Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Notable Incidents
Fundamental Disconnect . We have developed tremendous tooling and automation that allows us to create secure, reliable software at a scale not previously considered
Threat Modeling Overview
Confidentiality Impact
Availability Impact
Supporting Infrastructure
The Perimeter is the Problem
Example CI/CD Pipeline Dataflow
Follow a Code Change
General/Overarching Concerns
Source Repository and Workflow Engine
Open Source Component Management
Open Source Backdoor Concerns
Build Management
Security Testing and Backdoors
Software Packaging and Distribution
Software Packaging - Monolithic applications vs. Microservice applications
Software Distribution
Using the Threat Model
Vendor Management
Potential Argument Discussion Points
Questions
Taught by
OWASP Foundation
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Testing
University of Utah via Udacity The Hardware/Software Interface
University of Washington via Coursera Software Debugging
Saarland University via Udacity Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera