Achieving SLSA Level 3 is crucial for software producers to ensure their build and delivery process is tamper-proof and safeguarded against supply chain attacks. In this blog post, we will explore SLSA, its various levels, and how you can efficiently achieve SLSA Level-3 compliance using Harness Continuous Integration (CI) and Software Supply Chain Assurance (SSCA) modules.
The rise of software supply chain attacks, including notable incidents like SolarWinds and Codecov, underscores the critical risks throughout the software delivery ecosystem. These attacks demonstrate the potential to compromise software integrity at any stage of the software delivery process, resulting in severe and costly consequences for software producers, consumers, and users alike. For instance, the SolarWinds attack disrupted operations for government agencies and many Fortune 500 companies, resulting in substantial financial costs.
In response to a growing number of software supply chain threats, the Software Supply Chain Levels for Software Artifacts or SLSA (pronounced "salsa”) was defined. SLSA is a security framework originally developed by Google to protect the integrity of software artifacts throughout their lifecycle; it is a means of evaluating the trustworthiness of a software artifact. In 2021, stewardship of SLSA transitioned to the Open Source Security Foundation (OpenSSF). SLSA is set up as a sequence of levels, each increasing the security of the software supply chain. This approach assures that the software is protected from tampering and can be confidently traced back to its original source.
Harness recognizes the challenges of securing software supply chains and ensuring artifact integrity, so we built the Software Supply Chain Assurance (SSCA) module. SSCA enables customers to meet all SLSA levels(L1, L2, L3) in the build track. Let's dive into the details of each level, its requirements, and how Harness SSCA helps you achieve them.
SLSA Requirements:
Achieving SLSA-L1 compliance with Harness SSCA:
The Harness SSCA module automatically generates detailed provenance, which outlines the build platform, process, and top-level inputs involved in creating the artifact. This provenance can be downloaded or distributed as needed. To explore this feature, please refer to the detailed instructions on generating SLSA provenance.
(The image shows the Provenance details of the build process in the Harness CI pipeline)
SLSA Requirements:
Achieving SLSA-L2 compliance with Harness SSCA:
SLSA Requirements:
Achieving SLSA-L3 with Harness SSCA:
Here’s a complete overview of the process.
With Harness SSCA, organizations can attain SLSA Level 3 compliance, fulfilling all of the prescriptive requirements as outlined in the SLSA v1.0 specification. This ensures that tampering by hackers during the build process is effectively prevented. When this capability is combined with open-source governance through SBOM (Software Bill of Materials) lifecycle management, it results in the most advanced platform-based shift-left supply chain security solutions available today.