Skip to content

Latest commit

History

History
117 lines (70 loc) 路 5.09 KB

PUBLICATIONS.md

File metadata and controls

117 lines (70 loc) 路 5.09 KB

TAG Security Publications

This document lists all the publications and resources that TAG Security has produced.

Cloud Native Security Controls Catalog

Mapping of Cloud Native Security Whitepaper and Software Supply Chain Best Practices Paper to NIST SP800-53r5

Cloud Native Security Lexicon

Standardization of terminologies specific to Cloud Native Security

Cloud Native Security Whitepaper

The Cloud Native Security Whitepaper (CNSWP) is a TAG Security effort to ensure the cloud native community has access to information about building, distributing, deploying, and running secure cloud native capabilities.

Translations

Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security

A comprehensive guide dedicated to assessing and understanding the security of open source software projects. The book is the culmination of five years of TAG Secure Assessments, practical insights, and collaborative effort from experts in the field. Our goal? To empower you with the knowledge and skills to enhance the security of the cloud native ecosystem, the projects, and their use in your organization鈥檚 platforms.

Policy

Formal Verification for Policy Configurations

Handling build-time dependency vulnerabilities

Secure Defaults: Cloud Native 8

Security Assessments

TAG Security has conducted security assessments of several CNCF projects. These assessments are available to the public.

Supply Chain Security

Software Supply Chain Best Practices

The Software Supply Chain Security Paper is a TAG Security effort to ensure the cloud native community has access to information about building, distributing, deploying, and running secure software supply chains.

Evaluating your supply chain security

A framework for supply chain evaluation

Secure Software Factory

A reference architecture for securing the software supply chain

Catalog of Supply Chain Compromises

A catalog of supply chain compromises and links to relevant articles discussing them

Use Cases & Personas

List of use cases to enable secure access, policy control and safety for users of cloud native technology