images/blogs/supply-chain-security.png

Your software’s supply chain: the advanced invisible threat

In April 2024, a Microsoft engineer happened to stumble across a concerted attack on a low-level utility library relied upon by dozens of Linux distributions. The multi-year attack in execution since 2021 is described as one of “the best executed supply chain attack” and how can you. But what is a “Supply Chain” with respect to technology and how do you secure your company?

This article explores both in detail from the perspective of a technology executive.

The XZ Utils Attack

XZ Util backdoor tracked as CVE-2024-3094 … I wont get into what XZ is, other than to say it’s a low level innocuous looking library relied upon by dozens of Linux distributions

Why you should chare

The software supply chain

Securing your Software Supply Chain (“triple-S-C”, or “3SC”)

High Level Architectures?

Why should a technology executive care?

  • talk about . If the backdoor vulnerability wasnt discovered by chance from a security-minded engineer, the remote code execution ability would have been catastrophic.

  • talk about CVSS scoring… 10 = VERUY VERY BAD>

What can you do about it?

  • solutions such as chainguard, binary authorization!

Let's Work Together