D.2.2 Build process monitoring
Control Details
Objective
Detect intruders in the build infrastructure
Definition
Do you monitor the build chain for unauthorized access and modifications? Have you completed an attack surface investigation of your build environment? What kinds of actions do you take to narrow the attack vectors?
Assessment Questions
- How do you monitor the build chain for unauthorized access and modifications?
- How recently have you completed an attack surface investigation of your build environment?
- What kinds of actions do you take to narrow the attack vectors?
Reference sources
- CNCF-SSC BP-V Validate runtime security of build workers SC-SA Use short-lived/ephemeral credentials for machine/service access A-CE Use a container registry that supports OCI image-spec images