{"meta":{"title":"Implement supply chain best practices","intro":"How to think about securing your user accounts, your code, and your build process","product":"Security and code quality","breadcrumbs":[{"href":"/en/code-security","title":"Security and code quality"},{"href":"/en/code-security/tutorials","title":"Tutorials"},{"href":"/en/code-security/tutorials/implement-supply-chain-best-practices","title":"Implement supply chain best practices"}],"documentType":"subcategory"},"body":"# Implement supply chain best practices\n\nHow to think about securing your user accounts, your code, and your build process\n\n## Links\n\n* [Securing your end-to-end supply chain](/en/code-security/tutorials/implement-supply-chain-best-practices/end-to-end-supply-chain-overview)\n\n  Introducing best practice guides on complete end-to-end supply chain security including personal accounts, code, and build processes.\n\n* [Best practices for securing accounts](/en/code-security/tutorials/implement-supply-chain-best-practices/securing-accounts)\n\n  Guidance on how to protect accounts with access to your software supply chain.\n\n* [Best practices for securing code in your supply chain](/en/code-security/tutorials/implement-supply-chain-best-practices/securing-code)\n\n  Guidance on how to protect the center of your supply chain—the code you write and the code you depend on.\n\n* [Best practices for securing your build system](/en/code-security/tutorials/implement-supply-chain-best-practices/securing-builds)\n\n  Guidance on how to protect the end of your supply chain—the systems you use to build and distribute artifacts."}