Skip to content

Commit

Permalink
Merge branch 'slsa-framework:main' into main
Browse files Browse the repository at this point in the history
  • Loading branch information
chtiangg committed Jun 7, 2023
2 parents 1d8ba77 + a0da408 commit ad8ddc2
Show file tree
Hide file tree
Showing 2 changed files with 18 additions and 1 deletion.
17 changes: 17 additions & 0 deletions docs/spec/v1.0/faq.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,23 @@ A build service is a hosted build platform that is often run on shared infrastru
instead of individuals' machines and workstations. Its use has also been replaced outside
of the requirements as it relates to the build platform.

## Q: Is SLSA the same as TACOS?

No.
[Trusted Attestation and Compliance for Open Source (TACOS)](https://github.com/tacosframework)
is a framework authored by Tidelift.
Per their website, TACOS is a framework
"for assessing the development practices of open source projects
against a set of secure development standards specified by the (US)
NIST Secure Software Development Framework (SSDF) V1.1" which
"vendors can use to provide self-attestation for the open source components
they rely on."

In contrast, SLSA is a community-developed framework---including
adoptable guidelines for securing a software supply chain and
mechanism to evaluate the trustworthiness of artifacts you consume---that
is part of the Open Source Security Foundation (OpenSSF).

## Q: How does SLSA and SLSA Provenance relate to SBOM?

[Software Bill of Materials (SBOM)] are a frequently recommended tool for
Expand Down
2 changes: 1 addition & 1 deletion docs/spec/v1.0/principles.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ expensive manual work, and each trusted platform expands the attack surface of t
supply chain. Verifying that an artifact is produced by a trusted platform,
though, is easy to automate.

To simultaniously scale and reduce attack surfaces, it is most efficient to trust a limited
To simultaneously scale and reduce attack surfaces, it is most efficient to trust a limited
numbers of platforms and then automate verification of the artifacts produced by those platforms.
The attack surface and work to establish trust does not scale with the number of artifacts produced,
as happens when artifacts each use a different trusted platform.
Expand Down

0 comments on commit ad8ddc2

Please sign in to comment.