phpBB Heb

Main Menu

  • Home
  • Internet Forum
  • PHP Scripting Language
  • Open Source Software
  • Online Communities
  • Commerce

phpBB Heb

Header Banner

phpBB Heb

  • Home
  • Internet Forum
  • PHP Scripting Language
  • Open Source Software
  • Online Communities
  • Commerce
Open Source Software
Home›Open Source Software›Google partners with GitHub for supply chain security

Google partners with GitHub for supply chain security

By George T. Sprague
April 7, 2022
0
0

Google has partnered with GitHub for a solution that should help prevent software supply chain attacks such as those that affected SolarWinds and Codecov.

Google’s open source security team explained that during the SolarWinds attack, hackers took control of a build server and injected malicious artifacts into a build platform. During the Codecov attack, threat actors bypassed trust builders to upload their artifacts.

“Each of these attacks could have been prevented if there was a way to detect that the delivered artifacts diverged from the expected origin of the software,” Google explained. “But until now, it was difficult to generate verifiable information that described where, when, and how software artifacts were produced (information known as provenance). This information allows users to verifiably trace artifacts back to source and develop risk-based policies around what they consume.

Google and GitHub now offer a new method to generate what they describe as “unforgeable provenance”. The method leverages GitHub Actions workflows for isolation and Sigstore signing tools for authenticity.

The goal is to help projects relying on GitHub runners achieve a high SLSA level, which reassures consumers about the reliability and authenticity of their artifacts.

SLSA (Supply-chain Levels for Software Artifacts) is a framework designed to improve project integrity by allowing users to trace software from final release to source code. In this case, the goal is to achieve SLSA level 3 out of a total of four levels.

Watch on demand: Supply Chain Security Summit and Expo (virtual)

Google published a blog post on Thursday describing “build provenance,” which focuses on the entity performing the publishing process and whether the build artifact was protected from malicious modification. The internet giant will soon be sharing another blog post focusing on “source provenance”, which explains how the source code has been protected. GitHub published its own blog post on Thursday.

For construction provenance, the companies created two prototype tools: one to generate a non-falsifiable construction provenance and one to verify the artifact and its signed provenance. Currently, only applications created using the Go programming language are supported, but the project will also be extended to others.

A step-by-step description of the process has also been provided.

“Using the SLSA framework is a proven way to ensure software supply chain integrity at scale,” Google said. “This prototype shows that achieving high levels of SLSA is easier than ever with the latest features in popular CI/CD systems and open source tools. Increased adoption of tamper-proof build services (SLSA 3+) will contribute to a stronger open source ecosystem and help fill an easily exploitable gap in today’s supply chain.

The first version of the project is expected in a few weeks. In the meantime, interested parties are encouraged to test and provide feedback.

Related: ‘Sprawl Secrets’ Haunts Software Supply Chain Security

Related: Legit Security Raises $30M to Tackle Supply Chain Security

Related: OpenSSF Alpha-Omega Project Tackles Supply Chain Security

views counter

Edouard Kovacs (@EduardKovacs) is a SecurityWeek Contributing Editor. He worked as a high school computer teacher for two years before starting a career in journalism as a security reporter for Softpedia. Eduard holds a bachelor’s degree in industrial computing and a master’s degree in computer techniques applied to electrical engineering.

Previous columns by Eduard Kovacs:
Key words:

Related posts:

  1. Eclipse Sparkplug working group continues to drive adoption of IIot specifications – ADTmag
  2. Armory uses K3 to simplify CD Spinnaker installations
  3. IBM moves to ‘container native’ with software-defined storage platform for OpenShift, Cloud Native
  4. Opto 22 joins the Eclipse Foundation and the Sparkplug working group

Recent Posts

  • A high country paradise for sockeye salmon | Alaska Science Forum
  • How to Choose the Best Tech Stack for Your Startup in 2022
  • Open Source to commercial software, the process from project to product
  • 5G services expected to be rolled out within a month, says MoS Telecom
  • 3 ways every business can get started with an open source software strategy

Archives

  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020

Categories

  • Commerce
  • Internet Forum
  • Online Communities
  • Open Source Software
  • PHP Scripting Language
  • Terms and Conditions
  • Privacy Policy