Appendix b
Appendix B: Resource Guide¶
This appendix provides curated resources for readers seeking deeper knowledge in open source security and software supply chain security. Resources are organized by category and annotated to help you identify the most relevant materials for your needs.
Essential Reading¶
Books¶
Building Secure and Reliable Systems by Heather Adkins et al. (O'Reilly, 2020)1 Written by Google security and SRE professionals, this book bridges the gap between security and reliability engineering. Freely available online, it offers practical guidance on integrating security throughout the software lifecycle.
Software Transparency: Supply Chain Security in an Era of a Software-Driven Society by Chris Hughes and Tony Turner (Wiley, 2022)2 A comprehensive treatment of software supply chain security with particular emphasis on SBOMs, policy frameworks, and organizational implementation strategies.
Threat Modeling: Designing for Security by Adam Shostack (Wiley, 2014)3 The definitive guide to threat modeling methodology. Essential reading for anyone designing secure systems or evaluating the security posture of software projects.
The Art of Software Security Assessment by Mark Dowd, John McDonald, and Justin Schuh (Addison-Wesley, 2006)4 Though focused on vulnerability discovery, this comprehensive text provides deep understanding of how software vulnerabilities arise—essential context for supply chain security practitioners.
Hacking Kubernetes by Andrew Martin and Michael Hausenblas (O'Reilly, 2021)5 Covers security considerations for containerized environments and Kubernetes, including supply chain concerns specific to cloud-native infrastructure.
Alice and Bob Learn Application Security by Tanya Janca (Wiley, 2020)6 An accessible introduction to application security that covers secure development practices, making it suitable for developers new to security concepts.
Practical Binary Analysis by Dennis Andriesse (No Starch Press, 2018)7 For readers interested in understanding binary-level security analysis, this book covers disassembly, instrumentation, and analysis techniques relevant to verifying software artifacts.
Foundational Papers¶
"Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks" by Marc Ohm et al. (2020)8 A systematic taxonomy of software supply chain attacks against open source ecosystems. Essential reading for understanding the threat landscape.
"in-toto: Providing farm-to-table guarantees for bits and bytes" by Santiago Torres-Arias et al. (USENIX Security 2019)9 The foundational paper describing the in-toto framework for supply chain integrity, explaining its cryptographic attestation model.
"Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies" by Alex Birsan (2021)10 The original disclosure of the dependency confusion attack vector. Required reading for understanding this critical vulnerability class.
"An Empirical Study of Malicious Code in PyPI Ecosystem" by Ruian Duan et al. (ASE 2020)11 Research analyzing malicious packages in the Python ecosystem, providing data-driven insights into attack patterns and detection approaches.
"A Look at the Security of npm" by Markus Zimmermann et al. (2019)12 Comprehensive security analysis of the npm ecosystem examining maintainer practices, vulnerability propagation, and security risks.
"Reproducible Builds: Increasing the Integrity of Software Supply Chains" by Chris Lamb and Stefano Zacchiroli (IEEE Software 2022)13 Academic treatment of reproducible builds, explaining why they matter and the technical challenges involved in achieving them.
"World of Code: An Infrastructure for Mining the Universe of Open Source VCS Data" by Yuxing Ma et al. (MSR 2019)14 Describes infrastructure for large-scale analysis of open source code, relevant for understanding ecosystem-wide security research methodologies.
"Research Directions in Software Supply Chain Security" by Hasan et al. (ACM TOSEM 2025)15 Peer-reviewed survey identifying research gaps and future directions in supply chain security, providing scholarly foundation for the discipline.
"SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties" by Ladisa et al. (arXiv 2024)16 Systematization of Knowledge paper proposing a framework of four attack stages and three security properties (transparency, validity, separation) for evaluating supply chain defenses.
Key Industry Reports¶
Sonatype State of the Software Supply Chain Report (Annual)17 Comprehensive annual report tracking supply chain attacks, open source consumption trends, and security metrics across major ecosystems.
