For example would you survive a log4j style attack, and how.
Do you secure development environments against malicious code.
If you do web development how do you know the Javascript in production matches that in development.
Others go as far as distributed deterministic builds to ensure CI/CD systems themselves are not compromised.
Here are the latest public iterations of my recommendations.
https://github.com/talos-systems/rfcs/blob/main/001-software...
Also here are complimentary practices to ensure the production engineers that must have access to CI/CD systems etc don't themselves become a weak link in the supply chain (which happens a -lot-).
https://github.com/hashbang/book/blob/master/content/docs/se...
Shameless plug: My company Distrust (short for Distributed Trust), offers auditing, consulting, and support so companies can avoid single points of failure in their supply chains from third party libs to the hands of end users. Happy to chat with anyone that wants some outside eyes in this area!