For the last couple of weeks, I've been deep diving into container supply chain security.
I built a full GitHub Actions demo pipeline:
β’ Vulnerability scanning
β’ SBOM generation
β’ Keyless signing + attestations
β’ SLSA build provenance
The stack: Trivy, Syft, Cosign, and Sigstore.
Zero long-lived secrets. GitHub Actions uses OIDC to obtain a short-lived certificate, signs the image (and publishes attestations), and records everything in a public transparency log. No keys to rotate or leak.
The post also covers hardened base images (distroless and Docker's new Hardened Images) and how to enforce signatures on the consumer side with Kubernetes admission policies.
Blog + companion repo to fork: https://lnkd.in/gtdNYWW8
#SupplyChainSecurity #SBOM #Sigstore #GitHubActions #DevSecOps #ZeroTrust