Snyk State of Open Source Security Report (Annual)18 Data-driven analysis of vulnerability trends, fixing times, and security practices across open source projects.
OpenSSF Scorecard Report19 Periodic reports analyzing security practices across open source projects using the Scorecard framework.
CISA Secure Software Development Framework (SSDF)20 NIST Special Publication 800-218 providing a core set of secure development practices that form the basis for many organizational policies.
CISA Software Bill of Materials (SBOM) Resources21 Official U.S. government guidance on SBOM implementation, including minimum element requirements and sharing practices.
Linux Foundation Census Reports22 Research identifying the most critical open source packages, informing where security investments should be prioritized.
CNCF Software Supply Chain Best Practices White Paper v2 (November 2024)74 Updated guidance from CNCF TAG Security on supply chain security best practices, including persona-based recommendations for developers, operators, and security teams. Referenced by NIST SSDF.
Synopsys Open Source Security and Risk Analysis (OSSRA) Report (Annual)23 Analysis based on audits of commercial codebases, revealing open source usage patterns and risk exposure.
Key Organizations¶
Standards and Coordination Bodies¶
Open Source Security Foundation (OpenSSF)24 The primary cross-industry initiative for improving open source security. Hosts working groups on vulnerability disclosure, supply chain integrity, security tooling, and education. Essential for anyone working in this space.
Cybersecurity and Infrastructure Security Agency (CISA)25 U.S. federal agency providing guidance, alerts, and coordination for software security. Key source for government policy and requirements.
MITRE Corporation26 Operates CVE, CWE, ATT&CK, and other foundational security resources. Understanding MITRE's frameworks is essential for security practitioners.
Forum of Incident Response and Security Teams (FIRST)27 Global forum for incident response teams that maintains CVSS and promotes coordinated vulnerability disclosure practices.
Internet Engineering Task Force (IETF)28 Develops internet standards including security protocols relevant to software distribution and verification.
Open Source Foundations¶
Linux Foundation29 Hosts numerous critical projects including the Linux kernel, Kubernetes, and many supply chain security initiatives including Sigstore and SPDX.
Apache Software Foundation30 Stewards over 350 open source projects with established governance and security response processes. Their security model is worth studying.
Cloud Native Computing Foundation (CNCF)31 Hosts cloud-native projects including Kubernetes, in-toto, and Notary. Maintains security guidelines for cloud-native supply chains.
Open Web Application Security Project (OWASP)32 Produces security guidance, tools, and educational resources. Key projects include Dependency-Check, CycloneDX, and the Software Component Verification Standard.
Python Software Foundation33 Governs Python and PyPI, implementing security features like trusted publishing that serve as models for other ecosystems.
Rust Foundation34 Supports the Rust ecosystem, notable for its memory safety focus and crates.io security practices.
Tooling Reference¶
Software Composition Analysis (SCA)¶
OWASP Dependency-Check35 Open source tool that identifies project dependencies and checks for known vulnerabilities. Supports multiple languages and integrates with CI/CD systems.
Grype36 Fast, open source vulnerability scanner for container images and filesystems. Pairs well with Syft for SBOM generation.
Snyk37 Commercial platform (with free tier) for vulnerability scanning, license compliance, and dependency management across multiple ecosystems.
Dependabot38 GitHub-integrated tool that automatically creates pull requests to update vulnerable dependencies. Now part of GitHub's native security features.
Trivy39 Comprehensive scanner for vulnerabilities, misconfigurations, secrets, and SBOM generation in containers, filesystems, and repositories.
SBOM Generation and Management¶
Syft40 Powerful CLI tool for generating SBOMs from container images and filesystems. Supports SPDX, CycloneDX, and custom formats.
CycloneDX Tools41 Collection of tools for generating, validating, and managing CycloneDX SBOMs across various programming languages.
SPDX Tools42 Official tools for working with SPDX format SBOMs, including validators, converters, and generators.
SBOM Scorecard43 Tool for evaluating the quality and completeness of SBOMs against best practices.
