How Insecure Defaults Led To Undetected Supply Chain Incident - A CI/CD Security Nightmare
-
11
-
- Write review
NY State-Licensed Certificates in Design, Coding & AI — Online
Cybersecurity: Ethical Hacking Fundamentals - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how insecure CI/CD pipeline defaults can create undetected supply chain vulnerabilities through a real-world security incident analysis. Explore the forensic investigation of a 2-year-old exposed token that enabled potential manipulation of public images and forced code signing credential revocation at an open-source company. Examine the detailed breakdown of what went wrong, including lack of artifact scanning, weak secret hygiene, and implicit trust in CI defaults. Discover practical security improvements including automated scanners, secret permissions management, and comprehensive security review processes. Gain insights into identifying and mitigating highly exploitable attack vectors that can remain hidden for years, helping prevent supply chain attacks before they occur.
Syllabus
How Insecure Defaults Led To Undetected Supply Chain Incident: A CI/CD Security Night... Vipul Gupta
Taught by
OpenSSF