The gaps that matter ● Authentication ○ optional controls are not actually controls ● Provenance ○ no guarantee that the package actually comes from the source ● Build ○ none of the registries enforce isolated build environments
4
Slide 5
The gaps that matter ● Authentication ○ optional controls are not actually controls ● Provenance ○ no guarantee that the package actually comes from the source ● Build ○ none of the registries enforce isolated build environments
Registries are not your security team. They are infrastructure.
5
Slide 6
AI amplifies the problem ● AI Assistants add dependencies automatically ● The last point of human friction has now disappeared ● What was already largely invisible is now even faster
6
Slide 7
2 in the morning… a maintainer is compromised a malicious package is published an automated « latest » build runs 7
Slide 8
AWS CodeArtifact: the preventive control ● Managed artefact repository service ● Compatible with npm, pip, Maven, NuGet, etc… ● Your tools, your workflow ● You decide what gets in
8
Slide 9
Control architecture
9
Slide 10
Three barriers ● Architectural isolation ○ your builds never talk to public registries ● Automated validation ○ every new version is scanned before a decision is made ● Explicit promotion ○ by default, nothing gets through (spoiler : version pinning)
10
Slide 11
Three barriers ● Architectural isolation ○ your builds never talk to public registries ● Automated validation ○ every new version is scanned before a decision is made ● Explicit promotion ○ by default, nothing gets through (spoiler : version pinning)
11
6 months later… malicious package published (oops) vulnerability in prod (OOPS) time to panic ?! 14
Slide 15
Six months later ● SCA « active » (Software Composition Analysis) ○ the vulnerable package is detected (service, version, CVE, etc.) ● IAST (Interactive Application Security Testing) ○ the exec path is detected and the impact is confirmed
15
Slide 16
Preventive vs. Detective ● Preventive : block before it gets in ○ CodeArtifact, SAST, SCA (static mode) ● Detective : know what’s already there — and act ○ SCA (active mode), IAST
16
Slide 17
ç
AWS et Datadog together = defence in depth
17
Slide 18
Where to start? ● Map your dependency graph — know what you’re building on ● Identify your source registries ● Establish a preventive control layer ● Ensure full production visibility
18
Slide 19
Where to start? ● Map your dependency graph — know what you’re building on ● Identify your source registries ● Establish a preventive control layer ● Ensure full production visibility
These are not four projects over six months. These are four steps you can start this very week!
19
Slide 20
Merci ! AWS CodeArtifact https://aws.amazon.com/codeartifact
Datadog Code Security https://docs.datadoghq.com/security/code_security
Our super interesting blog 😁 https://securitylabs.datadoghq.com 20