Slim.AI introduces beta software program provide chain container safety as a service

Austin, TX: We have been studying the onerous manner that, as Slim.AI CEO John Amaral places it, “Your software program provide chain is barely as safe as its weakest hyperlink. “Amen, brother!

Slim.AI CEO John Amaral

Slim.AI CEO John Amaral: “Our core worth is ‘Know Your Software program.’ “


Quite a few high-profile assaults, breaches, and exploits such because the SolarWinds fiasco and the Log4J vulnerability are prime examples. Certainly, it is gotten so dangerous, that President Joseph Biden issued an government order calling for us to all safe the software program provide chain. When politicians take note of software program, stuff has gotten actual.

Slim.AI is rising to this problem by saying at Open Supply Summit in Austin, Texas, its beta software program provide chain safety service. This service will assist organizations constantly and routinely optimize and safe their containers and decrease software program provide chain threat.

This service is being constructed on the muse of Slim.AI’s open-source venture, DockerSlim. This in style developer program optimizes and secures your containers by analyzing your code and throwing away pointless code, thus “slimming” down your containers’ assault floor. It might probably additionally cut back the dimensions of your container by as much as 30x.

That is spectacular. As Amaral mentioned, “ At present, tens of hundreds of builders and groups use Slim’s open supply and free SaaS software program to know what’s of their containers, cut back containers’ assault floor, take away vulnerabilities, and ship solely the code they want. “However, the open-source venture doesn’t scale. So with this new service, Amaril continued, “We’re shifting from serving to particular person builders and small groups to an answer that permits organizations to constantly and routinely obtain these outcomes at scale.”

That is being achieved by integrating the code with container registries, Steady Integration / Steady Deployment (CI / CD) pipelines, and instruments so you possibly can automate and combine it into present workflows to rapidly ship safe software program into manufacturing.

Present and deliberate integrations embody Docker, AWS ECR, Google GCR, GitHub, DigitalOcean, and Quay registries and the Jenkins, GitLab, and GitHub CI / CD platforms. Utility Programming Interfaces (APIs) s are additionally being made accessible to Early Entry Companions.

As well as, because of its APIs, the service lets you use a number of vulnerability scanners in your containers to search out safety issues earlier than they chunk you.

That is all a part of what Amaral calls “The 4 Ss of Software program Provide Chain Safety.

The excellent news concerning the open-source software program provide chain is, Amaral defined, “it is very easy for builders to include huge libraries of code into purposes, package deal that into containers, and ship to manufacturing with the clicking of a button. The code working in manufacturing is the kid of the large provide chain. ” The dangerous information is that “It bears the advantages and dangers of all the selections, contributions, options, and flaws manifested by its creators in combination.”

neither CodeNotarya software program provide chain firm, not too long ago noticed, “Software program is rarely full and the code base together with its dependencies is an at all times updating doc. That routinely means you must observe it, good and dangerous, holding in thoughts that one thing good can flip dangerous. “Sure, precisely so!

The reply, in line with Amaral, is to construct a complete, automated software program provide chain safety (SSCS) program: “The 4 Ss.” These are:

  1. Software program Invoice of Supplies: This can be a record of all of the elements in a bit of software program corresponding to open-source libraries and third-party elements. Properly-known SBOM approaches embody the Linux Basis’s Software program Package deal Information Trade (SPDX) and Provide chain Ranges for Software program Artifacts, or SLSA (salsa)

  2. Posts: Signing is a manner of digitally attaching a verified, immutable developer id to a bit of code. Coupled with different instruments, it permits for making a clear, cryptographically safe file of software program adjustments and manifests a everlasting, and dependable digital chain of custody for software program and associated artifacts. Sigstore and Notary.

  3. Slimming: This minimizes your manufacturing code footprint by eradicating pointless code. It additionally inherently reduces software program provide chain complexity, software program assault floor, and combination threat.

  4. Sharing: Nobody particular person or group can present a complete SSCS answer. Communication about SSCS and collaborating on options each inside your group and with different teams is crucial to advancing the business and defending our software-reliant international ecosystem. In terms of open-source safety, we’re all on this collectively.

At Slim, Amaral concluded, ‘Our core worth is’ Know Your Software program.’ Slim.AI’s instruments can be utilized alongside vulnerability scanners and SBOM mills to create a holistic view of the software program provide chain. ” With Slim’s optimization, you may make positive groups ship solely what they want for manufacturing.

Need to know extra? Contact the Slim.AI group for early entry. If you happen to’re at Open Supply Summit you possibly can go to the Slim.AI group and be taught extra about this system at Sales space B2.

Associated Tales:

Leave a Comment