
Only download source code from authoritative websites and use integrity-checking measures, such as verifying cryptographic hashes. Verify the legitimacy of all source code acquired from third parties, whether for internal use or if planning to bundle it with products or services. To mitigate software supply chain attacks and prevent compromise and bad publicity, it is important to follow key source code security best practices for code written by both in-house developers and third parties. Software supply chain attacks increased by 430% in 2020 and 650% in 2021, according to Sonatype Inc.

The chances an organization is hit by one of these attacks is skyrocketing.
