Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Insecure Defaults Led To Undetected Supply Chain Incident - A CI/CD Security Nightmare

OpenSSF via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how insecure CI/CD pipeline defaults can create undetected supply chain vulnerabilities through a real-world security incident analysis. Explore the forensic investigation of a 2-year-old exposed token that enabled potential manipulation of public images and forced code signing credential revocation at an open-source company managing macOS, Linux, and Windows packages. Examine the detailed investigation process including registry image diffing, scanning across npm, PyPI, and Docker Hub, and token exposure tracing. Understand the root causes including inadequate artifact scanning, poor secret hygiene, and misplaced trust in CI defaults. Discover practical security improvements including automated scanners, proper secret permissions management, comprehensive security reviews, and additional mitigation strategies to prevent similar supply chain attacks from remaining undetected for extended periods.

Syllabus

How Insecure Defaults Led To Undetected Supply Chain Incident: A CI/CD Security Ni... Harald Fischer

Taught by

OpenSSF

Reviews

Start your review of How Insecure Defaults Led To Undetected Supply Chain Incident - A CI/CD Security Nightmare

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.