This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Secure Software Development Framework

Secure Software Development Framework Post Build CI/CD Steps

Achieving Post Deploy Tasks of the Secure Software Development Framework

The Secure Software Development Framework, developed by the National Institute of Standards and Technology (NIST), provides a comprehensive approach to ensuring security across the software development process, from initial design through deployment and maintenance. The framework outlines key practices and guidelines that organizations can implement to secure their software development lifecycle (SDLC), with a particular emphasis on integrating security into automated processes. This chapter focuses specifically on DevSecOps tooling and practices related to Post Deploy actions of the CI/CD pipeline to achieve:

Prepare the Organization (PO) Organizations should ensure that their people, processes, and technology are prepared to perform secure software development at the organization level. Many organizations will find some PO practices to also be applicable to subsets of their software development, like individual development groups or projects.
Protect the Software (PS) Organizations should protect all components of their software from tampering and unauthorized access.
Produce Well-Secured Software (PW) Organizations should produce well-secured software with minimal security vulnerabilities in its releases.
Respond to Vulnerabilities (RV) Organizations should identify residual vulnerabilities in their software releases and respond appropriately to address those vulnerabilities and prevent similar ones from occurring in the future.

1 - Protect the Organization (PO)

Protect the Organization (PO) Post Deployment CI/CD Steps

Protect the Organization (PO)

Organizations should ensure that their people, processes, and technology are prepared to perform secure software development at the organization level. Many organizations will find some PO practices to also be applicable to subsets of their software development, like individual development groups or projects.


PO.1 Define Security Requirements for Software Development: Ensure that security requirements for software development are known at all times so that they can be taken into account throughout the SDLC and duplication of effort can be minimized because the requirements information can be collected once and shared. This includes requirements from internal sources (e.g., the organization’s policies, business objectives, and risk management strategy) and external sources (e.g., applicable laws and regulations).


To satisfy SSDF PO.1 in a post-deployment context using open-source tools, the focus shifts from just defining to:

  • Maintaining and enforcing PO tasks in live systems.

  • Making task requirements visible and traceable across deployed environments.

  • Auditing and updating methods and procedures as internal and external policies change.


Tasks Tools

P.O.1.1: Identify and document all security requirements for the organization’s software development infrastructures and processes, and maintain the requirements over time.


PO.1.2 Identify and document all security requirements for organization-developed software to meet, and maintain the requirements over time.

Open Policy Agent

Supports definitions of security policies as code and enforce them in pipelines, CI/CD, and runtime. Enforces runtime policies via integrations with Kubernetes, Terraform, and CI/CD platforms.

InspecLog

Periodically audits deployed environments against internal and external security standards.

Ortelius Evidence Store

Associate and version security requirement metadata per service and deployment, enabling continuous visibility.

DefectDojo

Maps security findings back to specific policy controls or regulatory frameworks.

PO.2 Implement Roles and Responsibilities: Ensure that everyone inside and outside of the organization involved in the SDLC is prepared to perform their SDLC-related roles and responsibilities throughout the SDLC.


To satisfy SSDF PO.2 in a post-deployment context using open-source tools, the focus shifts to:

  • Defining and assigning roles for who is responsible for remediation and runtime configurations.

  • Maintaining evidence of what was deployed, who deployed it, and impact across all software assets.

  • Ensuring security and patch management with restricted post-deployment actions.


Tasks Tools

PO.2.1: Create new roles and alter responsibilities for existing roles as needed to encompass all parts of the SDLC. Periodically review and maintain the defined roles and responsibilities, updating them as needed.


PO.2.2: Provide role-based training for all personnel with responsibilities that contribute to secure development. Periodically review personnel proficiency and role-based training, and update the training as needed.


PO.2.3: Obtain upper management or authorizing official commitment to secure development, and convey that commitment to all with development related roles and responsibilities.

Git

Tracks authorship and code reviewers, and tags releases and documents who triggered them.

Ortelius Evidence Store

Associates deployed services with responsible individuals or teams, with historical record of changes, deployments and roles.

Backstage

Lists service owners, on-call teams and escalation paths making post-deployment responsibility transparent across the organization.

DefectDojo

Track security findings and assign resolution responsibilities.

Kubernetes RBAC / OPA Gatekeepr

Enforces access policies and role boundaries in runtime environments.

ArgoCD

Ensures only authorized commits/deployments affect production and logs every promotion and rollback.

