Software Supply Chain Topics

Browse by category or alphabetically, and access in-depth articles on key software supply chain topics—from languages and libraries to package managers, toolchains, and security practices.

A

Access Control

Access control defines and enforces who can access or modify digital resources to protect data and ensure compliance.

Learn More
API Security

API security mitigates attackers' abuse of an Application Programming Interface to disrupt systems or steal data.

Learn More
Application Security

 Application security refers to the measures taken to protect software applications from threats and vulnerabilities.

Learn More
AST

Application Security Testing (AST) identifies, reports, and detects vulnerabilities in software applications throughout the SDLC.

Learn More

B

Backdoor Attack

A backdoor attack is a technique used by threat actors to create a hidden entry point into an application or environment.

Learn More
Binary

The file that results from compiling your code, if written in a language that is compiled rather than interpreted.

Learn More
Binary Repository Manager

A tool that allows you to organize your compiled binaries into repositories, just as you organize your source code into repositories.

Learn More
Build

As a verb, to compile your source code into an executable binary. As a noun, a version of your application as an executable binary.

Learn More

C

CI/CD

CI/CD streamlines and automates the process of integrating, testing, and delivering code changes to applications.

Learn More
CI/CD for Machine Learning

A CI/CD pipeline helps Machine Learning teams achieve rapid and reliable updates of models in production.

Learn More
Code Signing

Code signing is a cryptographic process that uses a digital signature to confirm a software artifact’s origin and integrity.

Learn More
Compiler

A compiler translates an application written in a higher-level programming language into a lower-level language so it can be executed.

Learn More
Container

A virtualized operating system environment that includes an application and its dependencies, helping it run anywhere it's deployed.

Learn More
Container Runtime Security

Container runtime security is a component of application security, helping to detect/mitigate issues that impact running containers.

Learn More
Continuous Delivery

A philosophy that your software updates should be continuously delivered to the target, although deployment to the user is still...

Learn More
Continuous Deployment

Like Continuous Delivery, a philosophy that your software updates should be continuously delivered to the target. However, Continuous...

Learn More
Continuous Integration

Enabled by a Continuous Integration tool like JFrog Pipelines, merging all developers’ working codebase with the source, multiple...

Learn More
Contract Testing

Contract testing is a type of software testing that evaluates interactions between software services. It...

Learn More
CSPM

Cloud environments typically include a large number of diverse workloads running across multiple cloud services, with thousands of human...

Learn More
CVE

共通脆弱性識別子 (CVE) は、公開されたサイバーセキュリティの脆弱性に割り当てられた一意の識別子...

Learn More
CVSS

Common Vulnerability Scoring System. A numerical score on a scale from 1 to 10, representing the potential severity of a software...

Learn More

D

DAST

Dynamic Application Security Testing is designed to test applications in real-time under operating conditions.

Learn More
Dependency

Code, librarties, or tools that your application relies on to operate. May or may not be written by a third party.

Learn More
DevOps

DevOps pertains to software development and is a contraction of the words “Development” and...

Learn More
DevSecOps

DevSecOps is the incorporation of continuous security testing into all stages of the software development lifecycle (SDLC). Development,...

Learn More
Docker

A virtualization tool that allows you to deliver your software in a particular type of package called a container, which includes an...

Learn More
Docker Alternatives

Docker alternatives are containerization tools and platforms that provide functionalities similar to...

Learn More

F

Fine Tuning LLMs

Fine-tuning LLMs on narrowly focused datasets enables them to acquire deep domain expertise, significantly improving their accuracy and...

Learn More

H

Helm

A package manager for Kubernetes. Written in YAML, a Helm chart allows you to define, install, and upgrade complex Kubernetes...

Learn More
HTTP proxy

An HTTP proxy, also known as an Internet proxy, is a special type of server that sits between Web servers and clients, intercepting...

Learn More

I

Identity and Access Management (IAM)

Identity and Access Management (IAM) is the practice of ensuring the right users and devices have appropriate access to technology...

Learn More
Infrastructure as Code (IaC)

Infrastructure as Code (IaC) is the practice of managing and provisioning computing infrastructure, such as virtual machines, networks,...

Learn More
Insider Threats

Insider threats refer to security risks that originate from individuals within an organization,  such as current employees, former...

Learn More
Integration Tests

A type of testing that verifies entire parts of an application work when combined with other parts of an application.

Learn More
Interpreter

A tool that translates source code in a higher-level language into a lower-level language for execution, line-by-line, at runtime....

Learn More

K

Kubernetes

A container orchestration tool designed to make the deployment and management of containerized applications easier. Think of it like the...

Learn More

L

Large Language Model Operations (LLMOps)

LLMOps is a systematic approach to developing, deploying, and operating Large Language Models (LLMs). By bringing consistency to this...

Learn More
License

A legal document that defines how a piece of software may be used, and what the implications are for using it. Licenses may define rules...

Learn More
Local Repository

In the context of JFrog Artifactory, a particular type of repository that contains code originating on your local machine. Does not...

Learn More

M

Machine Learning (ML) Model

A Machine Learning (ML) model is a program that has been trained on a dataset using an algorithm. By...

Learn More
Microservice

A software development architecture that breaks your application up into multiple independent services that interact with one another....

Learn More
Microservices Security

Microservices security refers to the practices, tools, and strategies used to protect distributed applications built with a...

Learn More
ML Experiment Tracking Tool

An ML experiment tracking tool helps to manage all the activities related to experiment runs and streamlines the research process.

Learn More
ML Model Interpretability

ML model interpretability refers to easily a human being can interpret and understand how the model arrived at its decision or...

Learn More
MLOps

MLOps is a combination of practices and tools designed to bridge the gap between data science and operations, encompassing the...

Learn More
Model Deployment

Model deployment is the step within the machine learning life cycle where a new model moves into a...

Learn More
Model Registry

A model registry in MLOps (Machine Learning Operations) is a centralized repository that manages the lifecycle of machine learning...

Learn More
ModelOps

ModelOps is a set of practices that businesses can use to derive maximum value from machine learning...

Learn More
Monolith

A software development architecture wherein your application is built as a single unit -- front-end, back-end, and database. Until...

Learn More

N

NuGet

NuGet is a commonly-used package manager that simplifies dependency management by enabling developers to easily add, remove, and update...

Learn More

O

Operational Risk Management

Operational Risk Management (ORM) refers to the practices and processes for identifying, assessing, and mitigating risks associated with...

Learn More

P

Package Management

Packages are bundles of code used to extend the functionality of an application.

Learn More

R

RBAC

Role-Based Access Control (RBAC) is a method for restricting system access to authorized users. Instead of assigning permissions...

Learn More
Real-Time Machine Learning

Real-time machine learning is the capability of ML systems to make predictions and adapt to new data instantaneously. This real-time...

Learn More
Remote Repository

In the context of JFrog Artifactory, a repository type that contains only remote code with an original source outside of your local...

Learn More
Repository

A place to organize your source code or artifacts into one cohesive, organized group by application or project. Tools like GitHub are...

Learn More

S

SAST

Static Application Security Testing  (SAST), is a type of application security testing that scans applications in a static state to...

Learn More
SBOM

An SBOM is a list of all of the components used to build and run an application. They include an inventory of any modules, libraries,...

Learn More
SCA

Software Composition Analysis (SCA) is the use of automated tools to identify open source components within an application’s code...

Learn More
SDLC

The software development life cycle, or SDLC, is the set of phases that occur as developers create software. It includes a series of...

Learn More
Secrets Management

Secrets Management, vital in Application Security (AppSec), protects sensitive credentials like API keys and passwords across their...

Learn More
Security Misconfigurations

Security Misconfigurations refer to the incorrect or suboptimal configuration of a system component or security control, leading to a...

Learn More
Service Mesh

A tool that makes it easier to monitor and control the flow of information between the microservices that make up your application. This...

Learn More
Shift Left

Shift Left is a software development security strategy and practice that integrates security measures as...

Learn More
Software Artifact Repository

A software artifact repository is a centralized storage system used in software development to manage...

Learn More
Software Artifacts

A software artifact is any item produced during the development of software, whether tangible or...

Learn More
Software Provenance

Software provenance is the metadata that records the origin, development, and delivery of software components.

Learn More
Source Control

A tool that helps manage your uncompiled source code into repositories. Examples are GitHub or Bitbucket.

Learn More
SSDF

The Secure Software Development Framework (SSDF) is a set of practices from NIST designed to embed security throughout the software...

Learn More

U

Unit Tests

A type of test that aims to verify functionality within a very specific, narrow scope, e.g., a specific function or class.

Learn More

V

Virtual Repository

In the context of JFrog Artifactory, a type of repository that acts as an envelope around the local and remote repositories that make up...

Learn More

Y

YAML

A data serialization language designed to be human-readable, frequently used for configuration files in DevOps and beyond.

Learn More

DevOps

CI/CD

CI/CD streamlines and automates the process of integrating, testing, and delivering code changes to applications.

Learn More
Docker Alternatives

Docker alternatives are containerization tools and platforms that provide functionalities similar to...

Learn More
Model Deployment

Model deployment is the step within the machine learning life cycle where a new model moves into a...

Learn More
NuGet

NuGet is a commonly-used package manager that simplifies dependency management by enabling developers to easily add, remove, and update...

Learn More
Package Management

Packages are bundles of code used to extend the functionality of an application.

Learn More
Software Artifact Repository

A software artifact repository is a centralized storage system used in software development to manage...

Learn More
Software Artifacts

A software artifact is any item produced during the development of software, whether tangible or...

Learn More

DevSecOps

Access Control

Access control defines and enforces who can access or modify digital resources to protect data and ensure compliance.

Learn More
API Security

API security mitigates attackers' abuse of an Application Programming Interface to disrupt systems or steal data.

Learn More
Application Security

 Application security refers to the measures taken to protect software applications from threats and vulnerabilities.