Signing and Verification¶
Sigstore44 Free, open infrastructure for signing and verifying software artifacts. Includes Cosign, Fulcio, and Rekor components.
Cosign45 Tool for signing and verifying container images and other artifacts. Supports keyless signing via Sigstore.
The Update Framework (TUF)46 Framework for securing software update systems against various attack types. Used by PyPI, RubyGems, and others.
Notary47 CNCF project implementing TUF for container image signing and verification.
Supply Chain Security Frameworks¶
SLSA Tools48 Generators and verifiers for SLSA provenance, with GitHub Actions integration.
OpenSSF Scorecard49 Automated tool that assesses open source project security practices against a defined set of checks.
in-toto50 Framework for generating and verifying supply chain metadata through cryptographic attestations.
OSS Gadget51 Microsoft's collection of tools for analyzing open source packages, including health metrics and security checks.
Static Analysis¶
CodeQL52 Semantic code analysis engine from GitHub. Query language enables sophisticated vulnerability detection. Free for open source.
Semgrep53 Fast, open source static analysis tool with an extensive rule library. Supports custom rule creation.
Capslock54 Capability analysis for Go, Rust, and Java. Maps what dependencies can access (files, network, exec) to enforce least privilege and detect supply chain anomalies.
SonarQube55 Platform for continuous code quality and security inspection. Community edition is free and open source.
Bandit56 Python-focused security linter that finds common security issues in Python code.
Fuzzing¶
OSS-Fuzz57 Google's continuous fuzzing service for critical open source projects. Provides infrastructure and integration support.
AFL++58 Community-maintained fork of American Fuzzy Lop with improved performance and features.
ClusterFuzz59 Scalable fuzzing infrastructure that powers OSS-Fuzz. Available for self-hosting.
Secret Detection¶
Gitleaks60 Fast, open source tool for detecting secrets in git repositories.
TruffleHog61 Scans repositories for high-entropy strings and known credential patterns.
detect-secrets62 Yelp's audited tool for preventing secrets from entering codebases.
Conferences and Community Events¶
Major Security Conferences¶
Black Hat63 Premier security conference featuring cutting-edge research presentations. Supply chain security tracks have grown significantly in recent years.
DEF CON64 Largest hacker convention with villages dedicated to specific security domains. Excellent for hands-on learning and community engagement.
RSA Conference65 Major enterprise security conference with significant vendor presence and policy discussions.
USENIX Security Symposium66 Academic security conference publishing peer-reviewed research, including foundational supply chain security papers.
Open Source and DevSecOps Events¶
Open Source Summit67 Linux Foundation's flagship event combining multiple conferences including Open Source Security Summit.
KubeCon + CloudNativeCon68 Premier cloud-native conference with extensive supply chain security content. Co-located events include SupplyChainSecurityCon.
SupplyChainSecurityCon69 Dedicated conference focusing specifically on software supply chain security topics.
OWASP Global AppSec70 Application security conference with strong focus on practical security implementation.
PackagingCon71 Conference dedicated to software package management, relevant for understanding ecosystem security.
Community Meetups and Working Groups¶
OpenSSF Working Groups72 Regular meetings of OpenSSF working groups are open to public participation. Excellent way to contribute to industry initiatives.
CNCF Security TAG73 Technical Advisory Group on security for cloud-native projects. Publishes guidance and reviews project security.
Package Manager Security Summits Informal gatherings of package manager maintainers to discuss shared security challenges. Watch OpenSSF announcements for scheduling.
Training and Certification Programs¶
Free Online Courses¶
OpenSSF Secure Software Development Fundamentals75 Free, self-paced course covering secure development practices. Provides certificate upon completion.
OpenSSF Developing Secure Software (LFD121)76 Comprehensive course on secure software development fundamentals offered through Linux Foundation.
OWASP Web Security Testing Guide77 While not a formal course, this comprehensive guide serves as an excellent self-study resource.
Google's Secure Coding Practices78 Collection of security guides and best practices from Google covering various platforms and languages.
Professional Certifications¶
Certified Secure Software Lifecycle Professional (CSSLP)79 ISC2 certification focused on incorporating security throughout the software lifecycle.
