Cycode_webinar-CodeTampering
Cycode

Code Tampering: 4 Keys to Pipeline Integrity

WEBINAR

Code tampering is a software company’s worst nightmare. Unfortunately, code tampering is leading to new major software supply chain attacks nearly every month: SolarWinds, Accellion, Click Studios, PHP, CodeCov, Kaseya, Log4Shell and the list goes on.

These incidents make it clear that attackers are hitting DevOps tools and infrastructure just as hard as production applications, looking for any entry point into the victim’s SDLC. After gaining access, they seek to expand laterally across each phase to tamper with code and push it live into production without detection. Ironically, DevOps automation that increases release efficiency also makes it easier for attackers to move laterally as each system becomes more tightly interconnected.

This webinar examines code tampering risks, learnings from recent incidents, and proposes a four-pillar approach to reducing code tampering risk:
  • Integrity validation: Confirming files & artifacts across each phase of the SDLC
  • Anomaly detection: Connecting dots from disparate systems to identify breaches
  • Critical code monitoring: Determining which code to monitor for any and all changes
  • Defense in depth: Applying security and governance policies across DevOps tools and cloud infrastructure

Presented by:

jon
Jon Jarboe
Director of Product Marketing