Kubernetes Supply Chain Security: Sigstore, SLSA, and SBOM
You build secure code. You deploy it to a hardened cluster. But where did the container image come from? Was it tampered with? Does it contain known vulnerabilities? Supply chain attacks target the build and distribution pipeline — the path between source code and running container.
The Supply Chain Security Stack
- Sigstore (Cosign): Sign container images and verify signatures before deployment. Keyless signing via OIDC.
- SLSA (Supply-chain Levels for Software Artifacts): Framework for build provenance — proving WHERE and HOW an artifact was built.
- SBOM (Software Bill of Materials): Complete inventory of components in your container image for vulnerability tracking.
Learn Supply Chain Security — Free
Module 11 of our Cloud Native Security Engineering course covers the complete supply chain security pipeline with hands-on labs.