Full AWS Practitioner Certification Question

How can the verification of pedigree be ensured during the secure transfer of software using methods such as chain of custody, authenticity, and integrity?