<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Pavel</title>
    <description>The latest articles on DEV Community by Pavel (@taleodor).</description>
    <link>https://dev.to/taleodor</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3297580%2F77ecee2b-383f-4e7f-83bb-46a399af6534.png</url>
      <title>DEV Community: Pavel</title>
      <link>https://dev.to/taleodor</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/taleodor"/>
    <language>en</language>
    <item>
      <title>[Boost]</title>
      <dc:creator>Pavel</dc:creator>
      <pubDate>Sat, 21 Mar 2026 00:50:17 +0000</pubDate>
      <link>https://dev.to/taleodor/-41ga</link>
      <guid>https://dev.to/taleodor/-41ga</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9" class="crayons-story__hidden-navigation-link"&gt;Evidence Stores for Supply Chain Security&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/taleodor" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3297580%2F77ecee2b-383f-4e7f-83bb-46a399af6534.png" alt="taleodor profile" class="crayons-avatar__image" width="800" height="626"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/taleodor" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Pavel
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Pavel
                
              
              &lt;div id="story-author-preview-content-3377019" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/taleodor" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3297580%2F77ecee2b-383f-4e7f-83bb-46a399af6534.png" class="crayons-avatar__image" alt="" width="800" height="626"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Pavel&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 20&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9" id="article-link-3377019"&gt;
          Evidence Stores for Supply Chain Security
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tooling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tooling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/supplychain"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;supplychain&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/evidence"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;evidence&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            3 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>tooling</category>
      <category>security</category>
      <category>supplychain</category>
      <category>evidence</category>
    </item>
    <item>
      <title>Evidence Stores for Supply Chain Security</title>
      <dc:creator>Pavel</dc:creator>
      <pubDate>Fri, 20 Mar 2026 22:33:07 +0000</pubDate>
      <link>https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9</link>
      <guid>https://dev.to/taleodor/evidence-stores-for-supply-chain-security-3jj9</guid>
      <description>&lt;p&gt;Supply chain security is currently Top 3 on OWASP 2025 Top 10 list. There is growing acknowledgement in the industry that supply chain security becomes is increasingly important and growing number of cyber attacks now involve supply chain compromises as at least one of the vectors.&lt;/p&gt;

&lt;p&gt;With that the question how to protect one's supply chain becomes highly visible.&lt;/p&gt;

&lt;h2&gt;
  
  
  2020 Mindset Still Present
&lt;/h2&gt;

&lt;p&gt;A lot of tooling is still stuck in the pre-Log4Shell times, when you would point a scanner to source code repository and take results every 6 months, or if you're prudent, every 3 months.&lt;/p&gt;

&lt;p&gt;But what such results actually represent? How do they correlate to the actual product version that you or your clients are currently running. If there is a customer still running a version released 12 months ago, would it be of any help to them to know that the most recent scan over most recent state over the source code repository came out clean?&lt;/p&gt;

&lt;h2&gt;
  
  
  Tooling Evolution
&lt;/h2&gt;

&lt;p&gt;Modern times require modern tools. Tools like &lt;a href="https://rearmhq.com" rel="noopener noreferrer"&gt;ReARM&lt;/a&gt; that support modern standards such as emerging &lt;a href="https://github.com/CycloneDX/transparency-exchange-api/" rel="noopener noreferrer"&gt;Transparency Exchange API&lt;/a&gt; are the answer.&lt;/p&gt;

&lt;p&gt;Essentially, we're talking here about &lt;a href="https://worklifenotes.com/2024/10/08/release-metadata-organization-model/" rel="noopener noreferrer"&gt;Product-Component release metadata organization model&lt;/a&gt; which allows to track per-release cybersecurity posture of any software or hardware product in real-time.&lt;/p&gt;

&lt;p&gt;New findings would be recorded against particular versions of products or components thus giving clear picture of where the main risks come from.&lt;/p&gt;

&lt;h2&gt;
  
  
  Regulatory Pressure
&lt;/h2&gt;