Falco

Detects unauthorized activity at runtime.

Prometheus + Alertmanager

Alerts based on ownership/roles

PO.3 Implement Supporting Toolchains: Use automation to reduce human effort and improve the accuracy, reproducibility, usability, and comprehensiveness of security practices throughout the SDLC, as well as provide a way to document and demonstrate the use of these practices. Toolchains and tools may be used at different levels of the organization, such as organization-wide or project-specific, and may address a particular part of the SDLC, like a build pipeline.


To satisfy SSDF PO.3 in a post-deployment context using open-source tools, the focus shifts to:

  • Ensuring toolchains support vulnerability detection, SBOM tracking, compliance, and policy enforcement to function after release.

  • Keeping automation tooling secure, updated, and integrated with the live environment.

  • Maintaining evidence that the toolchain’s outputs (e.g., SBOMs, scan reports) remain trustworthy and current.


Tasks Tools
PO.3.1: Specify which tools or tool types must or should be included in each toolchain to mitigate identified risks, as well as how the toolchain components are to be integrated with each other.


PO.3.2: Follow recommended security practices to deploy, operate, and maintain tools and toolchains.


PO.3.3: Configure tools to generate artifacts6 of their support of secure software development practices as defined by the organization.

OWASP Dependency Track

Continuously monitors SBOMs for newly disclosed CVEs in deployed software.

Ortelius Evidence Store

Maintains a historical record of deployed software, components, and their SBOMs; links to owners for accountability.

Syft

Generates SBOMs from deployed container images or filesystems on-demand.

Trivy

Post-deployment container, filesystem, and package vulnerability scanning; also generates SBOMs.

Clair

Continuous scanning of container registries for vulnerabilities.

Grype

Fast vulnerability scanner for container images and filesystems.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore cosign

Verifies signatures of deployed artifacts; ensures they match approved builds.

Sigstore Rekor

Provides a public, immutable log for signatures and provenance data.

Open Policy Agent

Enforce security and compliance policies on deployed systems (e.g., Kubernetes clusters).

Inspec

Audit deployed infrastructure and applications against security baselines and compliance requirements.

The Hive

Incident response platform for post-deployment security events.

DefectDojo

Track vulnerabilities and assign remediation tasks; integrate with scanners for continuous updates.

PO.4 Define and Use Criteria for Software Security Checks: Help ensure that the software resulting from the SDLC meets the organization’s expectations by defining and using criteria for checking the software’s security during development.


To satisfy SSDF PO.4 in a post-deployment context using open-source tools, the focus shifts to:

  • Ensuring that security data continues to be collected after release.

  • Logs, SBOMs, and scan results are preserved and tamper-resistant.

  • Data is safeguarded to prevent unauthorized access or modification.

  • Data is retrievable for audits, investigations, and compliance checks


Tasks Tools
PO.4.1: Define criteria for software security checks and track throughout the SDLC.


PO.4.2: Implement processes, mechanisms, etc. to gather and safeguard the necessary information in support of the criteria.


Falco

Runtime security detection for containers and hosts; generates event logs for suspicious behavior.

AuditD

Captures system-level security events for Linux.

OSQuery

Endpoint telemetry and configuration monitoring.

Prometheus and Loki

Collect and store metrics and logs in a queryable format.

Ortelius Evidence Store

Maintains versioned SBOMs linked to each deployment.

Syft

Generates SBOMs from deployed artifacts for ongoing monitoring./p>

OpenSCAP

Collects and stores compliance scan data.

Wazuh SIEM

SIEM with audit logging, threat detection, and compliance monitoring.

Grype

Detects CVEs in deployed images and file systems.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore Rekor

Provides a public, immutable log for signatures and provenance data.

Inspec

Audit deployed infrastructure and applications against security baselines and compliance requirements.

Trivy

Continuous vulnerability scanning + SBOM generation for running systems.

DefectDojo

Stores and organizes security scan results; integrates with Trivy, Grype, and Dependency-Track.

PO.5 Implement and Maintain Secure Environments for Software Development: Ensure that all components of the environments for software development are strongly protected from internal and external threats to prevent compromises of the environments or the software being developed or maintained within them. Examples of environments for software development include development, build, test, and distribution environments.


To satisfy SSDF PO.5 in a post-deployment context using open-source tools, the focus shifts to:

  • The security requirements for your development infrastructure are still relevant and enforced after software is released.

