{"id":25328,"date":"2022-09-23T11:44:00","date_gmt":"2022-09-23T11:44:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25328"},"modified":"2022-09-26T16:17:01","modified_gmt":"2022-09-26T16:17:01","slug":"software-supply-chain-security-guidance-for-developers","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/","title":{"rendered":"Software Supply Chain Security Guidance for Developers"},"content":{"rendered":"\n<p>Whether it\u2019s package hijacking, dependency confusing, typosquatting, continuous integration and continuous delivery (<a href=\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\">CI\/CD<\/a>) compromises, or basic web exploitation of outdated <a href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\">dependencies<\/a>, there are many <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\">software supply chain attacks<\/a> adversaries can perform to take down their victims, hold them to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransom<\/a>, and exfiltrate critical data.<\/p>\n\n\n\n<p>It\u2019s often more efficient to attack a weak link in the chain to reach a bigger target, like what happened to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\">Kaseya<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\">SolarWinds<\/a> in the last couple of years. Attackers can implant an RCE (remote code execution) or harvest developers\u2019 credentials to escalate privileges and perform malicious actions stealthily.<\/p>\n\n\n\n<p>Besides, they may only have to compromise a single package to distribute malware to a large range of users and organizations, because the current supply chain is insanely complex and interconnected.<\/p>\n\n\n\n<p>Of course, developers cannot be held responsible for all vulnerabilities, but they usually have <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged accounts<\/a> and even direct access to sensitive documents and pipes, which makes them increasingly attractive targets.<\/p>\n\n\n\n<p>To help developers protect against supply chain hacks, the U.S. National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) recently released a comprehensive <a href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3146465\/nsa-cisa-odni-release-software-supply-chain-guidance-for-developers\/\" target=\"_blank\" rel=\"noreferrer noopener\">guide<\/a> to help them secure their code and processes.<\/p>\n\n\n\n<p><em>See the <\/em><a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\"><em>Top Code Debugging and Code Security Tools<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Stopping Malicious Code Injections<\/strong><\/h2>\n\n\n\n<p>According to the guide, threat actors still use public vulnerability disclosures but, rather than waiting for them, \u201cthey proactively inject malicious code into products that are then legitimately distributed downstream through the global supply chain.\u201d<\/p>\n\n\n\n<p>Dev teams often struggle with updates and time-consuming DevOps (development and operations), so they automate CI\/CD pipelines for automated deployments and tests, but the process is sometimes misconfigured and often lacks security checks.<\/p>\n\n\n\n<p>Another popular technique can consist of compromising a package that is only used by developers (e.g., devDependencies in Node) to harvest their credentials such as AWS keys.<\/p>\n\n\n\n<p>The new U.S. guidance identifies common threat scenarios during the software life cycle:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>An adversary intentionally injects malicious code, or a developer unintentionally includes vulnerable code within a product.<\/li><li>Vulnerable third-party source code or binaries is incorporated within a product either knowingly or unknowingly.<\/li><li>Weaknesses within the build process are exploited to inject malicious software within a component of a product.<\/li><li>A product within the delivery mechanism is modified, resulting in injection of malicious software within the original package, update, or upgrade bundle deployed by the customer.<\/li><\/ol>\n\n\n\n<p>The document lists <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-218\/final\" target=\"_blank\" rel=\"noreferrer noopener\">concrete measures<\/a> to reduce the risk:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Generate architecture and design documents.<\/li><li>Gather a trained, qualified, and trustworthy development team.<\/li><li>Create threat models of the software product.<\/li><li>Define and implement security test plans.<\/li><li>Define release criteria, and evaluate the product against it.<\/li><li>Establish product support and vulnerability handling policies and procedures.<\/li><li>Assess the developers\u2019 capabilities and understanding of the secure development process, and assign training.<\/li><li>Document and publish the security procedures and processes for each software release.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Secure Code<\/strong><\/h2>\n\n\n\n<p>Writing secure code involves procedures like code reviews and security tests, regardless of the programming language, even if some of them like Rust prioritize safety by default.<\/p>\n\n\n\n<p>The guide highlights the prevalence of both intentional and unintentional injections of malicious code in attacks.