Operationalizing Defense in Depth
With the growing use of open source technologies, gaining visibility into and vetting upstream open source software using a software supply chain security process is imperative
to consume open source technologies securely.