Hypothetical example
For a look at how SLSA might be applied to open source in the future, see the hypothetical curl example.
The pages in this section provide information on general concepts of how and where to put SLSA into practice. They define SLSA use cases and guiding principles.
SLSA protects against tampering during the software supply chain, but how? The answer depends on the use case in which SLSA is applied. This page defines the three most common settings where supply chain problems threaten the security of different types of software producing organizations. They include: first party organizations, oopen source software producers, and vendor services.
How SLSA can be used here: Reducing risk within an organization from insiders and compromised accounts.
In its simplest form, SLSA can be used entirely within an organization to reduce risk from internal sources. This is the easiest case in which to apply SLSA because there is no need to transfer trust across organizational boundaries.
Example of ways an organization might use SLSA internally:
Case study: Google (Binary Authorization for Borg)
How SLSA can be used here: Reducing risk from consuming open source software.
SLSA can also be used to reduce risk for consumers of open source software. The focus here is to map built packages back to their canonical sources and dependencies. In this way, consumers need only trust a small number of secure build platforms rather than the many thousands of developers with upload permissions across various packages.
Example of ways an open source ecosystem might use SLSA to protect users:
Case study: SUSE
How SLSA can be used here: Reducing risk from consuming vendor provided software and services.
SLSA can also be used to reduce risk for consumers of vendor-provided software and services. Unlike open source, there is no canonical source repository to map to, so instead the focus is on the trustworthiness of claims made by the vendor.
Example of ways a consumer might use SLSA for vendor-provided software:
For a look at how SLSA might be applied to open source in the future, see the hypothetical curl example.