luhring / example-container-image-supply-chain-securityLinks
Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign
☆12Updated 4 years ago
Alternatives and similar repositories for example-container-image-supply-chain-security
Users that are interested in example-container-image-supply-chain-security are comparing it to the libraries listed below
Sorting:
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated this week
- Dynamic GitHub Actions from Wolfi packages☆44Updated 8 months ago
- ☆20Updated 7 months ago
- sigstore installation walkthrough, local☆62Updated last month
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Updated 2 years ago
- Trivy plugin for OCI referrers☆23Updated last year
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Updated last month
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆70Updated 2 weeks ago
- A pane of glass between you and your Kubernetes clusters.☆46Updated 2 years ago
- Plugin for Helm to integrate the sigstore ecosystem☆67Updated this week
- This projects contains pre-made policies for Kubernetes Validating Admission Policies. This policy library is based on Kubescape controls…☆78Updated 2 months ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆67Updated 2 weeks ago
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Tracking Kubernetes Operators out in the wild.☆31Updated last year
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆125Updated 4 years ago
- Helm charts for sigstore project☆85Updated this week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆153Updated this week
- A place for policy work group related proposals and prototypes.☆65Updated 7 months ago
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated 2 years ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- ☆35Updated 4 years ago
- Enabling Software Supply Chain Security Capabilities in ArgoCD☆92Updated 3 years ago
- Alternate reports storage in Kubernetes outside etcd☆42Updated 3 weeks ago
- K8s-shredder - an opinionated way of parking in Kubernetes☆84Updated this week
- GitHub actions for the chainguard-images☆21Updated this week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆70Updated 3 weeks ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Policy Reporter Kyverno Plugin☆15Updated last year