<\/p>\n\n\n\n<p>Engineers and developers can be compromised in seemingly harmless situations like dissatisfaction or outside influence. The lack of training can also explain nasty design flaws, which are pretty hard to detect and can lead to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day attacks<\/a> that can remain <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">unpatched<\/a> for months.<\/p>\n\n\n\n<p>Besides, programmers like to implement special parameters and other debugging features to ease the troubleshooting or the setup. Unfortunately, it\u2019s not uncommon that these \u201chacks\u201d end up in production for convenience, or someone simply forgets to remove them after use.<\/p>\n\n\n\n<p>The guide invites technical teams to apply the following mitigations:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Implement a well-balanced authenticated source code check-in process, such as good practices with GIT repositories and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\">multi-factor authentication (MFA)<\/a>.<\/li><li>Perform automatic static and dynamic security\/<a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanning<\/a>.<\/li><li>Conduct nightly builds with security and regression tests.<\/li><li>Map features to requirements like restricting dev packages and deleting unused dependencies.<\/li><li>Prioritize code reviews, and review critical code.<\/li><li>Implement secure software development\/programming training.<\/li><li>Harden the development environment via methods such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a>, MFA, \u201cjump-host,\u201d and threat modeling for each environment.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Improve the Build Process<\/strong><\/h2>\n\n\n\n<p>Whether it\u2019s for the individual developer or the production build environment, it\u2019s recommended to validate the security of the software before it gets delivered and distributed to end users. Teams can leverage various tools and techniques. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Implementing indirect controls like vulnerability scans, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pentests<\/a>, watermarks, data loss prevention (<a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">DLP<\/a>), and integrity checks<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\">SBOMs<\/a> (Software Bill of Materials) and digital signatures to validate deliveries<\/li><li>Rapid iterative cycles (agile development)<\/li><li>Access logs for all pipelines<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">Encrypting<\/a> secrets<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Least privilege principle<\/a><\/li><li>Network <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">segregation<\/a><\/li><li>On-premises deployment<\/li><li>Version control<\/li><li>A\/B testing in CI\/CD pipelines<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Best Practices for Version Control<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Jwcr1eH6jLqnvdTncuhPMpqmoG5MeCfAYl5vO-HkpYi6PlOExigLtEwsj5ZaalCRRcaPVcnhgwQ4A-eh08MCbWB1LUDDmXPKR2h16y7COc4vJII93r3GfDMB7fRM9P2fg31zq9e56Lc24ztc9LkoQ-p1pXK0Mzs7-N0KgCwuZYtqSa9jYho7B9SskgmOMkiHC1tQPg\" alt=\"\"\/><\/figure>\n\n\n\n<p>The document provides guidelines for the protection of the source code.<\/p>\n\n\n\n<p>Firstly, access and validation start with good source code management (SCM) principles to track modifications to a source code repository.<\/p>\n\n\n\n<p>Dev teams should also enable notifications to be alerted when a new threat, version or update is found. Major versioning platforms like GitLab or GitHub provide such features, but the guide recommends to go further and keep \u201ca log of all developers and the components they download.\u201d<\/p>\n\n\n\n<p>MFA should be enabled \u201cfor all access\u201d to the repository, and teams can leverage basic Git branching to keep things organized:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Developers work in the development branch.<\/li><li>Leads promote software to a QA (quality assurance) branch after code review and approval.<\/li><li>QA teams test the software from the QA branch.<\/li><li>If approved, the branch can be merged in production.<\/li><\/ul>\n\n\n\n<p>The guide recommends restricting access to the production branch to \u201ca small set of build and team members\u201d and implementing lockdown procedures after each release to secure the builds.<\/p>\n\n\n\n<p>Developers should also sign commits. It\u2019s not explicitly mentioned in the guide, but some attacks rely on stolen keys to push commits. In this case, the unauthorized modifications will be attributed to a legitimate user.<\/p>\n\n\n\n<p>It\u2019s not uncommon for developers to use temporary keys to set up environments. If they don\u2019t remove the keys after usage, an attacker could find them after gaining access to the server.<\/p>\n\n\n\n<p>Another attack may consist of faking a legitimate maintainer\u2019s identity by creating a fake package and configuring Git with the maintainer\u2019s information (e.g., typosquatting).