You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An attestation is a cryptographically signed collection of claims related to one or more software artifacts. According to SLSA, an attestation consists of authenticated statements about a software artifact or a collection of software artifacts. Examples include signed provenance files or signed SBOM files for container images. Attestations are crucial for ensuring the security and trustworthiness of the software supply chain.
Attestations are typically involved in the processes of creating attestations for software artifacts and verifying them before using the corresponding software artifacts. For instance, users generate SBOM attestations for container images in CI/CD pipelines and verify these attestations at admission control before deploying the container images on K8s clusters.
In-toto attestations are popular in the cloud-native ecosystem as part of the in-toto framework, which is designed to secure the integrity of software supply chains. You can find existing vetted predicates. Below are some examples of their adoption:
To adopt in-toto attestations, the following open issues should be considered by the Notary Project community:
Unsupported Envelope Type: In-toto attestations utilize the DSSE envelope and do not support the Notary Project signature envelopes such as JWS/COSE.
Performance concern: Since the attestation includes the payload, large payload sizes (e.g., an SBOM for a Windows image, which could be hundreds of megabytes) can lead to performance issues during attestation download and verification.
Request
This issue requests the Notary Project to identify scenarios, create specifications, and provide reference implementations for attestations, including:
Scenarios for using attestations throughout the cloud-native secure supply chain.
Notary Project specification of the attestation format and storage in OCI-compliant registries.
Notary Project specification of workflows for creating and verifying attestations.
Reference implementation (Notation) of Notary Project attestation specifications including CLI specifications
Integration of Notary Project attestation tooling into popular CI/CD pipelines.
Your comments are welcome.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem?
Description
An attestation is a cryptographically signed collection of claims related to one or more software artifacts. According to SLSA, an attestation consists of authenticated statements about a software artifact or a collection of software artifacts. Examples include signed provenance files or signed SBOM files for container images. Attestations are crucial for ensuring the security and trustworthiness of the software supply chain.
Attestations are typically involved in the processes of creating attestations for software artifacts and verifying them before using the corresponding software artifacts. For instance, users generate SBOM attestations for container images in CI/CD pipelines and verify these attestations at admission control before deploying the container images on K8s clusters.
In-toto attestations are popular in the cloud-native ecosystem as part of the in-toto framework, which is designed to secure the integrity of software supply chains. You can find existing vetted predicates. Below are some examples of their adoption:
To adopt in-toto attestations, the following open issues should be considered by the Notary Project community:
Request
This issue requests the Notary Project to identify scenarios, create specifications, and provide reference implementations for attestations, including:
Your comments are welcome.
The text was updated successfully, but these errors were encountered: