Software Supply Chain Security
- Threat Landscape and Attack Vectors
- Attacker Motivations and Goals
- Threat Actors
- Common Vulnerabilities and Exposures in the Supply Chain
- Key Attack Vectors
- Compromised Developer Accounts
- Compromised Source Code Management
- Malicious Dependencies
- Compromised Build Environments
- Compromised CI/CD Pipelines
- Poisoned Container Images
- Signing Key Theft