Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Notable Incidents
Fundamental Disconnect . We have developed tremendous tooling and automation that allows us to create secure, reliable software at a scale not previously considered
Threat Modeling Overview
Confidentiality Impact
Availability Impact
Supporting Infrastructure
The Perimeter is the Problem
Example CI/CD Pipeline Dataflow
Follow a Code Change
General/Overarching Concerns
Source Repository and Workflow Engine
Open Source Component Management
Open Source Backdoor Concerns
Build Management
Security Testing and Backdoors
Software Packaging and Distribution
Software Packaging - Monolithic applications vs. Microservice applications
Software Distribution
Using the Threat Model
Vendor Management
Potential Argument Discussion Points
Questions
Taught by
OWASP Foundation
Related Courses
AWS Shared Responsibility Model (Japanese)Amazon Web Services via AWS Skill Builder Big Data for Reliability and Security
Purdue University via edX Curso avançado de recursos para exames: AWS Certified Security – Specialty (SCS-C02 - Português (Brasil)) | Exam Prep Enhanced Course: AWS Certified Security - Specialty (SCS-C02 - Portuguese (Brazil))
Amazon Web Services via AWS Skill Builder Certificate of Cloud Security Knowledge (CCSK)
Cybrary Infrastructure Security
Cybrary