You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: "SLSA ・ Supply-chain Levels for Software Artifacts"
4
-
sidebar_label: ""
4
+
sidebar_label: "SLSA"
5
5
---
6
6
7
7
# SLSA
8
8
9
9
**Supply-chain Levels for Software Artifacts**, or **[SLSA](https://slsa.dev/)**_(pronounced "salsa")_, is a vendor-neutral security framework that provides guidance on building and delivering software securely. Supported by the [Open Source Software Security Foundation](https://openssf.org/), SLSA consists of a specification that developers can reference when identifying areas of potential improvement. It was [created by Google in 2021](https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html) to help software developers fortify their supply chain security by incorporating the best industry practices end-to-end. It also enables consumers to better evaluate the software they adopt, before they adopt it.
10
10
11
-
SLSA is divided into different tracks and [levels](https://slsa.dev/spec/v1.0/levels), each expanding on the previous. The idea is that, as your security posture matures, you make your way up through the different levels, much like a ladder.
11
+
SLSA is divided into four different **[levels](https://slsa.dev/spec/v1.0/levels)**, which are further broken up into their own tracks, each expanding on the previous. Each level within a track measures a particular aspect of supply chain security. The idea is that, as your security posture matures, you work your way up through the different levels, like a ladder.
12
12
13
-
## SLSA Level 1: Build Basics
13
+
## SLSA Level 0: Build Basics
14
14
15
15
The main focus of Level 1 is on automation, as manual processes are error-prone. It requires the build process to be fully scripted, meaning no manual, ad hoc commands. This ensures the builds are at least reproducible.
16
16
@@ -20,16 +20,15 @@ SLSA 1 is achievable for many teams with minimal effort—if you're using CI/CD
20
20
21
21
:::
22
22
23
-
24
-
## SLSA Level 2: Provenance Proofs
23
+
## SLSA Level 1: Provenance Proofs
25
24
26
25
Level 2 introduces the concept of [provenance](/what-is-software-provenance-and-why-is-it-important-for-security), a verifiable statement of what, how, and where something was built. Build systems must generate signed provenance documents.
27
26
28
-
## SLSA Level 3: Tamper Resistance
27
+
## SLSA Level 2: Tamper Resistance
29
28
30
29
Builds must be performed in a secure environment that prevents tampering. This involves using isolated, authenticated systems (e.g. hardened CI/CD environments).
31
30
32
-
## SLSA Level 4: Fully Fortified
31
+
## SLSA Level 3: Fully Fortified
33
32
34
33
This level adds two-person review for all changes and hermetic builds, meaning builds are completely isolated from the outside world. Every dependency must be verified.
In recent years, the relevance of SBOMs has increased rapidly, with regulatory mandates like PCI DSS and other government requirements specifically requiring SBOM adoption for compliance.
10
10
11
+
## What is an SBOM?
12
+
11
13
A **Software Bill of Materials**, or **SBOM**, is an inventory file that lists all components within a piece of software, including any dependencies. Those components can include anything from open source libraries, APIs, licenses, and known vulnerabilities.
12
14
13
-
## Why SBOMs are important in vulnerability management
15
+
## Why are SBOMs in vulnerability management?
14
16
15
17
The applications we build and use everyday ship with many dependencies. Those dependencies are then likely have _their own_ dependencies, which, in turn, might consist of _their_ own dependencies, and so on. When you consider that any single one of those dependencies can be exploited, it's easy to see why it's important that we are able to track and monitor them.
16
18
@@ -181,7 +183,7 @@ One of the most critical use cases for SBOMs is in enhancing software supply cha
181
183
182
184
## The Future of SBOMs
183
185
184
-
Governments and organizations worldwide are beginning to mandate SBOM usage. For example, the U.S. Executive Order on Improving the Nation’s Cybersecurity calls for SBOMs in critical software development. As these requirements grow, SBOMs are poised to become a standard practice in software development and deployment.
186
+
Governments and organizations worldwide are beginning to mandate SBOM usage. For example, the U.S. Executive Order on Improving the Nation's Cybersecurity calls for SBOMs in critical software development. As these requirements grow, SBOMs are poised to become a standard practice in software development and deployment.
185
187
186
-
An SBOM is more than just a technical document; it’s a cornerstone of modern software security and transparency. By adopting SBOMs, organizations can improve security, ensure compliance, and build trust with users and stakeholders. As software ecosystems grow more complex, SBOMs will play an indispensable role in maintaining a secure and resilient digital world.
188
+
An SBOM is more than just a technical document; it's a cornerstone of modern software security and transparency. By adopting SBOMs, organizations can improve security, ensure compliance, and build trust with users and stakeholders. As software ecosystems grow more complex, SBOMs will play an indispensable role in maintaining a secure and resilient digital world.
0 commit comments