IR-009supply-chainv1.0.0
Software Supply Chain Compromise
⚠️ critical
⏱ Est. Time120m
📋 Steps11 steps
🔧 Tools5 required
🔗 Integrations5 platforms
📊 Avg Resolution480m
🔧 Tools Required
siemedrsca toolci cd platformartifact registry
⚡ Triggers
security_advisory_for_used_dependencysiem_known_malicious_package_hashci_cd_anomalous_behavioredr_post_install_script_alertthreat_intel_feed_package_compromisedeveloper_reported_anomaly
🔌 Integrations
req
snyk
Software Composition Analysis — package vulnerability and malware detection
req
crowdstrike falcon
Endpoint detection of post-install script execution and C2 communication
opt
github advanced security
Dependency graph and secret scanning in source code
opt
jfrog xray
Artifact scanning in internal package registry
req
splunk
CI/CD pipeline log correlation and network telemetry
Click each step to expand the full procedure, automation hints, and expected outputs.