Completed
Demo: Untrusted log
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Lessons Learned from Automating SLSA-Compliance Evaluation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda Storyline
- 3 SLSA Overview
- 4 Provenance: Evidence Based Trust
- 5 Our Pipelines
- 6 Pipeline Dynamics
- 7 First Steps: SLSA L1
- 8 No Brainer
- 9 The Requirements
- 10 Compliance
- 11 Provenance Authenticity Options
- 12 Sample log files
- 13 Anecdote: Not All Logs Created Equal
- 14 Anecdote: Logs and Immutable Reference
- 15 SLSA L1+L2 Evaluation Automation
- 16 Source-Verified
- 17 SLSA Source - Retained Indefinitely Req.
- 18 SLSA L3 Source Reqs Options
- 19 SLSA L3 Ephemeral & Isolation Challenge
- 20 Implementing SLSA L3 Ephemeral & Isolation
- 21 Evaluation of Ephemeral & Isolation Reqs.
- 22 SLSA L3 - Provenance - Non-Falsifiable
- 23 Demo: Untrusted log
- 24 Unfalsifiable Provenance
- 25 Build Parameterless & Hermetic
- 26 Defeated by SLSA L4
- 27 Takeaways