5 Best Practices to Stop Malicious Submissions in Your Development Pipeline

Logo
Presented by

Liav Caspi, CTO & Co-Founder, Legit Security & Alex Babar, Supply Chain Security Advocate

About this talk

One of the most alarming types of software supply chain attacks is malicious source code modification that stays hidden as it progresses downstream in the development pipeline to create a backdoor for future malicious activities. Despite this common attack objective, the specific techniques bad actors use to access, submit, and/or modify source code varies, requiring AppSec and DevSecOps teams to address a wide range of risk mitigation measures to protect their businesses. In this webinar, you will learn the latest best practices to: - Prevent malicious source code modification by external and internal threats - Stop maliciously modified source code from causing further downstream damage in your development pipelines  - Protect popular source code management (SCM) systems like GitHub, GitLab and BitBucket
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (802)
Legit is a new way to manage your application security posture for security, product and compliance teams. With Legit, enterprises get a cleaner, easier way to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing security teams, including GenAI usage, proliferation of secrets and an uncontrolled dev environment. Fast to implement and easy to use, Legit lets security teams protect their software factory from end to end, gives developers guardrails that let them do their best work safely, and proves the success of the security program. This new approach means teams can control risk across the business – and prove it.