Software Supply Chain Security

Trusted by the world's most regulated organisations to secure what they build and run

Securing software supply chains since 2017: sponsoring in-toto research, maintaining Witness and Archivista, and co-chairing CNCF TAG Security.

Our maturity framework takes organisations from CVE triage to fully automated policy-driven delivery.

in-toto Steering Committee Witness Core Maintainers OpenSSF Core Contributors CNCF TAG Security Co-Chairs
sponsoring and contributing to in-toto
10+ years
years of combined cloud native expertise
250+
CNCF and OpenSSF leadership positions
6
from triage to full policy automation
4 levels

Open source projects we maintain, sponsor, and contribute to

    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo

The Challenge

Enterprise open source security is broken

Vulnerability volume outpaces remediation capacity. Traceability is fragmented. Ownership is unclear. The result: constant firefighting, compliance burden, and risk leaking to production.

What we see across regulated enterprises

CVE burnout

Vulnerability volume outpaces remediation capacity, driving constant firefighting and backlog growth.

Business impact

Run-cost rising

Manual triage, gating, and reporting inflate operational overhead.

Traceability gaps

Hard to answer 'what runs where, what's affected, where did it come from?' reliably.

Delivery predictability falling

Last-minute CVE firefights delay releases. Automation nearly impossible.

Ownership confusion

Unclear accountability: findings and assets mapped to the wrong team.

Regulatory burden increasing

EU CRA, NIS2, and US Executive Orders demand evidence-based supply chain controls.

Tool and data fragmentation

Signals and evidence spread across multiple systems, requiring manual stitching.

Risk leaking to production

Without consistent decisioning, unresolved vulnerabilities reach production.

No single source of truth

No authoritative dataset for posture, provenance, or ownership: views conflict and drift.

Low team morale and confidence

Exhausted teams lose trust in the process. Skilled engineers spend time firefighting instead of building.

ControlPlane's Expertise, Codified

Supply Chain Maturity Framework

Secure Ingestion, Build, and Release
4
Level 4: Policy-driven automation & authorisation
Ingestion-to-promotion enforcement
3
Level 3: Verifiable Builds and Releases
Attestations, provenance, hardened build & deploy
2
Level 2: Centralised Traceability and Visibility
Single source of truth for provenance, posture & ownership
1
Level 1: Triage & Prioritisation Uplift
Quick wins to reduce toil, low disruption

Explore Each Level

What's inside each level

An extensible, incremental framework to reduce CVE toil and improve software supply chain control, without a big-bang programme.

Start where you are, stop when ROI diminishes.

1

Triage & Prioritisation Uplift

Quick Wins

Reduce remediation pressure with better signal intake, standardised SBOMs, operationalised VEX, and consistent prioritisation.

Key Capabilities

SCA & Vulnerability Scanning
Aggregate and normalise findings across dependencies and built artefacts.
SBOM Generation (SPDX/CycloneDX)
Standardise composition as input to prioritisation and traceability.
VEX Operating Model
Produce, validate, distribute, and consume VEX consistently.
Prioritisation & Exception Hygiene
Classify, gate, and waive consistently with time-bound waivers and clear owners.
2

System of Record & Traceability

Minimum Baseline

Establish a single source of truth for provenance, posture, and ownership: fed by existing tools, consumed by downstream controls.

Key Capabilities

Metadata Repository
Ingest, normalise, and link posture, provenance, and ownership into one authoritative dataset.
Integration Layer
Pluggable connectors across scanners, CI/CD, registries, and ticketing.
Standardised Records
Version decisions and lifecycle events as durable, machine-consumable data.
Unified Reporting
Single pane of glass across apps, teams, and environments.
3

Verifiable Builds & Releases

Evidence-Based

Create verifiable evidence that the right artefact was built, from the right source, through the right process, and promoted correctly.

Key Capabilities

Integrity & Provenance Verification
Verify artefact signatures, source authenticity, and provenance consistency.
Chain-of-Custody (Witness/Archivista)
Tamper-evident evidence trail via Sigstore signing and in-toto attestations.
SLSA Build Assurance
Repeatable, audit-ready build evidence with SLSA-aligned controls and provenance.
Release Attestations
Standardised build attestations per artefact digest.
4

Policy-Driven Automation & Authorisation

North Star

Automate the path from ingestion to production using central policy-as-code, context-aware authorisation, and continuous enforcement.

