4. Approve & Release 5. Package Repository / Distribution Platform Local Environment 1. Use, Modify, Build & Verify Select & Acquire 6. Package Assessment External Services External Receivers Source & Data Package Results Activity support Decision support 7. Deploy & Operations Developers Typosquatting, Dependency confusion, Trojan Horse Build system subversion Misunderstanding Inadequate/wrong assessment Package repo subversion Inadequate/wrong assessment Unauthorized change, malicious commit, Source repo subversion Local environment subversion vulnerabilities Replication of threats identified in this diagram Education & Training Education & Training Hardened local/separate environment Authorization controls, Data integrity, developer activity monitoring, forge hardening Vulnerability ID tools, reproducible builds, CII BP Badge, SBOMs (e.g., SPDX) Signature verification (e.g., sigstore) Insecure install, Exploited Least privilege, memory safety, monitoring Package repo hardening Improved assessment processes, package monitoring, integrity attestation (e.g., in-toto) Improved assessment processes (e.g. OpenChain) Sample attacks Sample countermeasures (where applied) Misunderstanding Education & Training Software Supply Chain Integrity Map This diagram was created by David A. Wheeler, Kate Stewart, & Shane Coughlan