Jetstack Consult​

Software Supply Chain Security

Every artifact in your software supply chain matters. Use our Assessment Toolkit to gauge the maturity of yours today.

Use our online Assessment Toolkit to gain insight and advice on your current build pipeline.

See where vulnerabilities exist and discover what you need to resolve them. The tool also consolidates recommendations and guidance from several existing frameworks and whitepapers—including SLSA and the CNCF—and it is presented in a form that offers clarity in an increasingly complex problem space.

The Assessment Toolkit is broken down into four key areas, grading potential action points based on priority and complexity.

  • Pipeline 02 White

    Build Pipelines​

    Secure automated processes and tooling used to build and package software components.​

  • Code 03 White

    Source Code

    Ensure authenticity and integrity of the software code used within your applications.​

  • Change Process 01 White

    Provenance​

    Publish the steps taken to build your software components.​

  • Crypto Agility 01 White

    Deployment​

    Enable consumers to verify your software’s integrity before deployment and use.

Version 1.0

The software supply chain toolkit

An interactive guide on how to secure your third-party software

Working with Venafi Jetstack Consult

While the items listed above provide a great place to start when considering your software supply chain security, this 52-point radar is by no means exhaustive. The world of software supply chains is constantly evolving, and we understand if you’re feeling overwhelmed.

Our Field Engineers and Solution Architects are the brains behind those action points, and they also created the hugely popular cert-manager project. They’d be more than happy to help your organization tailor the recommendations described above to better secure your third-party software.

Contact Venafi

Questions about software supply chain security? Reach out to our expert team.