Skip to content
8 changes: 8 additions & 0 deletions docs/spec/draft/build-env-provenance.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
---
title: Build Environment: Attestation Formats description: The SLSA build environment attestation formats ...
---

The SLSA build environment attestation formats ...

## Build Environment: attestation formats

9 changes: 9 additions & 0 deletions docs/spec/draft/build-env-requirements.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
title: Build Environment: Requirements
description: The SLSA build environment requirements ...
---

The SLSA build environment requirements ...

## Build Environment: Requirements

9 changes: 9 additions & 0 deletions docs/spec/draft/build-env-threat-mit.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
title: Build Environment: Threats and Mitigation
description: The SLSA build environment threats and mitigation...
---

The SLSA build environment threats and mitigatiion ...

## Build Environment: Threats and Mitigation

2 changes: 1 addition & 1 deletion docs/spec/draft/build-env-track-basics.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Build Environment track
description: This page gives an overview of the SLSA Build Environment track and its levels, describing their security objectives and general requirements.
mermaid: true
mermaid: true
---

## Rationale
Expand Down
10 changes: 10 additions & 0 deletions docs/spec/draft/build-env-verification.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
title: Build Environment: verification systems
description: The SLSA build environment verification systems ...
---

The SLSA build environment verification systems ...

## Build Environment: verification systems


2 changes: 1 addition & 1 deletion docs/spec/draft/build-provenance.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: "Build: Provenance"
title: "Build: Provenance"
description: Description of SLSA build provenance specification for verifying where, when, and how something was produced.
layout: standard
---
Expand Down
2 changes: 1 addition & 1 deletion docs/spec/draft/build-requirements.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: "Build: Requirements for producing artifacts"
title: Build: Requirements for producing artifacts
description: This page covers the detailed technical requirements for producing artifacts at each SLSA level. The intended audience is platform implementers and security engineers.
---

Expand Down
11 changes: 11 additions & 0 deletions docs/spec/draft/build-threats-mitigation.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
title: SLSA Build Track threats and mitigations
description: This page covers Supply Chain threats and mitigations for the SLSA Build Track.
---

This page covers Supply Chain threats and mitigations for the SLSA Build Track.

## Build Track threats and concepts



2 changes: 1 addition & 1 deletion docs/spec/draft/build-track-basics.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: "Build: Track Basics"
title: "Build: Track Basics"
description: The SLSA build track is organized into a series of levels that provide increasing supply chain security guarantees. This gives you confidence that software hasn’t been tampered with and can be securely traced back to its source. This page is a descriptive overview of the SLSA build track levels, describing their intent.
---

Expand Down
10 changes: 10 additions & 0 deletions docs/spec/draft/build-verification.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
title: SLSA Build Track verification recommendations
description: This page covers the verfication recommendations for the SLSA the Build Track specification.
---

This page covers the verfication recommendations for the SLSA the Build Track specification.

## Build Track: verification recommendations


73 changes: 35 additions & 38 deletions docs/spec/draft/dependency-track.md
Original file line number Diff line number Diff line change
@@ -1,37 +1,43 @@
---
title: Dependency Track
description: This page describes the SLSA Dependency track, which enables a software producer to measure, control, and reduce risk introduced from third party dependencies.
description: This page shows how the SLSA Dependency track enables a software producer to measure, control, and reduce risk introduced from third party dependencies.
---

# Basics
# {Dependency Track: Consuming Dependencies}

## Objective
**About this page:** the *Dependency Track: Consuming Dependencies* page shows how this track enables a software producer to measure, control, and reduce risk introduced from third party dependencies.

Enable a software producer to measure, control, and reduce risk introduced from third party dependencies.
**Intended audience:** {add appropriate audience}

## Audience
**Topics covered:** dependency track terminology, track level summary, track requirements

The Dependency Track is primarily aimed at enterprises/organizations, with medium to large-sized organizations benefiting the most from adoption of the dependency track levels. Organizations include enterprises, but also large open source projects that want to manage third party dependency risk.
**Internet standards:** [RFC 2119](https://www.rfc-editor.org/rfc/rfc2119), {other standards as required}

## Scope
>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in [RFC 2119](https://www.rfc-editor.org/rfc/rfc2119).

The scope of the SLSA Dependency Track is to properly manage and securely consume build dependencies into the developer workflow to mitigate against supply chain threats targeting the open source ecosystem.
**For more information, see:** {optional}

---
## Overview

## Definitions
The Dependency track is primarily aimed at enterprises/organizations, with medium to large-sized organizations benefiting the most from adoption of the dependency track levels. Organizations include enterprises, but also large open source projects that want to manage third party dependency risk.