GIAC Secure Software Programmer (GSSP)80 SANS certification demonstrating secure coding competency in specific languages.
Certified Kubernetes Security Specialist (CKS)81 Linux Foundation certification covering Kubernetes security including supply chain considerations.
Paid Training Programs¶
SANS Secure Coding Courses82 Industry-recognized training covering secure development across multiple languages and platforms.
Linux Foundation Security Training83 Various courses on container security, Kubernetes security, and secure development practices.
Newsletters, Blogs, and Ongoing Learning¶
Newsletters¶
tl;dr sec84 Weekly newsletter curating security content with excellent coverage of supply chain security topics. Highly recommended.
This Week in Security85 Weekly security news roundup covering vulnerabilities, incidents, and industry developments.
Risky Business86 Security news podcast with excellent analysis of significant security events.
Software Supply Chain Security Newsletter87 Focused specifically on supply chain security news and developments.
Blogs and Publications¶
OpenSSF Blog88 Official blog covering OpenSSF initiatives, research, and community updates.
Trail of Bits Blog89 Technical security research from a leading security firm. Frequently covers supply chain topics.
Google Security Blog90 Official Google security blog with announcements about SLSA, Sigstore, and other initiatives.
Chainguard Blog91 Focused on supply chain security, container security, and Sigstore ecosystem.
Socket.dev Blog92 Analysis of supply chain attacks and package security across ecosystems.
Snyk Blog93 Regular vulnerability analyses, security research, and best practice guides.
Vulnerability Databases and Feeds¶
National Vulnerability Database (NVD)94 Official U.S. government repository of CVE data with CVSS scores and analysis.
GitHub Advisory Database95 Curated database of security advisories with direct links to affected packages.
OSV (Open Source Vulnerabilities)96 Google-maintained vulnerability database with API access and ecosystem coverage.
VulnDB97 Commercial vulnerability intelligence with broader coverage than NVD alone.
Resources in this guide were verified as of the publication date. For the most current links and additional resources, visit the book's companion website or the OpenSSF resource collection.
-
Google, "Building Secure and Reliable Systems," 2020, https://sre.google/books/building-secure-reliable-systems/ ↩
-
Wiley, "Software Transparency: Supply Chain Security in an Era of a Software-Driven Society," 2022, https://www.wiley.com/en-us/Software+Transparency-p-9781119986362 ↩
-
Adam Shostack, "Threat Modeling: Designing for Security," 2014, https://shostack.org/books/threat-modeling-book ↩
-
Pearson, "The Art of Software Security Assessment," 2006, https://www.pearson.com/en-us/subject-catalog/p/art-of-software-security-assessment-the-identifying-and-preventing-software-vulnerabilities/P200000009486 ↩
-
O'Reilly, "Hacking Kubernetes," 2021, https://www.oreilly.com/library/view/hacking-kubernetes/9781492081722/ ↩
-
Wiley, "Alice and Bob Learn Application Security," 2020, https://www.wiley.com/en-us/Alice+and+Bob+Learn+Application+Security-p-9781119687405 ↩
-
No Starch Press, "Practical Binary Analysis," 2018, https://nostarch.com/binaryanalysis ↩
-
Marc Ohm et al., "Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks," 2020, https://arxiv.org/abs/2005.09535 ↩
-
Santiago Torres-Arias et al., "in-toto: Providing farm-to-table guarantees for bits and bytes," USENIX Security 2019, https://www.usenix.org/conference/usenixsecurity19/presentation/torres-arias ↩
-
Alex Birsan, "Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies," 2021, https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 ↩
-
Ruian Duan et al., "An Empirical Study of Malicious Code in PyPI Ecosystem," ASE 2020, https://arxiv.org/abs/2309.11021 ↩
-
Markus Zimmermann et al., "A Look at the Security of npm," 2019, https://arxiv.org/abs/1902.09217 ↩
-
Chris Lamb and Stefano Zacchiroli, "Reproducible Builds: Increasing the Integrity of Software Supply Chains," IEEE Software 2022, https://arxiv.org/abs/2104.06020 ↩
-
Yuxing Ma et al., "World of Code: An Infrastructure for Mining the Universe of Open Source VCS Data," MSR 2019, https://arxiv.org/abs/1906.07083 ↩
-
Hasan et al., "Research Directions in Software Supply Chain Security," ACM TOSEM, 2025, https://dl.acm.org/doi/abs/10.1145/3714464 ↩
-
Ladisa et al., "SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties," arXiv:2406.10109, 2024, https://arxiv.org/abs/2406.10109 ↩
-
Sonatype, "State of the Software Supply Chain Report," https://www.sonatype.com/state-of-the-software-supply-chain ↩
-
Snyk, "State of Open Source Security Report," https://snyk.io/reports/open-source-security/ ↩
-
OpenSSF, "OpenSSF Blog," https://openssf.org/blog/ ↩
-
NIST, "Secure Software Development Framework (SSDF)," https://csrc.nist.gov/Projects/ssdf ↩
-
CISA, "Software Bill of Materials (SBOM)," https://www.cisa.gov/sbom ↩
-
Linux Foundation, "Research," https://www.linuxfoundation.org/research ↩
-
Synopsys, "Open Source Security and Risk Analysis (OSSRA) Report," https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html ↩
-
Open Source Security Foundation, "OpenSSF," https://openssf.org ↩
-
CISA, "Cybersecurity and Infrastructure Security Agency," https://www.cisa.gov ↩
-
MITRE, "MITRE Corporation," https://www.mitre.org ↩
-
FIRST, "Forum of Incident Response and Security Teams," https://www.first.org ↩
-
IETF, "Internet Engineering Task Force," https://www.ietf.org ↩
-
Linux Foundation, "Linux Foundation," https://www.linuxfoundation.org ↩
-
Apache Software Foundation, "Apache Software Foundation," https://www.apache.org ↩
-
CNCF, "Cloud Native Computing Foundation," https://www.cncf.io ↩
-
OWASP, "Open Web Application Security Project," https://owasp.org ↩
-
Python Software Foundation, "Python Software Foundation," https://www.python.org/psf/ ↩
-
Rust Foundation, "Rust Foundation," https://foundation.rust-lang.org ↩
-
OWASP, "OWASP Dependency-Check," https://owasp.org/www-project-dependency-check/ ↩
-
Anchore, "Grype," https://github.com/anchore/grype ↩
-
Snyk, "Snyk," https://snyk.io ↩
-
GitHub, "Dependabot," https://github.com/dependabot ↩
-
Aqua Security, "Trivy," https://github.com/aquasecurity/trivy ↩
-
Anchore, "Syft," https://github.com/anchore/syft ↩
-
CycloneDX, "CycloneDX Tool Center," https://cyclonedx.org/tool-center/ ↩
-
SPDX, "SPDX Tools," https://spdx.dev/tools/ ↩
-
eBay, "SBOM Scorecard," https://github.com/eBay/sbom-scorecard ↩
-
Sigstore, "Sigstore," https://www.sigstore.dev ↩
-
Sigstore, "Cosign," https://github.com/sigstore/cosign ↩
-
TUF, "The Update Framework," https://theupdateframework.io ↩
-
Notary Project, "Notary," https://github.com/notaryproject/notary ↩
-
SLSA, "SLSA Get Started," https://slsa.dev/get-started ↩
-
OpenSSF, "Security Scorecards," https://securityscorecards.dev ↩
-
in-toto, "in-toto," https://in-toto.io ↩
-
Microsoft, "OSS Gadget," https://github.com/microsoft/OSSGadget ↩
-
GitHub, "CodeQL," https://codeql.github.com ↩
-
Semgrep, "Semgrep," https://semgrep.dev ↩
-
Capslock Project, https://capslock-project.github.io ↩
-
SonarSource, "SonarQube," https://www.sonarqube.org ↩
-
Bandit, "Bandit," https://bandit.readthedocs.io ↩
-
Google, "OSS-Fuzz," https://google.github.io/oss-fuzz/ ↩
-
AFL++, "AFL++," https://aflplus.plus ↩
-
Google, "ClusterFuzz," https://google.github.io/clusterfuzz/ ↩
-
Gitleaks, "Gitleaks," https://github.com/gitleaks/gitleaks ↩
-
Truffle Security, "TruffleHog," https://github.com/trufflesecurity/trufflehog ↩
-
Yelp, "detect-secrets," https://github.com/Yelp/detect-secrets ↩
-
Black Hat, "Black Hat," https://www.blackhat.com ↩
-
DEF CON, "DEF CON," https://defcon.org ↩
-
RSA Conference, "RSA Conference," https://www.rsaconference.com ↩
-
USENIX, "USENIX Conferences," https://www.usenix.org/conferences ↩
-
Linux Foundation, "Linux Foundation Events," https://events.linuxfoundation.org ↩
-
Linux Foundation, "KubeCon + CloudNativeCon," https://events.linuxfoundation.org/kubecon-cloudnativecon-north-america/ ↩
-
Linux Foundation, "SupplyChainSecurityCon," https://events.linuxfoundation.org ↩
-
OWASP, "OWASP Events," https://owasp.org/events/ ↩
-
PackagingCon, "PackagingCon," https://packaging-con.org ↩
-
OpenSSF, "OpenSSF Community," https://openssf.org/community/ ↩
-
CNCF, "CNCF Security TAG," https://github.com/cncf/tag-security ↩
-
CNCF TAG Security, "Software Supply Chain Best Practices v2," November 2024, https://tag-security.cncf.io/blog/software-supply-chain-security-best-practices-v2/ ↩
-
OpenSSF, "OpenSSF Training Courses," https://openssf.org/training/courses/ ↩
-
Linux Foundation, "Developing Secure Software (LFD121)," https://training.linuxfoundation.org/training/developing-secure-software-lfd121/ ↩
-
OWASP, "Web Security Testing Guide," https://owasp.org/www-project-web-security-testing-guide/ ↩
-
Google, "Google Developers Security," https://developers.google.com/security ↩
-
ISC2, "Certified Secure Software Lifecycle Professional (CSSLP)," https://www.isc2.org/Certifications/CSSLP ↩
-
GIAC, "GIAC Secure Software Programmer," https://www.giac.org/certifications/secure-software-programmer-java-gssp-java/ ↩
-
Linux Foundation, "Certified Kubernetes Security Specialist (CKS)," https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/ ↩
-
SANS, "Secure Software Development Courses," https://www.sans.org/cyber-security-courses/?focus-area=secure-software-development ↩
-
Linux Foundation, "Linux Foundation Training," https://training.linuxfoundation.org/training/ ↩
-
tl;dr sec, "tl;dr sec Newsletter," https://tldrsec.com ↩
-
Teleport, "This Week in Security," https://this.teleport.com/thisweekin/ ↩
-
Risky Business, "Risky Business," https://risky.biz ↩
-
SCSC News, "Software Supply Chain Security Newsletter," https://scscnews.com ↩
-
OpenSSF, "OpenSSF Blog," https://openssf.org/blog/ ↩
-
Trail of Bits, "Trail of Bits Blog," https://blog.trailofbits.com ↩
-
Google, "Google Security Blog," https://security.googleblog.com ↩
-
Chainguard, "Chainguard Blog," https://www.chainguard.dev/unchained ↩
-
Socket, "Socket.dev Blog," https://socket.dev/blog ↩
-
Snyk, "Snyk Blog," https://snyk.io/blog/ ↩
-
NIST, "National Vulnerability Database," https://nvd.nist.gov ↩
-
GitHub, "GitHub Advisory Database," https://github.com/advisories ↩
-
Google, "Open Source Vulnerabilities (OSV)," https://osv.dev ↩
-
Flashpoint, "VulnDB," https://vulndb.cyberriskanalytics.com ↩