{"id":22210,"date":"2022-06-03T20:53:41","date_gmt":"2022-06-03T20:53:41","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22210"},"modified":"2022-06-03T20:53:43","modified_gmt":"2022-06-03T20:53:43","slug":"how-to-prevent-software-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/","title":{"rendered":"How to Prevent Software Supply Chain Attacks"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\">Software supply chain attacks<\/a> present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a security breach in their supply chain, and 38 percent said they have no way of knowing about any potential issues with a <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third-party supplier\u2019s cybersecurity<\/a>.<\/p>\n\n\n\n<p>Ankur Shah, senior vice president for Prisma Cloud products at Palo Alto Networks, told <em>eSecurity Planet <\/em>that high-profile threats like the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\">Log4j<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/protecting-against-the-spring4shell-vulnerability\/\">Spring4Shell<\/a> vulnerabilities have kept these concerns at top of mind \u2013 and they&#8217;re becoming more prevalent, Shah said, for three key reasons.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 Causes of Growing Supply Chain Threats<\/h2>\n\n\n\n<p>First, Shah said, years ago when he was a developer, nothing he built would be deployed until after extensive security and QA testing. &#8220;Now, developers can pretty much, from their IDE, click a button and get the whole thing tested, secured, deployed, within minutes,&#8221; he said. &#8220;Customers are shipping applications every hour, every day, whenever they want, and businesses love that. It&#8217;s a circular trend, and it&#8217;s not going to change \u2013 developers are not going to go slowly because of quality or security.&#8221;<\/p>\n\n\n\n<p>Second, the number of developers has quickly outpaced the number of security pros, making it all but impossible for the security folks to keep up. &#8220;Everybody&#8217;s a developer now,&#8221; Shah said. &#8220;There are over 33 million developers vs. 3 million security professionals. So it&#8217;s a battle that security can&#8217;t win.&#8221;<\/p>\n\n\n\n<p>Third, Shah said, when he was a developer, it was usually about 80 percent his code and 20 percent open source libraries \u2013 while today, it&#8217;s often the opposite. &#8220;Download open source code from hack me dot com, now it&#8217;s part of your container image, whatever it is \u2013 and then who knows? It gets deployed in hundreds of thousands of workloads and hell breaks loose,&#8221; he said.<\/p>\n\n\n\n<p>And it doesn&#8217;t have to be from some random website \u2013 Log4j isn&#8217;t just some random component from a tiny third-party vendor. &#8220;This is Apache,&#8221; Shah said. &#8220;Their claim to fame is they&#8217;re Open Source 101 \u2013 a trusted vendor, a trusted component \u2013 and yet somebody found a vulnerability, and it&#8217;s fairly easily exploitable.&#8221;<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-supply-chain-security-project\/\">New Open-source Security Initiative Aimed at Supply Chain Attacks<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4 Steps to Code Security<\/h2>\n\n\n\n<p>What companies need to do in response, Shah said, is to secure the entire application lifecycle from code to runtime \u2013 which involves actively monitoring security in at least four key points in the process.<\/p>\n\n\n\n<p>The first step is during development, making sure that any open source code being used is safe. &#8220;When the developers are building their code in the IDE, if they just say, &#8216;Import this open source component,&#8217; right then and there they should know, &#8216;Are you sure you want to do this? Because that particular open source component has a known vulnerability,'&#8221; Shah said.<\/p>\n\n\n\n<p>Increasing developers&#8217; awareness of those concerns is a good start, he said, though each company has to determine its own risk tolerance. A fintech, healthcare, or government organization will likely need to be more careful about open source components than those in other verticals that may want to seek a different balance between security and speed of deployment.<\/p>\n\n\n\n<p>The next area to consider is infrastructure as code. &#8220;A lot of times, the bad actors exploit the weaknesses in the infrastructure \u2013 overly permissive security groups, etc. \u2013 so the other thing to secure, in addition to the open source code, is secure infrastructure as code,&#8221; Shah said.<\/p>\n\n\n\n<p>It&#8217;s equally important to secure the code repository, the third step in Shah&#8217;s process. &#8220;Make sure that your VCS, your Git repo, doesn&#8217;t have weaknesses \u2013 like is it exposed to the public Internet? With Capital One, the code repo was exposed and somebody was able to exploit it \u2013 make sure you have <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a>, you can only access it within your corporate <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a>, and it&#8217;s not available to the public Internet.&#8221;<\/p>\n\n\n\n<p>Finally, there should be an additional check prior to deployment. &#8220;Scan your container registries, scan your CI\/CD pipeline, make sure you&#8217;ve got one more check done there,&#8221; Shah said. &#8220;And then the final stage is, things go into production.