Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Notable Incidents
Fundamental Disconnect . We have developed tremendous tooling and automation that allows us to create secure, reliable software at a scale not previously considered
Threat Modeling Overview
Confidentiality Impact
Availability Impact
Supporting Infrastructure
The Perimeter is the Problem
Example CI/CD Pipeline Dataflow
Follow a Code Change
General/Overarching Concerns
Source Repository and Workflow Engine
Open Source Component Management
Open Source Backdoor Concerns
Build Management
Security Testing and Backdoors
Software Packaging and Distribution
Software Packaging - Monolithic applications vs. Microservice applications
Software Distribution
Using the Threat Model
Vendor Management
Potential Argument Discussion Points
Questions
Taught by
OWASP Foundation
Related Courses
Web and Mobile Testing with SeleniumUniversity of Minnesota via Coursera DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX Programming Foundations: Software Testing/QA
LinkedIn Learning Security Assessment and Testing for CISSP®
Pluralsight EU Panel: The Joys of Integrating Security Testing into Your Pipeline
Pluralsight