<\/p>\n\n\n\n<p>Developers can sign commits with GPG (Gnu Privacy Guard) keys or libraries like <a href=\"https:\/\/github.com\/sigstore\/gitsign\" target=\"_blank\" rel=\"noreferrer noopener\">Gitsign<\/a>. It\u2019s not bulletproof, but this additional layer of security is relatively easy to set up.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e5848e973-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e5848e973\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e5848e973\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e5848e973\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e5848e973\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e5848e973\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e5848e973\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Whether it\u2019s package hijacking, dependency confusing, typosquatting, continuous integration and continuous delivery (CI\/CD) compromises, or basic web exploitation of outdated dependencies, there are many software supply chain attacks adversaries can perform to take down their victims, hold them to ransom, and exfiltrate critical data. It\u2019s often more efficient to attack a weak link in the [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":25330,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[5735,2369,30797,730,2771,31944,23458,5277],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[382,82,379,31775],"class_list":["post-25328","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","tag-application-security-2","tag-cloud-security","tag-devsecops","tag-security","tag-software-development","tag-software-supply-chain","tag-supply-chain-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-application-security-vulnerability-management","b2b_product-security-development","b2b_product-threats-and-vulnerabilities","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software Supply Chain Security Guidance for Developers | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Supply Chain Security Guidance for Developers | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-23T11:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-26T16:17:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Software Supply Chain Security Guidance for Developers\",\"datePublished\":\"2022-09-23T11:44:00+00:00\",\"dateModified\":\"2022-09-26T16:17:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\"},\"wordCount\":1109,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png\",\"keywords\":[\"application security\",\"cloud security\",\"DevSecOps\",\"security\",\"software development\",\"software supply chain\",\"supply chain security\",\"Web security\"],\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\",\"name\":\"Software Supply Chain Security Guidance for Developers | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png\",\"datePublished\":\"2022-09-23T11:44:00+00:00\",\"dateModified\":\"2022-09-26T16:17:01+00:00\",\"description\":\"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png\",\"width\":800,\"height\":478,\"caption\":\"secure dev practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software Supply Chain Security Guidance for Developers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software Supply Chain Security Guidance for Developers | eSecurity Planet","description":"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/","og_locale":"en_US","og_type":"article","og_title":"Software Supply Chain Security Guidance for Developers | eSecurity Planet","og_description":"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/","og_site_name":"eSecurity Planet","article_published_time":"2022-09-23T11:44:00+00:00","article_modified_time":"2022-09-26T16:17:01+00:00","og_image":[{"width":800,"height":478,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Software Supply Chain Security Guidance for Developers","datePublished":"2022-09-23T11:44:00+00:00","dateModified":"2022-09-26T16:17:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/"},"wordCount":1109,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png","keywords":["application security","cloud security","DevSecOps","security","software development","software supply chain","supply chain security","Web security"],"articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/","url":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/","name":"Software Supply Chain Security Guidance for Developers | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png","datePublished":"2022-09-23T11:44:00+00:00","dateModified":"2022-09-26T16:17:01+00:00","description":"U.S. cybersecurity agencies have released guidance to help devs avoid supply chain vulnerabilities. Here are some best practices.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/secure-dev-practices.png","width":800,"height":478,"caption":"secure dev practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Software Supply Chain Security Guidance for Developers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25328"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25328"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25328\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25330"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25328"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25328"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25328"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}