You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/spec/draft/about.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: About SLSA
3
-
description: With supply chain attacks on the rise, a shared vocabulary and universal framework is needed to provide incremental guidance to harden supply chains for more secure software production. This page introduces the main concepts behind SLSA and explains how it can help anyone involved in producing, consuming, or providing infrastructure for software.
3
+
description: With supply chain attacks on the rise, a shared vocabulary and universal framework are needed to provide incremental guidance to harden supply chains for more secure software production. This page introduces the main concepts behind SLSA and explains how it can help anyone involved in producing, consuming, or providing infrastructure for software.
4
4
---
5
5
6
6
This page is an introduction to SLSA and its concepts. If you're new
@@ -23,15 +23,15 @@ SLSA offers:
23
23
24
24
## Why SLSA is needed
25
25
26
-
Highprofile attacks like those against [SolarWinds](https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/) or [Codecov](https://about.codecov.io/apr-2021-post-mortem/) have exposed the kind of supply
26
+
High-profile attacks like those against [SolarWinds](https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/) or [Codecov](https://about.codecov.io/apr-2021-post-mortem/) have exposed the kind of supply
27
27
chain integrity weaknesses that may go unnoticed, yet quickly become very
28
28
public, disruptive, and costly in today's environment when exploited. They've
29
29
also shown that there are inherent risks not just in code itself, but at
30
30
multiple points in the complex process of getting that code into software
31
31
systems—that is, in the **software supply chain**. Since these attacks are on
32
32
the rise and show no sign of decreasing, a universal framework for hardening the
33
33
software supply chain is needed, as affirmed by the U.S. Executive Order on
34
-
Improving the Nation's Cybersecurity of May 12th 2021.
34
+
Improving the Nation's Cybersecurity of May 12th, 2021.
35
35
36
36
Security techniques for vulnerability detection and analysis of source code are
37
37
essential, but are not enough on their own. Even after fuzzing or vulnerability
Copy file name to clipboardExpand all lines: docs/spec/draft/future-directions.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -63,4 +63,4 @@ The Source track will be scoped to revisions of a single repository.
63
63
The intent of each revision is determined by the [software producer](terminology.md#roles) who is also responsible for declaring which Source level should apply and administering technical controls to enforce that level.
64
64
65
65
The primary purpose of the Source track will be to enable verification that the creation of a revision followed the producer's intended process.
66
-
Consumers will be able to examine source provenance attestations to determine if a revision meet their requirements.
66
+
Consumers will be able to examine source provenance attestations to determine if a revision meets their requirements.
0 commit comments