&lt;p&gt;New regulations such as EU CRA introduce further pressure to implement such mechanisms as quickly as possible. Per EU CRA, among other obligations, every manufacturer of Products with Digital Elements would have to maintain per-release SBOMs and other documentation and store these artifacts for prolonged period of time, typically 10 years or longer.&lt;/p&gt;

&lt;p&gt;This puts additional need for organizations to explore and adopt tooling which can support these requirements.&lt;/p&gt;

&lt;h2&gt;
  
  
  Evidence Gathering Unification
&lt;/h2&gt;

&lt;p&gt;Similarly, patterns like &lt;a href="https://rearmhq.com/blog/2026-01-14-dockerfile-sbom/" rel="noopener noreferrer"&gt;Dockerfile.sbom&lt;/a&gt; emerge. This allows developers to have unified way to capture supply chain evidences, such as SBOMs during CI phase of their release lifecycle.&lt;/p&gt;

&lt;h2&gt;
  
  
  Towards Unified Release Management System
&lt;/h2&gt;

&lt;p&gt;Most building blocks are already available with modern tooling, such as ReARM. This includes also FOSS solutions, such as self-hosted &lt;a href="https://github.com/relizaio/rearm" rel="noopener noreferrer"&gt;ReARM CE&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;With this it is possible to create a system where each build has its evidence artifacts generated at CI time, stored in the centralized evidence management platform, &lt;a href="https://docs.rearmhq.com/bundling/" rel="noopener noreferrer"&gt;bundled&lt;/a&gt; into product releases, subjected to established approval process and then continuously evaluated against existing and new threats.&lt;/p&gt;

&lt;h2&gt;
  
  
  Supply Chain Security and AI Revolution
&lt;/h2&gt;

&lt;p&gt;AI puts more pressure on ensuring supply chain security not less. With development speed increasing at least 10x and attackers using creating and sophisticated techniques augmented by AI it is more important than ever to have established levels of controls via signing and attestations.&lt;/p&gt;

&lt;p&gt;Solutions like &lt;a href="https://github.com/sigstore/cosign" rel="noopener noreferrer"&gt;Cosign&lt;/a&gt;, &lt;a href="https://in-toto.io/" rel="noopener noreferrer"&gt;in-toto&lt;/a&gt; and &lt;a href="https://shiftleftcyber.io/" rel="noopener noreferrer"&gt;ShiftLeftCyber's SecureSBOM&lt;/a&gt; can be mentioned here.&lt;/p&gt;

&lt;p&gt;Again, even with signatures and attestations in place, one still needs a platform to tie everything together and provide discovery mechanics. So we're establishing the following worldview for supply chain:&lt;/p&gt;

&lt;h2&gt;
  
  
  Ultimate Vision of Transparent and Secure Supply Chains
&lt;/h2&gt;

&lt;p&gt;Each manufacturer produces a piece of software, on top of which CI system generates established set of security artifacts (SBOMs, SAST scans and others). Any dependencies used in the process should be verified against their own provided signatures and attestations. That information about dependencies is pulled from the evidence store. The results of CI including metadata, and artifacts, including signatures and attestations, are then also fed into the evidence store.&lt;/p&gt;

&lt;p&gt;So supply chain evidence platform, like ReARM, becomes the glue that ties together different independent pieces of supply chain. Now, such evidence store or platform is not meant to be centralized store of everything. For this we have new identifiers, primarily Package-URL or &lt;a href="https://github.com/package-url/purl-spec/" rel="noopener noreferrer"&gt;PURL&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;PURL is the core element that allows having decentralized system of evidence store that can be used interchangeably between various organizations. The actual mechanism how those systems communicate with each other would be Transparency-Exchange API. The future vision of which is near-instant bot-to-bot communication that is able to exchange &lt;a href="https://cyclonedx.org/" rel="noopener noreferrer"&gt;CycloneDX&lt;/a&gt; fragments of data on demand.&lt;/p&gt;

&lt;p&gt;With this every interested party is able to immediately verify the authenticity of every component in its supply chain and thus ensure integrity and security.&lt;/p&gt;

</description>
      <category>tooling</category>
      <category>security</category>
      <category>supplychain</category>
      <category>evidence</category>
    </item>
  </channel>
</rss>
