On this episode of CISO Tradecraft, you can learn about supply chain vulnerabilities and the 6 important steps you can take to mitigate this attack within your organization:

Centralize your software code repository

Centralize your artifact repository

Scan open source software for malware

Scan software for vulnerabilities and vendor support

Run a Web Application Firewall (WAF)

Run a Runtime Application Self Protection (RASP)

References:

https://owasp.org/www-project-threat-and-safeguard-matrix/

https://slsa.dev/

Infographic: