On this episode of CISO Tradecraft, you can learn about supply chain vulnerabilities and the 6 important steps you can take to mitigate this attack within your organization:
- Centralize your software code repository
- Centralize your artifact repository
- Scan open source software for malware
- Scan software for vulnerabilities and vendor support
- Run a Web Application Firewall (WAF)
- Run a Runtime Application Self Protection (RASP)
References:
https://owasp.org/www-project-threat-and-safeguard-matrix/
https://slsa.dev/
Infographic: