{"id":24881,"date":"2022-08-15T20:58:19","date_gmt":"2022-08-15T20:58:19","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=24881"},"modified":"2022-08-15T20:58:21","modified_gmt":"2022-08-15T20:58:21","slug":"ci-cd-pipeline-software-supply-chain-risk","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/","title":{"rendered":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers"},"content":{"rendered":"\n<p>Continuous integration and development (CI\/CD) pipelines are the most dangerous potential attack surface of the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\">software supply chain<\/a>, according to NCC researchers.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/#rce-as-a-service-lessons-learned-from-5-years-of-real-world-cicd-pipeline-compromise-27541\" target=\"_blank\" rel=\"noreferrer noopener\">presentation<\/a> at last week&#8217;s Black Hat security conference by NCC&#8217;s Iain Smart and Viktor Gazdag, titled &#8220;RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI\/CD Pipeline Compromise,&#8221; builds on <a href=\"https:\/\/research.nccgroup.com\/2022\/01\/13\/10-real-world-stories-of-how-weve-compromised-ci-cd-pipelines\/\" target=\"_blank\" rel=\"noreferrer noopener\">previous work<\/a> NCC researchers have done on compromised CI\/CD pipelines.<\/p>\n\n\n\n<p>A CI\/CD pipeline is fundamentally remote code execution (RCE), and there are many paths to compromise it regardless of a company&#8217;s size.<\/p>\n\n\n\n<p>Because organizations trust their pipelines too much, compromising these channels is usually a good path for hackers, as they would likely gain unauthorized access to critical data and even elevate their privileges to perform further attacks.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CI\/CD Approaches Create Risk<\/strong><\/h2>\n\n\n\n<p>CI stands for \u201ccontinuous integration\u201d and CD means \u201ccontinuous delivery.\u201d The combination of the two practices allows for automating and monitoring development throughout the entire lifecycle.<\/p>\n\n\n\n<p>Continuous integration means developers can automate processes when code changes. Typically, scripts will run when a modification is merged into specific branches of the project to test, build, and deploy the code.<\/p>\n\n\n\n<p>The idea is to reduce the efforts needed to deploy new code across all environments, which not only impacts developers but also business teams. As enhanced deployment is part of the <a href=\"https:\/\/12factor.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">Twelve-factor app<\/a>, a set of principles that drive modern SaaS apps, approaches such as CI\/CD are supposed to make the process less risky.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.jenkins.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jenkins<\/a> open source automation server, for example, is one the most popular solutions on the market. Many companies, including major ones, use it to handle DevOps operations. During their tests, the researchers managed to compromise Jenkins environments in various ways, leveraging misconfiguration in S3 Buckets or in the environment itself.<\/p>\n\n\n\n<p>Indeed, organizations use third-party solutions like Jenkins to speed up their processes, but too permissive configurations ultimately lead to privilege escalation.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\">How Hackers Compromise the Software Supply Chain<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Third-party Solutions Make CI\/CD Pipelines Vulnerable<\/strong><\/h2>\n\n\n\n<p>Researchers found attack paths in popular platforms that provide advanced CI\/CD functionalities, such as <a href=\"https:\/\/about.gitlab.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitLab<\/a>. They took advantage of sensitive features in GitLab Runners to escalate privileges and grab secrets.<\/p>\n\n\n\n<p>Again, configurations that are too permissive allow any user with rights to commit code to access passwords and secrets, for example, when the data is stored in plain text in environment variables.<\/p>\n\n\n\n<p>Researchers also exploited privileged processes and containers (e.g., in Docker and Kubernetes) that run, for example, as root, while some solutions support rootless build.<\/p>\n\n\n\n<p>These attacks may look quite classic, and robust configuration would not allow such escalations, but in reality, many organizations have poor practices and choose convenience over security. Some teams might not even know there are additional security settings or find them incompatible with deadlines.<\/p>\n\n\n\n<p>Researchers reported interesting results in their 10 scenarios. The final one consisted of pretending<em> <\/em>\u201cyou have compromised a developer\u2019s laptop.\u201d After chaining some exploits, they managed to access the Jenkins master node and dump all variables, which ultimately gave them full access to the production environment, as the deployment pipeline was given too many permissions.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-supply-chain-security-project\/\">New Open-source Security Initiative Aimed at Supply Chain Attacks<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Secure your CI\/CD Pipeline<\/strong><\/h2>\n\n\n\n<p>CI\/CD pipelines are critical environments hackers will attack if given a chance. Because of their complexity and the time needed to configure them properly, many teams give full permissions to third-party tools that are not supposed to get so many rights.<\/p>\n\n\n\n<p>Here are some practical security steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The least privilege approach (everywhere in the chain) is the right direction here. Assign the minimum necessary rights to people and third-party tools. It certainly takes more time to configure and can even trigger some bugs in tests and elsewhere, but it\u2019s worth it.