Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1053

SLSA Framework

What is SLSA Framework?

SLSA FrameworkSupply-chain Levels for Software Artifacts: a tiered set of requirements published by OpenSSF that progressively hardens how software is built, signed, and verified against supply-chain tampering.


SLSA (pronounced "salsa") is a community framework hosted by OpenSSF that helps producers and consumers reason about the integrity of build pipelines. It defines build levels (L1-L3+ in current versions), source and dependency requirements, and signed provenance describing what was built, how, and from which inputs. Higher levels demand reproducible builds, hermetic build environments, isolated, ephemeral build platforms, and verifiable provenance. SLSA complements SBOM (which lists components) and frameworks like NIST SSDF and CISA Secure by Design. Adoption typically combines tools such as GitHub Actions reusable workflows, Tekton Chains, Sigstore Cosign, and in-toto attestations. SLSA is becoming a baseline expectation in regulated and federal procurement.

Examples

  1. 01

    Reaching SLSA build level 3 by using GitHub's reusable workflows and signed provenance.

  2. 02

    Verifying SLSA provenance at deploy time as part of admission controls in Kubernetes.

Frequently asked questions

What is SLSA Framework?

Supply-chain Levels for Software Artifacts: a tiered set of requirements published by OpenSSF that progressively hardens how software is built, signed, and verified against supply-chain tampering. It belongs to the Application Security category of cybersecurity.

What does SLSA Framework mean?

Supply-chain Levels for Software Artifacts: a tiered set of requirements published by OpenSSF that progressively hardens how software is built, signed, and verified against supply-chain tampering.

How does SLSA Framework work?

SLSA (pronounced "salsa") is a community framework hosted by OpenSSF that helps producers and consumers reason about the integrity of build pipelines. It defines build levels (L1-L3+ in current versions), source and dependency requirements, and signed provenance describing what was built, how, and from which inputs. Higher levels demand reproducible builds, hermetic build environments, isolated, ephemeral build platforms, and verifiable provenance. SLSA complements SBOM (which lists components) and frameworks like NIST SSDF and CISA Secure by Design. Adoption typically combines tools such as GitHub Actions reusable workflows, Tekton Chains, Sigstore Cosign, and in-toto attestations. SLSA is becoming a baseline expectation in regulated and federal procurement.

How do you defend against SLSA Framework?

Defences for SLSA Framework typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SLSA Framework?

Common alternative names include: SLSA, Supply-chain Levels for Software Artifacts.

Related terms

See also