Supply-chain Levels for Software Artifacts
SLSA (pronounced 'salsa') is a security framework made up of standards and controls designed to protect software supply chains from tampering, vulnerabilities, and targeted attacks. It provides incrementally adoptable levels, allowing organizations to improve their software supply chain security posture in stages. The framework gives practitioners a common language for discussing and measuring supply chain integrity from source code to deployed service.
SLSA is an incrementally adoptable, industry-established security framework consisting of a checklist of standards and controls targeting the software delivery supply chain. It addresses integrity and tamper-resistance across the full software lifecycle, from source through build to package distribution. The framework defines tiered levels of assurance, enabling organizations to adopt controls progressively rather than requiring full conformance immediately. SLSA is maintained under the Open Source Security Foundation (OpenSSF) and is intended to establish a common vocabulary and measurable criteria for supply chain security guarantees.
Why it matters
Software supply chain attacks have become a significant and growing threat vector, targeting the processes and infrastructure used to build and distribute software rather than the end applications themselves. When an attacker compromises a build system, a source repository, or a package distribution channel, they can introduce malicious code that propagates to every downstream consumer without any visible change to the original source. The SolarWinds attack demonstrated how a compromised build pipeline could be used to distribute backdoored software to thousands of organizations, illustrating that securing only the application code is insufficient if the delivery infrastructure itself is vulnerable.
Who it's relevant to
Inside SLSA
Common questions
Answers to the questions practitioners most commonly ask about SLSA.