WELCOME TO VALENCIA
Protect the Pipe!�
Shripad Nadgowda
Senior Technical Staff Member, IBM Research��Jim Bugwadia
Co-founder and CEO, Nirmata
A policy-based approach for securing CI/CD pipelines
About us
Shripad Nadgowda
Jim Bugwadia
Title
Revisiting the Software Supply Chain
SCM
git-client
Static Scan
SBOM Ops
Build
OCI Registry
Deploy
CICD Pipeline
Cloud Runtime
Internet
Download
Dependencies
Push/Store Built artifacts
Clone, create-pr, open-issue
SCM
git-client
Static Scan
SBOM Ops
Build
OCI Registry
Deploy
CICD Pipeline
Cloud Runtime
Internet
Download
Dependencies
Push/Store Built artifacts
Clone, create-pr, open-issue
3. CI/CD Pipelines have access to user credentials
Revisiting the Software Supply Chain
The Stack
Tekton
SCM
CICD Pipeline
Cloud Runtime
In-toto
Sigstore
cosign
rekor
fulcio
Artifact store
definitions
configurations
policies
images
CICD Pipeline artifacts
Kyverno
Bad things
facts
attacks
mitigations
goals
A deciduous attack tree for a subset of Tekton related security concerns
Policies to prevent bad things
Demo
Summary
WELCOME TO VALENCIA