  • Your build, deployment, and monitoring environments remain hardened and compliant.

  • You continuously validate that your development infrastructure hasn’t drifted from its secure baseline.


Tasks Tools
PO.5.1: Separate and protect each environment involved in software development.


PO.5.2: Secure and harden development endpoints (i.e., endpoints for software designers, developers, testers, builders, etc.) to perform development-related tasks using a risk-based approach.


Inspec

Runs ongoing compliance scans against development and build servers; enforce CIS/NIST benchmarks.

OpenSCAP

Check infrastructure against defined security baselines.

OSQuery

Monitor build and deployment nodes for unauthorized changes.

Kube-bench

Validates Kubernetes-based build/test clusters meet CIS benchmarks.

Open Policy Agent - GateKeeper

Enforce rules for infrastructure configuration (Kubernetes, Terraform, CI/CD).

Kyverno

Kubernetes-native policy enforcement for cluster security./p>

Jenkins

Hardened CI/CD pipelines with access controls and audit logs.

Nexus Repository OSS

Securely store build artifacts post-deployment; apply access controls.

Harbor

Container registry with built-in vulnerability scanning and RBAC.

Wazuh SIEM

Ingests infrastructure security logs and alerts on violations.

Falco

Detect unauthorized activity in build/deployment clusters or runner nodes.

Prometheus + Alertmanager

Monitor infrastructure security metrics and trigger notifications.

In-Toto

Validates that deployed artifacts match the cryptographic attestations from the build process.

Sigstore Rekor

Maintain an immutable, tamper-evident log of signed infrastructure configuration files.

2 - Protect the Software (PS)

Protect the Software (PS) Post-Deployment CI/CD Steps

Protect the Software (PS)

Protect the Software (PS): Organizations should protect all components of their software from tampering and unauthorized access.


PS.1

Protect All Forms of Code from Unauthorized Access and Tampering : Help prevent unauthorized changes to code, both inadvertent and intentional, which could circumvent or negate the intended security characteristics of the software. For code that is not intended to be publicly accessible, this helps prevent theft of the software and may make it more difficult or time-consuming for attackers to find vulnerabilities in the software.


To satisfy SSDF PS.1 in a post-deployment context using open-source tools, the focus shifts from just defining to:

  • Protecting deployed artifacts (binaries, containers, scripts, configs) from being altered in production

  • Ensuring post-deployment code integrity is verifiable at any time

  • Maintaining secure storage, transport, and retrieval of code and artifacts

  • Keeping an audit trail for all modifications and access

Tasks Tools

PS.1.1: Store all forms of code including source code, executable code, and configuration-as-code based on the principle of least privilege so that only authorized personnel, tools, services, etc. have access.

Cosign Sigstore

Sign and verify container images, binaries, and other artifacts.

Rekor Sigstore

Immutable public transparency log for signatures and metadata.

In-Toto

End-to-end supply chain verification to ensure deployed artifacts came from trusted sources.

Gnu Privacy GuardG

Sign and verify any file type, including tarballs and configuration files.

Harbor

Container registry with built-in vulnerability scanning, content signing, and RBAC.

Sonatype Nexus OSS

Secure artifact repository with access controls.

JFrog Artifactory OSS

Manages binary repositories with fine-grained permissions.

Tripwire OSS

Monitors filesystem for unauthorized changes.

AIDE (Advanced Intrusion Detection Environment)

Creates a baseline of files and detects alterations.

Falco

Detects suspicious activity in Kubernetes or container environments, including file changes.

Kubernetes RBAC + OPA Gatekeeper

Enforces role-based policies for container image deployment.

Keycloak

Centralized authentication/authorization for artifact registries and CI/CD systems.

Wazuh

SIEM platform that monitors access logs and alerts on anomalies.

Ortelius Evidence Store

Tracks which version of a service is deployed where, and links to its signed SBOM.

Syft

Generates SBOMs for deployed artifacts for later verification.

OWASP Dependency-Track

Monitors components in deployed artifacts against CVE feeds.

PS.2

Provide a Mechanism for Verifying Software Release Integrity: Help software acquirers ensure that the software they acquire is legitimate and has not been tampered with. Make software integrity verification information available to software acquirers.


