_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN
Let's talk

Supply Chain Security

19. 12. 2025 1 min read intermediate

Supply chain útoky rostou exponenciálně. Kompromitovaná závislost, build pipeline nebo registry = backdoor ve vašem software.

Ochranné vrstvy

  1. Signed commits (GPG, SSH signing)
  2. Lockfile + integrity checks
  3. Dependency pinning (exact versions)
  4. Private registry / proxy
  5. Signed artifacts (Cosign, Sigstore)
  6. SLSA framework compliance

Signed commits

git config –global commit.gpgsign true git config –global gpg.format ssh git config –global user.signingkey ~/.ssh/id_ed25519.pub

SLSA Framework

  • Level 1: Build scripted, provenance generated
  • Level 2: Hosted build, signed provenance
  • Level 3: Hardened build platform
  • Level 4: Two-party review, hermetic builds

Key Takeaway

Podepisujte commity a artefakty. Pinujte závislosti. SLSA framework jako roadmap pro supply chain security.

securitysupply chainslsaci/cd
Share:

CORE SYSTEMS tým

Stavíme core systémy a AI agenty, které drží provoz. 15 let zkušeností s enterprise IT.