<\/li><li>Enable two-factor (2FA) and multi-factor authentication (MFA) whenever it\u2019s possible, especially for administrator accounts.<\/li><li>Never ever use environment variables for credentials, or at least encrypt them.<\/li><li>Identify the weakest points in your pipelines that require additional security measures.<\/li><li>Implement security checks, especially for committers.<\/li><li>Have a strong vendor policy. Continuous deployment delivers code your teams do not maintain in production, making supply chain attacks attractive for hackers.<\/li><\/ul>\n\n\n\n<p>The setup phase is highly critical. Be extra vigilant during the first stages of your projects, as it\u2019s usually at this point that you find misconfigured instances that can lead to privilege escalation.<\/p>\n\n\n\n<p>Least privilege, or <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-hype-vs-reality\/\">zero trust principles<\/a>, figure prominently in Smart and Gazdag&#8217;s work, but they also recommend additional controls like network segmentation and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a>.<\/p>\n\n\n\n<p>Further reading:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">Top Microsegmentation Software<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6f0d2762ba-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f0d2762ba\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f0d2762ba\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f0d2762ba\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f0d2762ba\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f0d2762ba\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f0d2762ba\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Continuous integration and development (CI\/CD) pipelines are the most dangerous potential attack surface of the software supply chain, according to NCC researchers. The presentation at last week&#8217;s Black Hat security conference by NCC&#8217;s Iain Smart and Viktor Gazdag, titled &#8220;RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI\/CD Pipeline Compromise,&#8221; builds on previous work NCC [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":22282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[2369,3790,1146,730,31944,30620,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,82,31775],"class_list":["post-24881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","tag-cloud-security","tag-cybersecurity","tag-malware","tag-security","tag-software-supply-chain","tag-third-party-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-security-development","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here&#039;s what to do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here&#039;s what to do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-15T20:58:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-15T20:58:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers\",\"datePublished\":\"2022-08-15T20:58:19+00:00\",\"dateModified\":\"2022-08-15T20:58:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"malware\",\"security\",\"software supply chain\",\"third-party security\",\"Web security\"],\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\",\"name\":\"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"datePublished\":\"2022-08-15T20:58:19+00:00\",\"dateModified\":\"2022-08-15T20:58:21+00:00\",\"description\":\"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here's what to do.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"width\":800,\"height\":618,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet","description":"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here's what to do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/","og_locale":"en_US","og_type":"article","og_title":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet","og_description":"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here's what to do.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-15T20:58:19+00:00","article_modified_time":"2022-08-15T20:58:21+00:00","og_image":[{"width":800,"height":618,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers","datePublished":"2022-08-15T20:58:19+00:00","dateModified":"2022-08-15T20:58:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","keywords":["cloud security","cybersecurity","malware","security","software supply chain","third-party security","Web security"],"articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/","url":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/","name":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","datePublished":"2022-08-15T20:58:19+00:00","dateModified":"2022-08-15T20:58:21+00:00","description":"CI\/CD pipelines contain a number of risky practices that weaken supply chain security, Black Hat researchers say. Here's what to do.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","width":800,"height":618,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/24881"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=24881"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/24881\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22282"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=24881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=24881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=24881"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=24881"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=24881"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=24881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}