To satisfy SSDF PS.2 in a post-deployment context using open-source tools, the focus shifts to:

  • Keeping exact copies of every release artifact (binaries, containers, configs, SBOMs)

  • Recording and publishing cryptographic verification data (signatures, hashes, attestations)

  • Ensuring acquirers can confirm that what they have matches the trusted, official release


Tasks Tools
PS.2.1: Make software integrity verification information available to software acquirers. Harbor

Container registry with image retention policies, RBAC, and content trust.

Sonatype Nexus OSS

Artifact repository for storing binaries and dependencies.

JFrog Artifactory OSS

Binary management with retention and access control.

GitHub

Tag and store release binaries, SBOMs, and checksums.

Sigstore cosign

Sign and verify container images, SBOMs, and other artifacts.

Sigstore Rekor

Immutable transparency log for all signed artifacts and metadata.

Gnu Privacy Guard

Sign and verify tarballs, binaries, or SBOM files.

In-Toto

Provide end-to-end build provenance verification.

Ortelius

Maps deployed services to specific versions and their SBOMs.

Syft

Generates SBOMs from deployed artifacts.

OWASP Dependency-Track

Continuously monitors SBOMs for new CVEs in preserved releases.

AIDE (Advanced Intrusion Detection Environment)

Filesystem integrity checker to detect changes in stored artifacts.

Tripwire OSS

Baseline and monitor stored release directories for modifications.

Wazuh

SIEM that audits artifact repository activity.

AuditD

Linux-level auditing for access to preserved release files.

Kubernetes RBAC / Keycloak

Restrict who can upload or modify artifacts in registries.

PS.3

Archive and Protect Each Software Release: Preserve software releases in order to help identify, analyze, and eliminate vulnerabilities discovered in the software after release.


To satisfy SSDF PS.3 in a post-deployment context using open-source tools, the focus shifts to:

  • Keeping a tamper-proof record of every software component in each release

  • Ensuring provenance data remains accessible for audits, investigations, and vulnerability response

  • Allowing acquirers and downstream users to independently verify the origin and integrity of every component

Tasks Tools

PS.3.1: Securely archive the necessary files and supporting data (e.g., integrity verification information, provenance data) to be retained for each software release.


PS.3.2: Collect, safeguard, maintain, and share provenance data for all components of each software release (e.g., in a software bill of materials [SBOM]).

Syft

Generate SBOMs from deployed containers, VMs, or file systems (SPDX & CycloneDX formats).

Trivy

Create SBOMs and scan for vulnerabilities in deployed systems.

In-Toto

Record build steps and supply chain metadata as signed “link” files.

Cosign Attest

Capture build and deployment provenance as signed attestations.

Gnu Privacy Guard

Sign SBOMs and metadata for offline or private distribution.

Rekor

Store signatures and attestations in an immutable, public transparency log.

Tripwire OSS

Detect unauthorized changes in locally stored provenance archives.

AIDE (Advanced Intrusion Detection Environment)

Detect unauthorized changes in locally stored provenance archives.

Ortelius Evidence Store

Version and track deployed services and their SBOMs; link them to environments and releases. API/UI access for sharing SBOM and component history for specific releases.

Dependency Track

Continuously monitor preserved SBOMs for new CVEs.

Harbor

Attach SBOMs and signatures to container images in a registry.

CycloneDX BOM Portal (OSS)

Host and validate SBOMs in a web-accessible interface.

3 - Produce Well-Secured Software (PW)

Produce Well-Secured Software (PW) in the Post-Deployment CI/CD Steps

Produce Well-Secured Software (PW)

Organizations should produce well-secured software with minimal security vulnerabilities in its releases.


PW.1

Design Software to Meet Security Requirements and Mitigate Security Risks: Identify and evaluate the security requirements for the software; determine what security risks the software is likely to face during operation and how the software’s design and architecture should mitigate those risks; and justify any cases where risk-based analysis indicates that security requirements should be relaxed or waived. Addressing security requirements and risks during software design (secure by design) is key for improving software security and also helps improve development efficiency.


To satisfy SSDF PW.1 in a post-deployment context using open-source tools, the focus shifts to:

  • Keeping a tamper-proof record of every software component in each release

  • Ensuring provenance data remains accessible for audits, investigations, and vulnerability response

  • Allowing acquirers and downstream users to independently verify the origin and integrity of every component

Tasks Tools

PW.1.1: Use forms of risk modeling, such as threat modeling, attack modeling, or attack surface mapping to help assess the security risk for the software.


PW.1.2: Track and maintain the software’s security requirements, risks, and design decisions.


