• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Google Spices Up Supply China Security with SLSA Framework

You are here: Home / General Cyber Security News / Google Spices Up Supply China Security with SLSA Framework
June 18, 2021

Google has proposed a new framework to mitigate the escalating challenges posed by attacks on the computer software offer chain.

The Provide Chain Stages for Computer software Artifacts (SLSA, pronounced “salsa”) is designed to make sure the integrity of software program artifacts throughout the total source chain.

It is based mostly on Google’s individual Binary Authorization for Borg framework, which the tech huge has been utilizing as normal for all its production workloads for about 8 many years.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“The purpose of SLSA is to make improvements to the point out of the industry, notably open resource, to protect against the most urgent integrity threats,” Google defined. “With SLSA, people can make informed alternatives about the security posture of the software package they consume.”

A standard program provide chain features numerous weak points and dependencies exactly where attackers could strike — from the resource repository and management platforms to the create and package phases.

The SolarWinds attackers that managed to compromise 9 US govt agencies compromised the construct system and installed an implant that injected malicious behavior throughout each individual establish, for illustration.

In yet another recent provide chain attack affecting US firm Codecov, attackers applied leaked credentials to upload a destructive artifact that was not developed by the company’s CI/CD process. End users unwittingly downloaded this right from its Google Cloud Storage bucket.

SLSA would have aided avoid the two by necessitating more strong security controls for the SolarWinds establish platform and flagging the destructive artifact to Codecov, Google claimed.

It described SLSA as a “set of incrementally adoptable security guidelines” with four degrees intended to go further than very best apply ways.

“It will help the automated generation of auditable metadata that can be fed into policy engines to give ‘SLSA certification’ to a individual bundle or construct system. SLSA is built to be incremental and actionable, and to present security added benefits at each individual step,” Google described.

“Once an artifact qualifies at the optimum stage, shoppers can have confidence that it has not been tampered with and can be securely traced back to source — anything that is complicated, if not unachievable, to do with most computer software right now.”


Some areas of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «bitwarden review: worth paying for Bitwarden review: Worth paying for
Next Post: Novel Phishing Attack Abuses Google Drive and Docs Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.