array(11) { ["id"]=> int(6) ["order"]=> int(0) ["slug"]=> string(2) "en" ["locale"]=> string(5) "en-US" ["name"]=> string(7) "English" ["url"]=> string(85) "https://www.incredibuild.com/glossary/supply-chain-levels-for-software-artifacts-slsa" ["flag"]=> string(98) "https://www.incredibuild.com/wp-content/plugins/polylang-pro/vendor/wpsyntex/polylang/flags/us.png" ["current_lang"]=> bool(true) ["no_translation"]=> bool(false) ["classes"]=> array(5) { [0]=> string(9) "lang-item" [1]=> string(11) "lang-item-6" [2]=> string(12) "lang-item-en" [3]=> string(12) "current-lang" [4]=> string(15) "lang-item-first" } ["link_classes"]=> array(0) { } }

Supply-chain Levels for Software Artifacts (SLSA)

Supply-chain Levels for Software Artifacts, or SLSA (pronounced “salsa”), is a security framework—a check-list of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure in your projects.

What is SLSA?

SLSA is a set of incrementally adoptable security guidelines established by industry experts to step-change the security of the software supply chain. It provides a common language for software producers and consumers to communicate about the security posture of software artifacts.

The framework is organized into “levels” that provide increasing software supply chain security guarantees. This helps organizations defend against common attacks, such as source code manipulation or unauthorized build modifications.

Why Should Companies Focus on SLSA?

As software supply chain attacks (like the SolarWinds or Log4j incidents) become more frequent, companies must prove that their software hasn’t been tampered with. SLSA provides a roadmap for securing the build process from source to deployment.

By following SLSA, companies can automate the generation of “provenance”—metadata that proves where, when, and how a piece of software was built. This builds trust with customers and partners who want to ensure the software they are installing is authentic.

Key Features of SLSA

  • Levels (1-4): A graduated approach where Level 1 provides basic build documentation and Level 4 provides the highest level of confidence and tamper-resistance.
  • Provenance: Verifiable metadata about how an artifact was built.
  • Isolated Builds: Ensuring the build environment is secure and doesn’t have “memory” of previous builds.
  • Common Vocabulary: A shared standard for developers, security professionals, and consumers.
  • Tamper-proof Evidence: Cryptographically signed records of the build process.

When to Implement SLSA

Securing the supply chain is an ongoing effort that should be integrated into your CI/CD strategy:

  • During Build Setup: When configuring your build pipelines, aim for SLSA Level 1 by ensuring the build process is scripted and produces provenance.
  • Before Choosing Dependencies: Use SLSA levels to evaluate the security of third-party libraries you are integrating into your product.
  • When Scaling Infrastructure: As your build farm grows, implement isolated and ephemeral build environments to reach higher SLSA levels.
  • During Security Audits: Use the SLSA framework as a benchmark to identify gaps in your software delivery pipeline.

Strengthen your software supply chain by accelerating secure builds with Incredibuild.

What is “provenance” in SLSA?

Provenance is a record that shows the origin of an artifact, including the build system used and the source code it was derived from.

How does SLSA relate to SBOMs?

While an SBOM (Software Bill of Materials) tells you what is in the software, SLSA tells you how it was built and if it was handled securely.

Is SLSA mandatory?

While not a law, it is becoming a de facto standard for government contractors and high-security industries.

Never run
anything twice