PW.1.3: Where appropriate, build in support for using standardized security features and services (e.g., enabling software to integrate with existing log management, identity management, access control, and vulnerability management systems) instead of creating proprietary implementations of security features and services.

Semgrep

Static and Dynamic Analysis that an be run against deployed codebases in staging mirrors to detect insecure patterns.

Wapiti

Web application security scanner for deployed apps.

Zap (Zed Attack Proxy)

Active and passive testing of live apps for vulnerabilities.

Inspec

Validates that deployed applications meet secure coding standards.

Ortelius

10 minute synchronizing to OSV.dev for new vulnerability detection in deployed artifacts.

OpenSCAP

Scans systems for compliance with security coding-related baselines.

Falco

Logging and Monitoring - Detects insecure behavior at runtime (e.g., unsafe system calls).

Wazuh

Monitors application and OS logs for security-related events.

AuditD

Captures low-level system calls related to code execution.

Syft

Generates SBOMs for deployed applications for ongoing monitoring.

OWASP Dependency-Track

Continuously tracks SBOMs for new vulnerabilities

Trivy

Scans deployed containers/filesystems for known CVEs in code and dependencies.

Grype

Focused vulnerability scanning for deployed artifacts.

PW.2

Review the Software Design to Verify Compliance with Security Requirements and Risk Information:Help ensure that the software will meet the security requirements and satisfactorily address the identified risk information.


To satisfy SSDF PW.2 in a post-deployment context using open-source tools, the focus shifts to:

  • Continuous verification that deployed code (source or binary) hasn’t been tampered with.

  • Ongoing vulnerability assessment of deployed applications and components.

  • Post-release code review triggers when a vulnerability or incident is detected.

  • Auditable evidence that deployed software matches approved, reviewed code.

Tasks Tools

PW.2.1: Have 1) a qualified person (or people) who were not involved with the design and/or 2) automated processes instantiated in the toolchain review the software design to confirm and enforce that it meets all of the security requirements and satisfactorily addresses the identified risk information.

Sigstore Cosign

Verify deployed containers and binaries were signed at build time.

Rekore

Store verification data and attestations in a tamper-evident log.

In-Toto

Ensure deployed code matches the reviewed build pipeline steps.

Tripwire OSS

Monitor deployed files for unauthorized changes.

Semgrep

Review mirrored deployed code for security issues or policy violations.

GitHub CodeQL

Advanced code queries to detect vulnerability patterns.

Wapiti

Web vulnerability scanning against deployed endpoints.

Ortelius

Track vulnerabilities to live endpoints for quick remediation times.

Zap (Zed Attack Proxy)

Automated and manual DAST testing for live applications.

Nikto

Server-focused vulnerability scanning.

OpenSCAP

Map results to compliance baselines.

DefectDojo

Track vulnerabilities found during post-deployment reviews and link to remediation./p>


PW.4

Reuse Existing, Well-Secured Software When Feasible Instead of Duplicating Functionality : Lower the costs of software development, expedite software development, and decrease the likelihood of introducing additional security vulnerabilities into the software by reusing software modules and services that have already had their security posture checked. This is particularly important for software that implements security functionality, such as cryptographic modules and protocols.


Note: PW.3 moved to PW.4


To satisfy SSDF PW.4 in a post-deployment context using open-source tools, the focus shifts to:

  • Vulnerability detection runs continuously on production or production-equivalent environments.

  • Results are triaged and assigned quickly.

  • There is an automated or semi-automated path to remediation (e.g., patching, image rebuild, or component upgrade).

  • All activity is auditable and linked to release artifacts.

Tasks Tools

PW.4.1: Acquire and maintain well-secured software components (e.g., software libraries, modules, middleware, frameworks) from commercial, opensource, and other third-party developers for use by the organization’s software.


PW.4.2: Create and maintain well-secured software components in-house following SDLC processes to meet common internal software development needs that cannot be better met by third-party software components.


PW.4.3: Moved to PW.1.3


PW.4.4: Verify that acquired commercial, open-source, and all other third-party software components comply with the requirements, as defined by the organization, throughout their life cycles.

Git

Stores signed vulnerability reports and patch commit metadata.

Rekore

Logs scan results, remediations, and signatures immutably.

Ortelius

Audit and evidence retention tracks which environments are running which version, enabling targeted redeployment of patched builds.

Trivy

Scans running containers, filesystems, and Kubernetes clusters; also generates SBOMs.

