious actors to continue to be concealed in a breached developer environment for extended periods of time.

Enterprise Password Management

Together with the announcement, Google has shared supplemental facts about the Resource and Build prerequisites that need to be contented, and is also calling on the field to standardize the system and define a danger model that facts distinct threats SLSA hopes to handle in the long time period.

“Achieving the highest stage of SLSA for most initiatives may possibly be challenging, but incremental improvements recognized by decreased SLSA levels will already go a very long way toward increasing the security of the open up supply ecosystem,” the enterprise reported.

Located this write-up exciting? Stick to THN on Fb, Twitter  and LinkedIn to browse extra exceptional content material we submit.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «[ebook] 7 signs you might need a new detection and [eBook] 7 Signs You Might Need a New Detection and Response Tool
Next Post: North Korean hackers target nuclear research centre north korean hackers target nuclear research centre»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.