Learn More
AST

Application Security Testing (AST) identifies, reports, and detects vulnerabilities in software applications throughout the SDLC.

Learn More
Backdoor Attack

A backdoor attack is a technique used by threat actors to create a hidden entry point into an application or environment.

Learn More
Code Signing

Code signing is a cryptographic process that uses a digital signature to confirm a software artifact’s origin and integrity.

Learn More
Container Runtime Security

Container runtime security is a component of application security, helping to detect/mitigate issues that impact running containers.

Learn More
Contract Testing

Contract testing is a type of software testing that evaluates interactions between software services. It...

Learn More
CSPM

Cloud environments typically include a large number of diverse workloads running across multiple cloud services, with thousands of human...

Learn More
CVE

共通脆弱性識別子 (CVE) は、公開されたサイバーセキュリティの脆弱性に割り当てられた一意の識別子...

Learn More
CVSS

Common Vulnerability Scoring System. A numerical score on a scale from 1 to 10, representing the potential severity of a software...

Learn More
DAST

Dynamic Application Security Testing is designed to test applications in real-time under operating conditions.

Learn More
HTTP proxy

An HTTP proxy, also known as an Internet proxy, is a special type of server that sits between Web servers and clients, intercepting...

Learn More
Identity and Access Management (IAM)

Identity and Access Management (IAM) is the practice of ensuring the right users and devices have appropriate access to technology...

Learn More
Infrastructure as Code (IaC)

Infrastructure as Code (IaC) is the practice of managing and provisioning computing infrastructure, such as virtual machines, networks,...

Learn More
Insider Threats

Insider threats refer to security risks that originate from individuals within an organization,  such as current employees, former...

Learn More
License

A legal document that defines how a piece of software may be used, and what the implications are for using it. Licenses may define rules...

Learn More
Microservices Security

Microservices security refers to the practices, tools, and strategies used to protect distributed applications built with a...

Learn More
Operational Risk Management

Operational Risk Management (ORM) refers to the practices and processes for identifying, assessing, and mitigating risks associated with...

Learn More
RBAC

Role-Based Access Control (RBAC) is a method for restricting system access to authorized users. Instead of assigning permissions...

Learn More
SAST

Static Application Security Testing  (SAST), is a type of application security testing that scans applications in a static state to...

Learn More
Secrets Management

Secrets Management, vital in Application Security (AppSec), protects sensitive credentials like API keys and passwords across their...

Learn More
Security Misconfigurations

Security Misconfigurations refer to the incorrect or suboptimal configuration of a system component or security control, leading to a...

Learn More
Shift Left

Shift Left is a software development security strategy and practice that integrates security measures as...

Learn More

GRC

SBOM

An SBOM is a list of all of the components used to build and run an application. They include an inventory of any modules, libraries,...

Learn More
Software Provenance

Software provenance is the metadata that records the origin, development, and delivery of software components.

Learn More
SSDF

The Secure Software Development Framework (SSDF) is a set of practices from NIST designed to embed security throughout the software...

Learn More

MLOps

CI/CD for Machine Learning

A CI/CD pipeline helps Machine Learning teams achieve rapid and reliable updates of models in production.

Learn More
Fine Tuning LLMs

Fine-tuning LLMs on narrowly focused datasets enables them to acquire deep domain expertise, significantly improving their accuracy and...

Learn More
Large Language Model Operations (LLMOps)

LLMOps is a systematic approach to developing, deploying, and operating Large Language Models (LLMs). By bringing consistency to this...

Learn More
Machine Learning (ML) Model

A Machine Learning (ML) model is a program that has been trained on a dataset using an algorithm. By...

Learn More
ML Experiment Tracking Tool

An ML experiment tracking tool helps to manage all the activities related to experiment runs and streamlines the research process.

Learn More
ML Model Interpretability

ML model interpretability refers to easily a human being can interpret and understand how the model arrived at its decision or...

Learn More
Model Registry

A model registry in MLOps (Machine Learning Operations) is a centralized repository that manages the lifecycle of machine learning...

Learn More
ModelOps

ModelOps is a set of practices that businesses can use to derive maximum value from machine learning...

Learn More
Real-Time Machine Learning

Real-time machine learning is the capability of ML systems to make predictions and adapt to new data instantaneously. This real-time...

Learn More

SDLC

Compiler

A compiler translates an application written in a higher-level programming language into a lower-level language so it can be executed.

Learn More
Integration Tests

A type of testing that verifies entire parts of an application work when combined with other parts of an application.

Learn More
Monolith

A software development architecture wherein your application is built as a single unit -- front-end, back-end, and database. Until...

Learn More
SCA

Software Composition Analysis (SCA) is the use of automated tools to identify open source components within an application’s code...

Learn More
Source Control

A tool that helps manage your uncompiled source code into repositories. Examples are GitHub or Bitbucket.

Learn More
Unit Tests

A type of test that aims to verify functionality within a very specific, narrow scope, e.g., a specific function or class.

Learn More