Grype

SBOM-driven vulnerability scanning for images and directories.

Clair

Monitors container registries for vulnerable images.

OpenVAS / Greenbone

Network and host vulnerability scanning.

Syft

Generates SBOMs from deployed environments.

OWASP Dependency-Track

CWatches SBOMs for new CVEs and policy violations.

Vulnix

Nix-based vulnerability scanning from SBOM input.

Kyverno

Kubernetes-native admission controller enforcing vulnerability thresholds.

Falco

Detects runtime anomalies that may indicate exploitation.

Nikto

Server-focused vulnerability scanning.

Keel

Automates container redeployments when a new image is pushed.

Kured

Automated Kubernetes node reboots for kernel patching.

DefectDojo

Centralizes vulnerability data from scanners; assigns remediation tasks and tracks SLAs./p>

The Hive

Incident response and coordination for urgent vulnerability events./p>

PW.5

Create Source Code by Adhering to Secure Coding Practices: Decrease the number of security vulnerabilities in the software, and reduce costs by minimizing vulnerabilities introduced during source code creation that meet or exceed organization-defined vulnerability severity criteria.


To satisfy SSDF PW.5 in a post-deployment context using open-source tools, the focus shifts to:

  • Ongoing verification of integrity, compliance, and security posture for deployed software.

  • Continuous checks to ensure that the running software still meets the security requirements it had at release.

  • Detecting drift, newly introduced vulnerabilities, and configuration changes.

  • Maintaining verifiable evidence of these checks over time.

Tasks Tools

PW.5.1: Follow all secure coding practices that are appropriate to the development languages and environment to meet the organization’s requirements.

Trivy

Ongoing scans of deployed containers, filesystems, and Kubernetes clusters.

Grype

Detect CVEs in deployed SBOMs or images.

Clair

Continuous vulnerability scanning for registry images.

Syft

Generate SBOMs from running systems for ongoing monitoring.

Inspec

Define and run compliance checks (CIS, NIST, org-specific policies) against deployed environments.

OpenSCAP

Evaluate running systems against security baselines.

Kube-bench

Validate Kubernetes deployments against CIS benchmarks.

Kube-hunter

Identify potential attack paths in deployed Kubernetes clusters.

Falco

Detect runtime changes to files, processes, and network behavior.

AIDE

File integrity monitoring to ensure binaries/configs aren’t altered.

osquery

Query system state to detect unauthorized configuration changes.

Open Policy Agent

Enforce continuous compliance policies at runtime.

Kyverno

Kubernetes-native policy engine to prevent insecure updates.

DefectDojo

Centralize verification results and track issues over time./p>

Rekor

Store signed verification reports in a tamper-proof ledger.

PW.6

Configure the Compilation, Interpreter, and Build Processes to Improve Executable Security: Decrease the number of security vulnerabilities in the software and reduce costs by eliminating vulnerabilities before testing occurs.


To satisfy SSDF PW.6 in a post-deployment context using open-source tools, the focus shifts to:

  • Running scheduled scans on running containers, VMs, and registries; integrate with SBOM monitoring

  • Maintain SBOMs for deployed software; monitor for new CVEs.

  • Score findings (CVSS, EPSS); prioritize fixes based on severity & exploitability.

  • Auto-rebuild/redeploy when patched images are available.

Tasks Tools

PW.6.1: Use compiler, interpreter, and build tools that offer features to improve executable security.


PW.6.2: Determine which compiler, interpreter, and build tool features should be used and how each should be configured, then implement and use the approved configurations.

Trivy

Trivy runs weekly scans on all production container images and hosts → results are signed and logged in Rekor.

Syft

Regenerates SBOMs for deployed artifacts, and flags new CVEs.

DefectDojo

CVSS scoring + SLA assignment to owners./p>

Keel

Auto-rebuild/redeploy when patched images are available

Kured

Automated Kubernetes node reboots for kernel patching.

Argo Rollouts

Use canary/staged rollouts for patched versions.

OpenVAS

Run scheduled scans on running containers, VMs, and registries; integrate with SBOM monitoring

Rekor

Store signed records of detection, triage, fix, and verification

PW.7

Review and/or Analyze Human-Readable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements: Help identify vulnerabilities so that they can be corrected before the software is released to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities. Human-readable code includes source code, scripts, and any other form of code that an organization deems human readable.


To satisfy SSDF PW.7 in a post-deployment context using open-source tools, the focus shifts to:

  • Maintain a record showing that the deployed version went through the organization’s required code review and/or automated analysis process.

