Creating a firewall registry
Work with a firewall registry to centralize security
The Bytesafe Dependency Firewall creates a secure perimeter for your organization. It is a tool to enforce your defined business rules to turn an insecure software supply chain into a secure one. Blocking open source risk from ever entering your supply chain means preventing malicious packages from being used by your developers or CI/CD systems.
This improves the security of your organization and allows you to sleep better at night, knowing that malicious code vulnerabilities are not being introduced into production through open source package vulnerabilities.
graph TD
A(Public registries) --> | Insecure packages | B{Firewall registry};
B --> | Secure packages | C[fa:fa-user Team];
B --> | Secure packages | D[fa:fa-user Team];
B --> | Secure packages | E[fa:fa-server CI/CD];
style B fill:#b91c1c,color:#fff
The Dependency Firewall is a first line of defence against threats from malicious or vulnerable open source packages used in your organization. The firewall checks all new packages being downloaded to make sure they comply with your security and license compliance policies defined in Bytesafe.
The firewall protects you against attacks by stopping unauthorized dependencies from entering your environment. The Dependency Firewall provides an easy way to protect your organization and helps you avoid costly consequences.
The Dependency Firewall is designed for ease of use - you can be up and running within minutes (instead of spending weeks or even months recovering from an attack).
You are most likely interested in a Dependency Firewall if you would like to:
The firewall is a set of features and policies - protecting against different types of attacks.
Feature | Use case | Links |
---|---|---|
Vulnerability policy rules for Quarantine | Quarantine packages based on vulnerability severity levels | Quarantine configuration |
Protect Internal packages | Avoid dependency confusion attacks with a secure by default solution | Internal packages |
License Compliance policy rules for Quarantine | Quarantine packages based on License Compliance policy | License compliance Quarantine configuration |
Security Delay | Avoid installing newly release package versions | Delay Upstreams |
Get started by setting up your Firewall registry to protect your organizations.
Work with a firewall registry to centralize security