| Primary Term | Description
| --- | ---
| Build dependencies | Software artifacts fetched or otherwise made available to the build environment during the build of the artifact. This includes open and closed source binary dependencies.
| Package registry | An entity responsible for mapping package names to artifacts within a packaging ecosystem. Most ecosystems support multiple registries, usually a single global registry and multiple private registries.
| Artifact repository manager | A storage solution that manages your artifact lifecycle and supports different software package management systems while providing consistency to your CI/CD workflow
| Dependency security metadata feed | A metadata feed that provides security or risk information about each dependency to assist consumers in making judgements about the safety of their dependencies
| Package source files | A language-specific config file in a source code repo that identifies the package registry feeds or artifact repository manager feeds to consume dependencies from
The scope of the SLSA Dependency Track is to properly manage and securely consume build dependencies into the developer workflow to mitigate against supply chain threats targeting the open source ecosystem.

---
## Dependency Track Terminology

These terms apply to the Dependency track. See the general terminology [list](terms-generic.md) for terms used throughout the SLSA specification.

| Term | Description |
| --- | --- |
| Artifact repository manager | A storage solution that manages your artifact lifecycle and supports different software package management systems while providing consistency to your CI/CD workflow. |
| Build dependencies | Software artifacts fetched or otherwise made available to the build environment during the build of the artifact. This includes open and closed source binary dependencies. |
| Dependency security metadata feed | A metadata feed that provides security or risk information about each dependency to assist consumers in making judgements about the safety of their dependencies. |
| Package registry | An entity responsible for mapping package names to artifacts within a packaging ecosystem. Most ecosystems support multiple registries, usually a single global registry and multiple private registries. |
| Package source files | A language-specific config file in a source code repo that identifies the package registry feeds or artifact repository manager feeds to consume dependencies from. |

## Levels
## Dependency Track Level Summary

| Level | Requirements
| --- | ---
Expand All @@ -41,9 +47,9 @@ The scope of the SLSA Dependency Track is to properly manage and securely consum
| Dependency L3 | Dependencies consumed from sources under producer's control
| Dependency L4 | Proactive defence against upstream attacks

---
## Dependency Track Level Specifics

## Level 0: No mitigations to dependency threats
### Level 0: No mitigations to dependency threats

**Summary:**

Expand All @@ -57,7 +63,7 @@ N/A

N/A

## Level 1: Inventory of dependencies exists
### Level 1: Inventory of dependencies exists

**Summary:**

Expand All @@ -75,7 +81,7 @@ All third party build dependencies (including transitive) are identified.
- An inventory is a prerequisite to identify and manage known vulnerabilities.
- Implementing a centralized inventory can enable efficient incident response and risk exposure measurement.

## Level 2: Known vulnerabilities have been triaged
### Level 2: Known vulnerabilities have been triaged

**Summary:**

Expand All @@ -93,12 +99,9 @@ Artifacts are released with no unknown 'known' vulnerabilities. Outcomes of the
- Proceed with the release and remediate vulnerabilities in the next release, following normal release cycle
- Proceed with the release and remediate vulnerabilities by expediting the next patch release.

**Note:**

- Does NOT mean the artifact is free of vulnerabilities, but at the time of release all known vulnerabilities are triaged.
- Race condition: new vulnerability can, theoretically, be published on the same day as the release.
**Note:** This does NOT mean the artifact is free of vulnerabilities, but at the time of release all known vulnerabilities are triaged. Also covers race conditions: new vulnerability can, theoretically, be published on the same day as the release.

## Level 3: Dependencies consumed from locations under producer's control
### Level 3: Dependencies consumed from locations under producer's control

**Summary:**

Expand All @@ -112,11 +115,9 @@ Availability risks of upstream sources being removed or taken down (e.g. left-pa

The build process consumes all third party build dependencies only from artifact producer-controlled locations, allowing for control of how dependencies enter the supply chain, reducing the attackable surface. This also enables developers to continue to build even if upstream resources are unavailable.

**Note:**

Compliance with this level enables the ability to achieve Level 4 compliance.
**Note:** Compliance with this level enables the ability to achieve Level 4 compliance.

## Level 4: Proactive defence against upstream attack
### Level 4: Proactive defence against upstream attack

**Summary:**

Expand All @@ -135,13 +136,9 @@ Malicious attacks on upstream sources such as package managers, compromised pack

Reduced likelihood of a released artifact including a malicious or compromised third-party dependency.

**Note:**

This capability builds on Level 3.

---
**Note:** This capability builds upon Level 3.

## Requirements
## Dependency Track Requirements

| Requirement | Description | Example | L1 | L2 | L3 | L4
| --- | --- | --- | --- | --- | --- | ---
Expand Down
Loading