&#8221;<\/p>\n\n\n\n<p>Also read:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">Top Container Security Solutions<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Defense in Depth<\/h2>\n\n\n\n<p>That whole process, Shah said, is about ensuring defense in depth. &#8220;You don&#8217;t just do one step,&#8221; he said. &#8220;You do these security checks and balances every step of the way \u2013 at the code time, build time, deploy time, and run time. And if you do that, the chances of a mistake are minimal.&#8221;<\/p>\n\n\n\n<p>With checks throughout the process, Shah said, you end up with an approach to code like Toyota&#8217;s concept of jidoka, which allows anyone to stop the assembly line if they spot a defect. &#8220;The idea being, the further down the car goes in the assembly line, the worse the problem gets \u2013 so fix it sooner, as much as you can. Do quality checks every step of the way.&#8221;<\/p>\n\n\n\n<p>Finally, Shah said, for many companies, it&#8217;s worth considering a platform player rather than combining piecemeal solutions. &#8220;Having more security tools does not make you more secure,&#8221; he said. &#8220;It makes you less secure. By taking a platform approach to your security, you can get visibility across the board \u2013 you don&#8217;t have to stitch a bunch of disparate things together.&#8221;<\/p>\n\n\n\n<p>Further reading:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6f156d25bb-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f156d25bb\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f156d25bb\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f156d25bb\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f156d25bb\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f156d25bb\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f156d25bb\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a security breach in their supply chain, and 38 percent said they have no way of knowing about any potential issues with a third-party supplier\u2019s cybersecurity. Ankur Shah, [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":22212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,16],"tags":[23458],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,82,31775],"class_list":["post-22210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-trends","tag-supply-chain-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-security-development","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Prevent Software Supply Chain Attacks | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Software Supply Chain Attacks | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-03T20:53:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-03T20:53:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"How to Prevent Software Supply Chain Attacks\",\"datePublished\":\"2022-06-03T20:53:41+00:00\",\"dateModified\":\"2022-06-03T20:53:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\"},\"wordCount\":917,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg\",\"keywords\":[\"supply chain security\"],\"articleSection\":[\"Applications\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\",\"name\":\"How to Prevent Software Supply Chain Attacks | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg\",\"datePublished\":\"2022-06-03T20:53:41+00:00\",\"dateModified\":\"2022-06-03T20:53:43+00:00\",\"description\":\"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"software security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent Software Supply Chain Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Software Supply Chain Attacks | eSecurity Planet","description":"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Software Supply Chain Attacks | eSecurity Planet","og_description":"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/","og_site_name":"eSecurity Planet","article_published_time":"2022-06-03T20:53:41+00:00","article_modified_time":"2022-06-03T20:53:43+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"How to Prevent Software Supply Chain Attacks","datePublished":"2022-06-03T20:53:41+00:00","dateModified":"2022-06-03T20:53:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/"},"wordCount":917,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg","keywords":["supply chain security"],"articleSection":["Applications","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/","url":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/","name":"How to Prevent Software Supply Chain Attacks | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg","datePublished":"2022-06-03T20:53:41+00:00","dateModified":"2022-06-03T20:53:43+00:00","description":"A former developer turned cybersecurity executive offers 4 key defensive steps development teams need to build into their processes.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/woman-dev-scaled.jpg","width":2560,"height":1709,"caption":"software security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Prevent Software Supply Chain Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22210"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22210"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22212"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22210"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22210"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22210"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}