You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue tracks the steps we can take to increase security of our project.
It's mostly supplied as a way to inform users that we're aware improvements could be made and is not intended as a discussion platform (please use the dev channel on discord for that)
Add signing of Helm Charts (lowers MITM/spoofing supply-chain attack-surface)
Add signing of docker images (lowers MITM/spoofing supply-chain attack-surface)
Ensure provenance generation for Helm Charts
Add automatic SBOM generation to docker build process (using syft for example, ensures SLSA L1 compliance)
Add provenance generation to docker build process (ensures SLSA L1 compliance))
Validate helm dependency signatures in chart testing pipeline
Move bot to user with less privileges (decreases the scope when the bot gets compromised)
Move org-wide admin access to dedicated account (decreases the scope when maintainers get compromised)
Validate container signatures in chart testing pipeline
Validate container signatures prior to SCALE catalog release in CI
Move helm deps train to immutable repo
Validate helm dependency signatures prior in catalog repo staging
Validate helm dependency signatures in helm-staging repo staging
Add copyright header to all files (lower potential copyright issues)
Move more complicated charts to use our BSL license (prevents other projects/iX rebranding)
Publish common helm security scan results on website (ensures users are informed on security practices)
Publish common container security scan results on website (ensures users are informed on security practices)
Write guides to help users setup signed commits (enables us to enforced signed commits in the future)
Move to enforcing signed commits (decreases the chance of contributor spoofing injecting bad-actor code)
host our own github actions instead of relying on upstreams (lowers potential supply-chain attack surface)
Add mandatory basic security scanning prior to publication (to prevent bad code making it to releases)
Move away from manifest manager where we can (directly loading code from the internet is a security risk)
Move signing/release pipelines to private repositories (prevents chances of key leakage)
Add virus scanning to container build pipeline where possible
This issue tracks the steps we can take to increase security of our project.
It's mostly supplied as a way to inform users that we're aware improvements could be made and is not intended as a discussion platform (please use the dev channel on discord for that)
For provenance and SBOM for docker images see:
https://marcofranssen.nl/secure-your-software-supply-chain-using-sigstore-and-github-actions
Proposed flow:
After merge:
On catalog-repo (not accepting PR's, locked down repo):
On helm-staging (not accepting PR's, locked down repo):
Bottom line: Signatures get checked during PR testing AND right before the build is finalised
The text was updated successfully, but these errors were encountered: