It crossed my mind that many companies do not implement any policies or procedures to validate the authenticity and integrity of the software (packages, binaries, libraries, operating systems) they use in their products.
Do you or your company have a method of vetting third-party vendors and their code? Do you maintain a list of public keys for projects you trust? Do all of your developers meticulously validate that the software they are using is authentic and complete?
The answer is probably 'no', and by avoiding these steps, you might inadvertently expand your attack surface, introduce backdoors, and increase technical debt.
Even if you did want to validate the software you use, many companies wouldn't know where to start. Morever, taking the time to learn how to do this is tricky, unintuitive, and time-consuming, which is why I wrote the below article to help.
https://lnkd.in/g8X5-U_M
You will learn the dangers of untrusted code from real-world events, how to identify unauthentic and corrupted software, and how you can set yourself up to check for these things on a routine basis.
Validating the authenticity and integrity of software is not a catch-all and will not protect you from every risk associated with third-party software, but it is a foundational step you can take to save yourself from many forms of supply-chain attacks.
Stay safe out there!