Securing your supply chain
Lacework
APRIL 26, 2022
First is to ensure we have property identity management in place to control access to source code and enforce policies like password complexity and multi-factor authentication. Checks should be built into the SDLC to ensure malicious code hasn’t been inserted into the source code. We use this method every day when driving a vehicle.
Let's personalize your content