Jenkins, an open source automation server with 15 years of history, still dominates the CI/CD market and remains a mission-critical part of the worldwide software supply chain. IBut Jenkins still has quite an old architecture, and one can consider it a remote execution engine which has access to project data… by design. So, how secure is your instance and supply chain when using Jenkins?
When it comes to Jenkins instances with thousands of users, it is hard to retain status quo between security itself and its impact on user experience due to the restrictions and performance degradation. I will talk about Jenkins security model, best practices and common non-newbie configuration mistakes which we often see on production instances. In particular we will discuss Groovy scripting, controller-to-agent communications and resource isolation. We will also review a few supply chain attack cases that happened through Jenkins, and how one could prevent them.
Target audience for this talk: experienced Jenkins administrators and users interested in Security. The learnings are applicable to other CI/CD tools, especially the self-hosted ones