S1E4 - 5 Steps for Securing Your Open Source Supply Chain

AppSec Unlocked

09-09-2024 • 10 mins

Season 1: Open Source Security

Episode 4: 5 Steps for Securing Your Open Source Supply Chain


Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. Here are the 5 Steps for securing your open source supply chain.


Step 1: Maintain a Software Bill of Materials (SBOM)

Step 2: Perform Due Diligence - Scan for Vulnerabilities

Step 3: Have a Centralized Artifact Repository - Use Only Approved Software

Step 4: Always Use Latest - Don't Use Stale Components

Step 5: Run a Web Application Firewall (WAF)

You Might Like

Darknet Diaries
Darknet Diaries
Jack Rhysider
Acquired
Acquired
Ben Gilbert and David Rosenthal
Two Blokes Talking Tech
Two Blokes Talking Tech
Trevor Long and Stephen Fenech
Hard Fork
Hard Fork
The New York Times
TechStuff
TechStuff
iHeartPodcasts
Hacked
Hacked
Hacked
Bankless
Bankless
Bankless
WSJ’s The Future of Everything
WSJ’s The Future of Everything
The Wall Street Journal
The Vergecast
The Vergecast
The Verge
Double Tap
Double Tap
Double Tap Productions Inc.
Malicious Life
Malicious Life
Malicious Life