  • Ensure all emergency/hotfix patches pushed post-deployment are also reviewed or analyzed — even if done after release.

  • Maintain Audit-Ready Evidence

Tasks Tools

PW.7.1: Determine whether code review (a person looks directly at the code to find issues) and/or code analysis (tools are used to find issues in code, either in a fully automated way or in conjunction with a person) should be used, as defined by the organization.


PW.7.2: Perform the code review and/or code analysis based on the organization’s secure coding standards, and record and triage all discovered issues and recommended remediations in the development team’s workflow or issue tracking system.

Semgrep

Run SAST against the exact code linked to deployed binaries; include dependency scanning

GitHub CodeQL

Re-run code analysis on production mirrors.

DefectDojo

Keeps immutable records of all reviews, approvals, and automated analysis runs

Rekor

Signed commits, protected branch history, scan results.

PW.8

Test Executable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements: Help identify vulnerabilities so that they can be corrected before the software is released in order to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities and improves traceability and repeatability. Executable code includes binaries, directly executed bytecode and source code, and any other form of code that an organization deems executable.


To satisfy SSDF PW.8 in a post-deployment context using open-source tools, the focus shifts to:

  • Continuously Test Deployed Executables for Vulnerabilities

  • Verify Compliance with Security Requirements

  • Feed Findings Back into Development

Tasks Tools

PW.8.1: Determine whether executable code testing should be performed to find vulnerabilities not identified by previous reviews, analysis, or testing and, if so, which types of testing should be used.


PW.8.2: Scope the testing, design the tests, perform the testing, and document the results, including recording and triaging all discovered issues and recommended remediations in the development team’s workflow or issue tracking system.

Trivy

Scans deployed containers/filesystems for known CVEs in code and dependencies.

Grype

Focused vulnerability scanning for deployed artifacts.

Ortelius

10 minute synchronizing to OSV.dev for new vulnerability detection in deployed artifacts.

OpenVAS / Greenbone

Network and host vulnerability scanning.

Inspec

Map scan results to security standards (NIST, CIS, OWASP ASVS)

OpenSCAP

Compliance scan outputs, baseline profiles, exception docs.

Wapiti

DAST, fuzzing, and runtime monitoring to detect insecure behavior

Zap (Zed Attack Proxy)

DAST/fuzzing reports.

PW.9

Configure Software to Have Secure Settings by Default: Help improve the security of the software at the time of installation to reduce the likelihood of the software being deployed with weak security settings, putting it at greater risk of compromise.


To satisfy SSDF PW.9 in a post-deployment context using open-source tools, the focus shifts to:

  • Check deployed software and infrastructure against the organization’s secure configuration baseline (e.g., NIST 800-53, CIS Benchmarks, DISA STIGs).

  • Use policy-as-code and configuration management tools to keep deployed systems in compliance.

  • Integrate configuration checks into runtime monitoring

Tasks Tools

PW.9.1: Define a secure baseline by determining how to configure each setting that has an effect on security or a security-related setting so that the default settings are secure and do not weaken the security functions provided by the platform, network infrastructure, or services.


PW.9.2: Implement the default settings (or groups of default settings, if applicable), and document each setting for software administrators.

Ortelius

Continuously monitors drift in container configurations.

Inspec

Compare deployed systems against secure configuration baselines (NIST, CIS, STIG)

OpenSCAP

Compare deployed systems against secure configuration baselines (NIST, CIS, STIG).

Falco

Continuously monitor config changes; alert or auto-remediate deviations.

Wazuh

Drift detection logs, remediation actions.

Ansible

Policy-as-code and config management to ensure all deployments match baseline

Saltstack

Config playbooks, enforcement logs, policy change history.

Git

Store signed scan results and drift detection records in tamper-evident systems.

4 - Respond to Vulnerabilities (RV)

Respond to Vulnerabilities (RV) in the Post-Deployment CI/CD Steps

Respond to Vulnerabilities (RV)

Respond to Vulnerabilities (RV): Organizations should identify residual vulnerabilities in their software releases and respond appropriately to address those vulnerabilities and prevent similar ones from occurring in the future.


RV.1

Identify and Confirm Vulnerabilities on an Ongoing Basis: Help ensure that vulnerabilities are identified more quickly so that they can be remediated more quickly in accordance with risk, reducing the window of opportunity for attackers.


