Produce Well-Secured Software (PW) CI/CD Steps

Produce Well-Secured Software (PW)

PW.4.1 Acquire and Maintain Well-secured Software

Ensure safe use of components (e.g., software libraries, modules, middleware, frameworks) from commercial, open-source, and other third-party developers for use by the organization’s software. Implement a Software Bill of Materials (SBOM) scan to obtain provenance information for each software component. Establish one or more software repositories to host sanctioned and vetted open-source components.

Open-Source Tools to Achieve:

SBOM Generation and Attestation Tools:

Binary Repositories:

Git Commit Signing:

Repo Security Scanning

PW.7 Review and/or Analyze Human-Readable Code

Help identify vulnerabilities so that they can be corrected before the software is released to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities. Human-readable code includes source code, scripts, and any other form of code that an organization deems human-readable.

Open-Source Tools to Achieve:



Last modified March 18, 2025