-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
content: refine dependency threats #1046
Conversation
Refine the "dependency threats" of the Threats & Mitigations page to better explain the intent and to differentiate from (H), which sounded confusingly similar (slsa-framework#1039). More work is needed to refine (H), but that is left to a separate PR. - Explain that "dependency threats" are not distinct threats but rather threats to other pieces of software that also affect this one. In the diagram, the diagram to color (D) differently to show this, mirroring the existing dashed lines. - State that only "build dependencies" are in scope for the threat model, matching existing diagram and terminology throughout SLSA. - Rename "Use compromised dependency" to "Compromise build dependency", both for consistency with other threats, which are from the adversary's point of view, and to emphasize that this is restricted to build dependencies. - Expand the text about dependency threats and give examples. Highlight both "include" and "build tool" types of dependencies, and also include both an accidental vulnerability and a malicious backdoor. Signed-off-by: Mark Lodato <[email protected]>
✅ Deploy Preview for slsa ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
I'm interested in feedback from folks to see if this is a step in the right direction. |
0b9a75d
to
c75aa13
Compare
Signed-off-by: Mark Lodato <[email protected]>
Signed-off-by: Mark Lodato <[email protected]>
Signed-off-by: Mark Lodato <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this work Mark. From my anecdotal view, dependency threats are the most common example of supply chain attacks. Providing this section with more coverage is really important.
Co-authored-by: Joshua Lock <[email protected]> Signed-off-by: Mark Lodato <[email protected]>
Co-authored-by: John Kjell <[email protected]> Signed-off-by: Mark Lodato <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: The original issue #1039 mentions confusion between the distinction of a consumer as something potentially separate from a dependency relationship.
We can make it more apparent that a dependency is a form of a consumer relationship.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Signed-off-by: Mark Lodato <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks everyone! Since I have a bunch of approvals, I'm going to merge now. Again, this isn't perfect, and there are a ton of TODOs, but hopefully this gives us something that we can further iterate on.
Refine the "dependency threats" of the Threats & Mitigations page to better explain the intent and to differentiate from (H), which sounded confusingly similar (slsa-framework#1039). More work is needed to refine (H), but that is left to a separate PR. - Explain that "dependency threats" are not distinct threats but rather threats to other pieces of software that also affect this one. In the diagram, the diagram to color (D) differently to show this, mirroring the existing dashed lines, and add "(A-H recursively"). - State that only "build dependencies" are in scope for the threat model, matching existing diagram and terminology throughout SLSA. - Rename "Use compromised dependency" to "Compromise build dependency", both for consistency with other threats, which are from the adversary's point of view, and to emphasize that this is restricted to build dependencies. - Expand the text about dependency threats and give examples. Highlight both "include" and "build tool" types of dependencies, and also include both an accidental vulnerability and a malicious backdoor. Signed-off-by: Mark Lodato <[email protected]>
Refine the "dependency threats" of the Threats & Mitigations page to
better explain the intent and to differentiate from (H), which sounded
confusingly similar (#1039). More work is needed to refine (H), but that
is left to a separate PR.
rather threats to other pieces of software that also affect this
one. In the diagram, the diagram to color (D) differently to show
this, mirroring the existing dashed lines, and add "(A-H
recursively").
model, matching existing diagram and terminology throughout SLSA.
dependency", both for consistency with other threats, which are from
the adversary's point of view, and to emphasize that this is
restricted to build dependencies.
Highlight both "include" and "build tool" types of dependencies, and
also include both an accidental vulnerability and a malicious
backdoor.