当前位置:网站首页>Plus SBOM: assembly line BOM pbom
Plus SBOM: assembly line BOM pbom
2022-07-27 12:17:00 【51CTO】
I believe you have a good understanding of the software bill of materials (SBOM) No stranger , It refers to all software components used to build software solutions ( Open source or commercial ) A list of . But in the software BOM , It does not include microservices and other components used to deploy software . For a more comprehensive understanding of the components used , We need to create an assembly line BOM PBOM(Pipeline Bill of Materials), It contains all the software components and services used to bring the application from code to delivery .
Why? PBOM It is necessary to ?
Software security depends not only on the source code , It also depends on the integration of the entire software delivery pipeline . Such integration includes building tools 、 Image warehouse and IaC (Infrastructure as Code) Deploy . The number of libraries and components used by ordinary applications is growing , The data shows that the average usage of applications exceeds 500 Open source libraries and components , It's up from two years ago 77%.
Traditional software bill of materials can effectively prevent corresponding security problems by analyzing dependencies . But because of SBOM It does not include all components used in the whole development and deployment pipeline , There is a certain blind spot when viewing the components used in development . And this kind of blind area is likely to cause huge security risks , It also gives malicious attackers a chance to take advantage of . stay SolarWinds Incident ,TeamCity(CI/CD Build a service ) Used as an attack medium during the attack , and SBOM Did not provide key information to prevent such attacks .
To prevent build tools in the process 、 Possible threats and security risks caused by the image warehouse and other components , We need to know exactly all the components we are using , Including components in the software development pipeline . When creating an assembly line BOM , Remember to include SBOM All of , And add comprehensive information about the deployment pipeline .
PBOM What are the benefits ?
1. Improve visibility
PBOM Help achieve complete visibility of the deployment pipeline ,DevOps、 Safety and engineering teams can therefore create a more comprehensive list of assets . Keep references to all components in the pipeline , It can help each team better control the security in the process .
2. Prevent security threats through emergency plans
utilize PBOM It can help understand how all parts of the pipeline interact , And make corresponding business decisions and implement corresponding emergency plans according to security threats , To ensure software security . This can effectively improve threat modeling (Threat Modeling), Allow the implementation of a zero trust architecture , And push DevOps “ Move left safely ” plan .
3. Improve problem solving efficiency
PBOM It can provide a more complete list of components , Including code owners , Submit the history and the related personnel of each part . Use PBOM It can provide accurate alerts according to the context , So as to avoid reminding team members indiscriminately when any problems occur . As the number of false positives decreases , The development and operation and maintenance teams see that the alarm is more accurate , The efficiency of solving problems is also higher .
PBOM What needs to be included ?
Through the above , We have made it clear that we can start from PBOM Information obtained in , To determine PBOM What to cover . It is worth noting that , establish PBOM Don't forget to SBOM All components already included in are included in this list . Besides , Organizations are creating PBOM Build and deploy tool information should be preserved .DevOps The team can take advantage of PBOM The information provided , Effectively mitigate security vulnerabilities and security risks in the software supply chain .
Developer 、 The code owner and the administrator with system access are SBOM The often overlooked part of , These accounts usually have higher access rights . In order to maximize security and comply with the principle of minimum privilege , Access control needs to be based on roles to some extent . Enterprises should first fully review the accounts that currently have system access , After the audit , These accounts can be used as a reference , Provide guidance for ensuring the security of user permissions in the later stage , And the corresponding developers 、 The scope of information that can be accessed by code owners and administrators with system access rights also needs to be summarized into PBOM in .
边栏推荐
- Sword finger offer notes: t57 - I. and two numbers of S
- Sword finger offer note: t45. arrange the array into the smallest number
- go入门篇 (3)
- Unity Shader 一 激光特效Shader[通俗易懂]
- N ¨UWA: Visual Synthesis Pre-training for Neural visUal World creAtionChenfei
- Mysql8msi installation tutorial (database mysql installation tutorial)
- Source code compilation and installation lamp
- Top 10 in the 5.3 billion Bi Market: fansoft, Microsoft, Yonghong, sap, Baidu, IBM, SAS, smart, salesforce, Inspur soft
- Leetcode 02: sword finger offer 58 - I. flip the word order (simple); T123. Verify palindrome string; T9. Palindromes
- 你尚未连接代理服务器可能有问题或地址不正确(如何查看代理服务器ip)
猜你喜欢

Chapter 7 exception handling

Shell script text three swordsman awk

Multi activity disaster recovery construction after station B 713 accident | takintalks share

Makefile template

Keil MDK compilation appears..\user\stm32f10x H (428): error: # 67: expected a "}" wrong solution

快抖抢救“失意人”

Go Beginner (4)

Chapter 13 IO flow

Solution of digital tube flash back after proteus8 professional version cracking

Lonely young people can't quit jellycat
随机推荐
Sync.map of go language
Multi activity disaster recovery construction after station B 713 accident | takintalks share
二分查找判定树(二分查找树平均查找长度)
compute_ class_ weight() takes 1 positional argument but 3 were given
Plus版SBOM:流水线物料清单PBOM
意外收获史诗级分布式资源,从基础到进阶都干货满满,大佬就是强!
Tlc549proteus simulation &sallen key filter &ad736vrms to DC conversion &proteus view 51 register value
5V升压9V芯片
The chess robot "broke" the chess boy's finger...
B 站 713 事故后的多活容灾建设|TakinTalks 大咖分享
Wilcoxon rank sum and signed rank
Bishi journey
解决方案:idea project没有显示树状图
你尚未连接代理服务器可能有问题或地址不正确(如何查看代理服务器ip)
解决@OneToMany查询陷入循环引用问题
图像分割 vs Adobephotoshop(PS)
[网摘][医学影像] 常用的DICOM缩略图解释以及Viewer converter 转换工具
Redis data type
Keil MDK compilation appears..\user\stm32f10x H (428): error: # 67: expected a "}" wrong solution
MySQL paging query instance_ MySQL paging query example explanation "suggestions collection"