Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Supply Chain Attack
Search
Andreas Mosti
May 03, 2021
0
63
Supply Chain Attack
Talk I gave for Bekk Trondheim principles and practices group for security, spring 2021.
Andreas Mosti
May 03, 2021
Tweet
Share
More Decks by Andreas Mosti
See All by Andreas Mosti
Deterministic Builds and where to find them
andmos
0
59
Correct Maps Are Useless: A guide to mental models
andmos
0
180
LEGO I Praksis
andmos
0
71
Supply Chain Attacks: Når den digitale forsyningslinja blir angrepsvektor
andmos
0
35
IoIT: Internet of Insecure Things
andmos
0
130
Containers'n stuff
andmos
0
49
IoT - Bevisstgjøring
andmos
0
53
GitOps in a nutshell
andmos
0
200
OpenFaaS: Serverless platform with no strings attached?
andmos
0
320
Featured
See All Featured
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
49
9.9k
Designing for Performance
lara
611
70k
WCS-LA-2024
lcolladotor
0
470
SEO for Brand Visibility & Recognition
aleyda
0
4.3k
The State of eCommerce SEO: How to Win in Today's Products SERPs - #SEOweek
aleyda
2
9.7k
4 Signs Your Business is Dying
shpigford
187
22k
Test your architecture with Archunit
thirion
1
2.2k
The Director’s Chair: Orchestrating AI for Truly Effective Learning
tmiket
1
110
New Earth Scene 8
popppiees
1
1.6k
We Are The Robots
honzajavorek
0
190
Keith and Marios Guide to Fast Websites
keithpitt
413
23k
Tell your own story through comics
letsgokoyo
1
830
Transcript
Supply Chain Attack
What’s a supply chain?
None
None
None
Ca. 1000 parts, most of them “passive”…
But 35 critical components, single-source dependencies
None
None
None
60 top level packages 20 providers 78 top level packages
32 providers
60 top level packages 20 providers 78 top level packages
32 providers 279 total packages 39 providers 3516 total packages ???? providers
None
None
None
“In an Internet Security Threat Report, powered by Symantec, it
is stated that supply chain attacks still continue to be a feature of the threat landscape, with an increase by 78 percent in 2018.”
None
None
We go to the markedplace
None
“None of the package hosting services can ever guarantee that
all the code its users upload is malware-free”
None
Dependency Confusion
None
None
None
None
Public Package Registry Private Package Registry Package.1.0.0 Package.2.3.0 Package.99.0.0 Package.5.3.0
None
None
None
Service breaches
None
None
None
None
None
None
None
None
None
None
None
None
Worth mentioning: • Stolen signature key • Leaked API keys/passwords
• ????
How do we protect ourselves?