Tips for: Securing the Software Supply Chain cover art

Tips for: Securing the Software Supply Chain

Recommended Practices for Managing Open-Source Software and Software Bill of Materials

Preview

Try Premium Plus free
1 credit a month to buy any audiobook in our entire collection.
Access to thousands of additional audiobooks and Originals from the Plus Catalogue.
Member-only deals & discounts.
Auto-renews at $16.45/mo after 30 days. Cancel anytime.

Tips for: Securing the Software Supply Chain

By: National Security Agency
Narrated by: Tom Brooks
Try Premium Plus free

$16.45 per month after 30 days. Cancel anytime.

Buy Now for $16.99

Buy Now for $16.99

Confirm Purchase
Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.
Cancel

About this listen

Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation. This paper builds on the previously released Recommended Practices Guide for a software supply chain’s development, production and distribution, and management processes, to further increase the resiliency of these processes against compromise. This guidance also builds on and supports the Office of Management and Budget memorandum on Enhancing the Security of the Software Supply Chain through Secure Software Development Practices (M-23-16)4.
All organizations, whether they are a single developer or a large industry company, have an ongoing responsibility to maintain software supply chain security practices in order to mitigate risks, but the organization’s role as a developer, supplier or customer of software in the software supply chain lifecycle will continue to determine the shape and scope of this responsibility. The information contained in this guidance supports development activities of a single developer as well as activities of large industry companies. Activities should be planned for and acted upon one at a time, solidifying the new technique in the process before adding the next to be successful.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption

What listeners say about Tips for: Securing the Software Supply Chain

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.