Useful Links
Computer Science
Cybersecurity
Software Supply Chain Security
1. Introduction to Software Supply Chain Security
2. Threat Landscape and Attack Vectors
3. Securing the Development Environment
4. Securing Source Code
5. Managing Dependencies and Third-Party Components
6. Securing the Build and CI/CD Pipeline
7. Securing Software Artifacts
8. Software Bill of Materials
9. Frameworks, Standards, and Governance
10. Incident Response and Recovery
Securing the Development Environment
Developer Identity and Access Management
Multi-Factor Authentication
Implementation Methods
Hardware Tokens
Software Tokens
Biometric Authentication
SMS and Voice Verification
Best Practices
MFA Policy Development
User Training and Adoption
Backup Authentication Methods
Principle of Least Privilege
Role-Based Access Control
Role Definition and Assignment
Permission Matrices
Regular Access Reviews
Permission Auditing
Access Logging
Periodic Reviews
Automated Compliance Checks
Just-in-Time Access
Privileged Access Management
Secure Credential Management
Secrets Storage Solutions
Hardware Security Modules
Key Management Services
Encrypted Vaults
Credential Rotation Policies
Automated Rotation
Emergency Rotation Procedures
Rotation Scheduling
Password Policies
API Key Management
Workstation Security
Endpoint Detection and Response
Threat Detection Capabilities
Behavioral Analysis
Signature-Based Detection
Machine Learning Detection
Incident Response Integration
Automated Response Actions
Alert Escalation
Forensic Data Collection
Continuous Monitoring
Hardening Development Machines
Operating System Hardening
Security Configuration Baselines
Unnecessary Service Removal
Firewall Configuration
Application Whitelisting
Approved Application Lists
Execution Control Policies
Digital Signature Verification
Patch Management
Automated Patching
Patch Testing Procedures
Emergency Patching
Disk Encryption
Secure Boot Configuration
Network Security
VPN Requirements
Network Segmentation
DNS Security
Securing Development Tools
IDE Security and Plugin Vetting
Trusted Plugin Sources
Official Marketplaces
Vendor Verification
Community Reputation
Plugin Permissions Review
Permission Analysis
Risk Assessment
Regular Audits
IDE Configuration Security
Extension Management Policies
Git Client Configuration
Secure Transport Protocols
SSH Configuration
HTTPS Configuration
Certificate Validation
Credential Storage Practices
Credential Helpers
SSH Key Management
Token Storage
Git Hooks Security
Repository Access Controls
Previous
2. Threat Landscape and Attack Vectors
Go to top
Next
4. Securing Source Code