luhring / example-container-image-supply-chain-securityLinks
Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign
☆12Updated 4 years ago
Alternatives and similar repositories for example-container-image-supply-chain-security
Users that are interested in example-container-image-supply-chain-security are comparing it to the libraries listed below
Sorting:
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated last year
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆44Updated last year
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- Dynamic GitHub Actions from Wolfi packages☆44Updated 5 months ago
- ☆20Updated 4 months ago
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated 2 months ago
- sigstore installation walkthrough, local☆63Updated last year
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- This projects contains pre-made policies for Kubernetes Validating Admission Policies. This policy library is based on Kubescape controls…☆77Updated last month
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆126Updated 3 years ago
- GitHub actions for the chainguard-images☆20Updated last week
- Trivy plugin for OCI referrers☆23Updated last year
- Helm charts for sigstore project☆83Updated last week
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- Policy Reporter Kyverno Plugin☆15Updated last year
- Safe and Controlled GitOps Promotion Across Environments/Failure-Domains☆47Updated last week
- 🔍 Rekor transparency log monitoring and alerting☆27Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated last week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆147Updated last week
- Plugin for Helm to integrate the sigstore ecosystem☆67Updated last week
- Tracking Kubernetes Operators out in the wild.☆31Updated 11 months ago
- An application that regularly scans all containers in a Kubernetes cluster for vulnerabilities☆50Updated 2 years ago
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated 2 years ago
- A pane of glass between you and your Kubernetes clusters.☆46Updated last year
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆52Updated 3 weeks ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- ☆35Updated 3 years ago
- Enabling Software Supply Chain Security Capabilities in ArgoCD☆89Updated 2 years ago