To satisfy SSDF RV.1 in a post-deployment context using open-source tools, the focus shifts to:

  • Continuously scanning live environments for new vulnerabilities

  • Correlating detected vulnerabilities to deployed components and SBOM data

  • Validating whether vulnerabilities are exploitable in the specific environment

  • Prioritizing remediation based on severity, exploitability, and operational impact

Tasks Tools

RV.1.1: Gather information from software acquirers, users, and public sources on potential vulnerabilities in the software and third-party components that the software uses, and investigate all credible reports.


RV.1.2: Review, analyze, and/or test the software’s code to identify or confirm the presence of previously undetected vulnerabilities.


RV.1.3: Have a policy that addresses vulnerability disclosure and remediation, and implement the roles, responsibilities, and processes needed to support that policy.

OWASP Dependency Track

Integrates with live SBOMs to detect and alert on vulnerabilities after release.

Ortelius

Links detected vulnerabilities directly to deployed service versions for traceability.

DefectDojo

Central vulnerability management hub with metrics and tracking.

Trivy

Identify vulnerabilities in images already deployed in Kubernetes or Docker environments.

Grype

Works with Syft-generated SBOMs to continuously check for new CVEs.

OpenSCAP

Provide scheduled compliance scans alongside vulnerability checks.

VEX (Vulnerability Exploitability eXchange) + OpenVEX

Helps teams prioritize remediation by filtering out non-exploitable vulnerabilities.

Syft

MFeed live SBOMs into scanners like Dependency-Track or Grype.

RV.2

Assess, Prioritize, and Remediate Vulnerabilities: Help ensure that vulnerabilities are remediated in accordance with risk to reduce the window of opportunity for attackers.


To satisfy SSDF RV.2 in a post-deployment context using open-source tools, the focus shifts to:

  • Determining which vulnerabilities matter most in the deployed context

  • Using exploitability, business impact, and compliance requirements for prioritization

  • Executing timely remediation or mitigation actions in live environments

  • Tracking remediation status to closure with audit-ready records

Tasks Tools

RV.2.1: Analyze each vulnerability to gather sufficient information about risk to plan its remediation or other risk response.


RV.2.2: Plan and implement risk responses for vulnerabilities.

DefectDojo

Centralizes risk scoring, workflow management, and reporting for remediation progress.

OWASP Dependency Track

Provides real-time vulnerability prioritization and integrates with issue tracking systems.

Ortelius

Enables environment-specific remediation prioritization and impact assessment.

Jenkins + OPA (Open Policy Agent)

Enforce remediation SLAs and automate rollouts of fixed versions.

Trivy + Grype

Continuous scanning plus integration with CI/CD to push patched artifacts.

GitHub/GitLab Issues + Automation Bots

Ensures no vulnerability is left without a tracked remediation action.

Kubebench + Falco (Runtime Security)

Provides real-time signals to prioritize operational security fixes.


RV.3

Analyze Vulnerabilities to Identify Their Root Causes: Help reduce the frequency of vulnerabilities in the future.



To satisfy SSDF RV.3 in a post-deployment context using open-source tools, the focus shifts to:

  • Determining whether it originated in coding, dependencies, build processes, or deployment configurations

  • Documenting lessons learned to prevent recurrence

  • Feeding analysis results back into security requirements, pipelines, and developer training

Tasks Tools

RV.3.1: Analyze identified vulnerabilities to determine their root causes.


RV.3.2: Analyze the root causes over time to identify patterns, such as a particular secure coding practice not being followed consistently


RV.3.3: Review the software for similar vulnerabilities to eradicate a class of vulnerabilities, and proactively fix them rather than waiting for external reports.


RV.3.4: Review the SDLC process, and update it if appropriate to prevent (or reduce the likelihood of) the root cause recurring in updates to the software or in new software that is created.


Ortelius

Supports forensic analysis by tracking when and where a vulnerable component entered the system.

DefectDojo

Maintains historical data to identify trends in vulnerability origins.

GitHub

Supports forensic traceability and accountability in root cause analysis.

Syft + Dependency Track

nables version-diff SBOM analysis for root cause investigations.

Semgrep

Assists in determining whether vulnerabilities stem from code-level issues.

OpenSCAP

Enables root cause mapping to configuration weaknesses.

Trivy + Grype

Provides temporal context for root cause timelines.

OSQuery

Supports deep inspection during vulnerability forensics.