You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update the Supply Chain Best Practices whitepaper link (#1463)
* Update the Supply Chain Best Practices whitepaper link
v2 is now available!
Signed-off-by: Ben Cotton <[email protected]>
* Reorder by descending date
Signed-off-by: Ben Cotton <[email protected]>
---------
Signed-off-by: Ben Cotton <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+8-8
Original file line number
Diff line number
Diff line change
@@ -26,19 +26,19 @@ We aim to significantly reduce the probability and impact of attacks, breaches,
26
26
27
27
Below is a list of publications by TAG Security. For a comprehensive collection of our works in various formats, please visit the [publications](community/publications/README.md) directory.
28
28
29
-
| Publication |Date|
29
+
| Publication |Latest Release|
30
30
|-------------|------|
31
-
|[Formal Verification for Policy Configurations](community/working-groups/archive/policy/overview-policy-formal-verification.md)| August, 2019 |
32
31
|[Catalog of Supply Chain Compromises](community/catalog/compromises)| November 2019 - Present |
33
-
|[Software Supply Chain Best Practices](community/working-groups/supply-chain-security/supply-chain-security-paper/CNCF_SSCP_v1.pdf)| May, 2021 |
34
-
|[Evaluating your Supply Chain Security](community/working-groups/supply-chain-security/supply-chain-security-paper/secure-supply-chain-assessment.md)| May, 2021 |
|[Cloud Native Security Whitepaper](community/resources/security-whitepaper/v2/CNCF_cloud-native-security-whitepaper-May2022-v2.pdf)| May, 2022 |
37
-
|[Cloud Native Security Controls Catalog](community/working-groups/archive/controls/phase-one-announcement.md)| May, 2022 |
32
+
|[Software Supply Chain Best Practices](community/working-groups/supply-chain-security/supply-chain-security-paper-v2/Software_Supply_Chain_Practices_whitepaper_v2.pdf)| March, 2025 |
33
+
|[Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security](community/assessments/Open_and_Secure.pdf)| November, 2023 |
|[Secure Software Factory: A Reference Architecture to Securing the Software Supply Chain](community/working-groups/supply-chain-security/secure-software-factory/Secure_Software_Factory_Whitepaper.pdf)| May, 2022 |
36
+
|[Cloud Native Security Controls Catalog](community/working-groups/archive/controls/phase-one-announcement.md)| May, 2022 |
37
+
|[Cloud Native Security Whitepaper](community/resources/security-whitepaper/v2/CNCF_cloud-native-security-whitepaper-May2022-v2.pdf)| May, 2022 |
|[Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security](community/assessments/Open_and_Secure.pdf)| November, 2023 |
|[Evaluating your Supply Chain Security](community/working-groups/supply-chain-security/supply-chain-security-paper/secure-supply-chain-assessment.md)| May, 2021 |
41
+
|[Formal Verification for Policy Configurations](community/working-groups/archive/policy/overview-policy-formal-verification.md)| August, 2019 |
0 commit comments