1
1
# Use Cases
2
2
3
- These are some of the use cases for SLSA. Of these the first use case (a vendor checking their
4
- own packages prior to publishing) is the most ready for adoption as it does not require
3
+ These are some of the use cases for SLSA. Of these the first use case (a developer checking
4
+ their own packages prior to publishing) is the most ready for adoption as it does not require
5
5
interactions with any other party.
6
6
7
- ## Vendor publishing a software package
7
+ ## Developer publishing a software package
8
8
9
- A vendor , BarInc, has the following goals in applying SLSA:
9
+ A developer , BarInc, has the following goals in applying SLSA:
10
10
11
11
1 . Protect their users from malicious changes to the BarImage container image.
12
12
2 . Protect their reputation, which would be harmed, if BarImage were compromised.
13
+ 3 . Access to metadata for auditing and ad-hoc analysis.
13
14
14
15
BarInc can acheive these goals when publishing the container image by:
15
16
@@ -23,6 +24,7 @@ BarInc can acheive these goals when publishing the container image by:
23
24
4 . That the build entry point listed in the provenance is what they expect.
24
25
5 . (TBD) That the binary dependencies listed in the provenance meet some minimum SLSA level.
25
26
5 . Only publishing the container image if all the checks in #4 pass.
27
+ 6 . Storing the provenance and all other attestations for future reference.
26
28
27
29
This approach allows BarInc to acheive their goals without requiring any changes from their users
28
30
or from their distribution channels. It doesn't, however, protect their users from a published
0 commit comments