Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Supply Chain Attack
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Andreas Mosti
May 03, 2021
0
60
Supply Chain Attack
Talk I gave for Bekk Trondheim principles and practices group for security, spring 2021.
Andreas Mosti
May 03, 2021
Tweet
Share
More Decks by Andreas Mosti
See All by Andreas Mosti
Deterministic Builds and where to find them
andmos
0
54
Correct Maps Are Useless: A guide to mental models
andmos
0
170
LEGO I Praksis
andmos
0
70
Supply Chain Attacks: Når den digitale forsyningslinja blir angrepsvektor
andmos
0
34
IoIT: Internet of Insecure Things
andmos
0
130
Containers'n stuff
andmos
0
48
IoT - Bevisstgjøring
andmos
0
52
GitOps in a nutshell
andmos
0
200
OpenFaaS: Serverless platform with no strings attached?
andmos
0
310
Featured
See All Featured
The Organizational Zoo: Understanding Human Behavior Agility Through Metaphoric Constructive Conversations (based on the works of Arthur Shelley, Ph.D)
kimpetersen
PRO
0
230
Bash Introduction
62gerente
615
210k
XXLCSS - How to scale CSS and keep your sanity
sugarenia
249
1.3M
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
52
5.8k
What's in a price? How to price your products and services
michaelherold
247
13k
Why You Should Never Use an ORM
jnunemaker
PRO
61
9.7k
More Than Pixels: Becoming A User Experience Designer
marktimemedia
3
310
Thoughts on Productivity
jonyablonski
74
5k
How to train your dragon (web standard)
notwaldorf
97
6.5k
Data-driven link building: lessons from a $708K investment (BrightonSEO talk)
szymonslowik
1
910
Intergalactic Javascript Robots from Outer Space
tanoku
273
27k
Kristin Tynski - Automating Marketing Tasks With AI
techseoconnect
PRO
0
130
Transcript
Supply Chain Attack
What’s a supply chain?
None
None
None
Ca. 1000 parts, most of them “passive”…
But 35 critical components, single-source dependencies
None
None
None
60 top level packages 20 providers 78 top level packages
32 providers
60 top level packages 20 providers 78 top level packages
32 providers 279 total packages 39 providers 3516 total packages ???? providers
None
None
None
“In an Internet Security Threat Report, powered by Symantec, it
is stated that supply chain attacks still continue to be a feature of the threat landscape, with an increase by 78 percent in 2018.”
None
None
We go to the markedplace
None
“None of the package hosting services can ever guarantee that
all the code its users upload is malware-free”
None
Dependency Confusion
None
None
None
None
Public Package Registry Private Package Registry Package.1.0.0 Package.2.3.0 Package.99.0.0 Package.5.3.0
None
None
None
Service breaches
None
None
None
None
None
None
None
None
None
None
None
None
Worth mentioning: • Stolen signature key • Leaked API keys/passwords
• ????
How do we protect ourselves?