Key Capabilities

Policy-as-Code Decisioning
Central policy with enforcement points across the stack.
Promotion Control
Automated ingestion → build → release → environment promotion via policy gates.
Dynamic Authorisation
Decisions use live context: posture, provenance, environment criticality, runtime exposure.
Continuous Enforcement
Pipeline and runtime-integrated scanning with automated remediation paths.

Levels build on each other to reduce risk: you can achieve any level and still bank measurable outcomes

Secure What Enters Your Organisation

Open Source Ingestion & Third-Party Code Risk

The software you consume is your weakest link. From the Trivy supply chain attack to dependency confusion, ingestion is where risk enters.

Open Source Ingestion
Controlled ingestion pipeline for third-party artefacts. Scan, validate, and approve before anything enters your internal registries.
Third-Party Code Risk
Dependency risk scoring, transitive vulnerability analysis, and licence compliance. Know what you’re consuming before it reaches your developers.
Secure Promotion
Policy-gated promotion from ingestion through build to production. Every artefact traced, attested, and verified at each stage.

Proven in the World's Most Regulated Industries

We've secured high value supply chains for tier 1 banks, critical infrastructure, and technology leaders.

Featured Image
2023

Citigroup: Continuous Secure Ingestion for OSS Software Packages

How a multinational bank implemented automated provenance verification of over three million external packages

We create, maintain, and govern the tools we use

Why ControlPlane?

MAINTAINED

in-toto, Witness & Archivista

10-year sponsors of the in-toto project. John Kjell and our team are core maintainers of Witness and Archivista: the attestation frameworks underpinning software supply chain verification at scale.

LED

OpenSSF & CNCF Leadership

Co-chairs of CNCF TAG Security, OpenSSF core contributors, FINOS AI Security working group. Pro-bono CISO for OpenUK. Shaping the standards that define supply chain security.

DELIVERED

Tier 1 Global Banks

Continuous secure ingestion at Citi. Supply chain assurance at JPMC. Platform security for Morgan Stanley. Regulated-industry deployment is our core expertise.

SLSA Expertise

Assessment and implementation of SLSA build levels

Sigstore & Cosign

Signing and verification deployment at enterprise scale

SBOM & VEX Operations

End-to-end SBOM generation and VEX operating models

Wider reading

Supply chain security insights from ControlPlane

The Path to Zero CVEs: Vanquishing Cyber Threats

Addressing Common Vulnerabilities and Exposures (CVEs) is no longer optional. This article explores practical strategies for reducing CVE exposure across your software supply chain.

Andrew Martin

Founder and CEO

Smarter Than Your Average SBOM!

SBOMs are just the beginning. This talk explores how to make SBOMs actionable, from generation and enrichment to consumption and policy enforcement across your supply chain.

Andrew Martin

Founder and CEO

Ready to take control of your supply chain?

Start With an Assessment

  • Direct access to in-toto steering committee members and Witness maintainers
  • Maturity framework from quick wins to full policy automation
  • Evaluation against SLSA, OpenSSF Scorecard, and CIS Supply Chain benchmarks
  • Proven delivery at Citi, JPMC, Morgan Stanley, and more
  • Actionable recommendations with a phased roadmap for improvement

Frequently asked questions

Don’t see your question? Email us: [email protected]

Our Supply Chain Maturity Framework is an extensible, incremental approach to reducing CVE toil and improving software supply chain control, without a big-bang programme. It has four levels: from VEX-led prioritisation, through centralised traceability, to verifiable builds and ultimately policy-driven automation. You can stop at any level and still bank measurable outcomes.


No. The framework is designed to be incremental. Many organisations see significant value from Level 1 alone: better CVE prioritisation, fewer false positives, and clearer exception management. Each level builds on the previous but delivers standalone value.


Our framework is complementary to SLSA and OpenSSF guidelines. Level 3 aligns directly with SLSA build levels, and we use OpenSSF Scorecard as one of many inputs to our assessment. We contribute to both projects and bring deep implementation experience from regulated environments.


Level 1 quick wins can be delivered in 4-8 weeks. Level 2 typically takes 3-6 months depending on the existing toolchain. Levels 3 and 4 are longer-term engagements that depend on organisational maturity and ambition. We always start with an assessment to scope accurately.


Yes, all our packages are customisable to your needs.


This assessment requires 20 person days, but the engagement can be customised to spend more time on certain areas of interest.


Yes, we can tailor this engagement to provide actionable results that are compatible with guidelines such as the CIS Software Supply Chain Security Guide, SLSA, and OpenSSF Scorecard. Let us know about your specific requirements!