System Design Space
Knowledge graphSettings

Updated: March 24, 2026 at 3:10 PM

Supply Chain Security

medium

Software supply chain protection: SBOM, dependency hygiene, CI/CD hardening, artifact signing and provenance verification.

Software supply chain becomes an architectural concern the moment third-party code gets the right to be built, signed, and executed inside your environment.

The chapter ties SBOMs, dependency hygiene, hardened CI/CD, artifact signing, and provenance verification into one defensive line that reduces the chance of importing risk through the build and delivery path.

In interviews, it helps you talk about trust in artifacts, third-party risk, compromised pipeline scenarios, and visibility into system contents as architecture concerns rather than as AppSec process alone.

Practical value of this chapter

Design in practice

Use guidance on software supply-chain security and build/delivery controls to define architectural security requirements before implementation starts.

Decision quality

Validate solutions through threat model, security invariants, and production control operability, not compliance checklists alone.

Interview articulation

Frame answers as threat -> control -> residual risk, linking business scenario to concrete protection mechanisms.

Trade-off framing

Make trade-offs explicit for software supply-chain security and build/delivery controls: UX friction, latency overhead, operational cost, and compliance constraints.

Context

Secrets Management Patterns

Supply chain security begins with secure pipeline credentials and isolated trust boundaries.

Open chapter

Supply Chain Security protects the path from source code to runtime. The main idea: trust only verifiable artifacts and automate checks at each stage of delivery, so that compromise of one step does not lead to a system incident.

Supply chain layers and controls

Source & dependencies

Dependency pinning, allow-lists, vulnerability scanning, signed commits/tags, branch protection.

Build & CI/CD

Ephemeral runners, least-privileged CI tokens, isolated build steps, provenance generation.

Artifacts & registries

Artifact signing, immutable registries, SBOM publication, policy checks before promotion.

Deploy & runtime

Admission policies, image signature verification, runtime detection and fast rollback.

Key practices

  • Maintain SBOM for key services and check it against real artifacts in production.
  • Sign containers/binaries and verify signatures at the deploy stage.
  • Enter provenance/attestation for the build pipeline (who, with what and when assembled the artifact).
  • Minimize the blast radius of CI secrets: short-lived tokens, scoped credentials, separate trust zones.
  • Perform regular dependency hygiene and patch windows based on CVE severity.

Typical threat scenarios

Compromised upstream dependency

Risk: Malicious code from a third-party package reaches production.

Mitigation: Dependency pinning, supplier allow-lists, provenance checks, and fast version eviction from release.

Artifact substitution in registry

Risk: A binary/image different from the reviewed one gets deployed.

Mitigation: Mandatory artifact signing, immutable tags/digests, and deploy-time verification policies.

CI runner or token takeover

Risk: An attacker can produce a legitimate-looking but malicious build.

Mitigation: Ephemeral runners, scoped short-lived tokens, isolated trust zones, and separated secret channels.

Release automation compromise

Risk: Policy gates are bypassed and unchecked artifacts are promoted.

Mitigation: Mandatory gates, auditable trails, and four-eyes approval for critical promotion actions.

Pipeline policy gates by stage

StageMandatory checksAction on failure
Commit / Merge RequestSigned commits, mandatory review, SAST and license checks.Block merge and open a security ticket with an accountable owner.
BuildReproducible build, SBOM generation, provenance/attestation.Stop pipeline and prevent artifact publication to registry.
Artifact RegistrySignature required, immutable digest/tag, critical CVE policy.Quarantine artifact and block promotion to release candidate.
DeployAdmission policy, signature verification, provenance verification.Deployment is rejected automatically and service stays on previous version.
RuntimeIntegrity monitoring, anomaly detection, rollback readiness.Execute containment playbook, rollback, and revoke compromised credentials.

Operational metrics

Signed artifact coverage

Target: >= 95%

Shows how much of release candidates actually flow through a trusted supply chain.

SBOM coverage for critical services

Target: 100%

Without SBOM coverage, blast-radius analysis for new CVEs is too slow.

MTTR for supply chain incidents

Target: < 2 hours

Limits the exposure window of compromised artifacts in production.

Critical CVE response time

Target: < 24 hours

Reflects whether dependency hygiene and patch windows work in practice.

Validation

Testing Distributed Systems

Security drills and compromise simulations are just as important as functional tests.

Open chapter

Maturity model

Each level adds new control mechanisms. Skipping steps is risky: sudden leaps in maturity usually break down on operational details.
1

Level 1: Visibility

Inventory of dependencies and artifacts, basic vulnerabilities scan, supply chain owners.

2

Level 2: Control

Policy gates in CI/CD, mandatory code review, artifact immutability, secret hygiene.

3

Level 3: Verifiability

Signing + attestations + deploy-time verification, full traceability from commit to runtime.

4

Level 4: Resilience

Regular drills, compromise simulations, fast containment and rollback without manual chaos.

Rollout roadmap

1

Phase 1 (0-30 days)

Focus: Inventory and visibility

Outcome: Dependency catalog, baseline SBOM, ownership for critical supply chain paths.

2

Phase 2 (30-60 days)

Focus: Mandatory pipeline gates

Outcome: CI/CD policy gates and blocking of unsigned/unverified artifacts.

3

Phase 3 (60-90 days)

Focus: End-to-end verifiability

Outcome: Signing + attestation + deploy-time verification for all critical services.

4

Phase 4 (90+ days)

Focus: Operational resilience

Outcome: Regular drills, compromise simulations, and measurable SLOs for supply chain security.

Typical antipatterns

CI/CD with long-lived admin tokens without rights segmentation.

Production deployment of artifacts that do not have provenance and signature.

Using latest tags and unpinned dependencies in critical services.

The SBOM is created formally, but does not participate in release policies.

References

Related chapters

Enable tracking in Settings