Software Supply Chain Security: SBOM, SLSA, Sigstore (2025)
Oct 26, 2025•
supply-chainsbomslsasigstore
• 0
Modern software depends on a complex supply chain. Secure it with transparency, provenance, and verification.
SBOM
- Generate in CI (CycloneDX/SPDX); include licenses; publish with artifacts
Provenance (SLSA)
- Attest who built what, when, and how; aim for SLSA Level 3+ over time
Signing/verification
- Cosign for container/image signing; policy to verify before deploy
cosign sign --key cosign.key image:tag
cosign verify image:tag
Dependency risk
- Pin versions; minimal allowlists; renovate/bot PRs; vuln scanning (SCA)
CI hardening
- Isolated runners; OIDC to cloud; least-privilege; no long-lived secrets
Deployment gates
- Require verified signatures and valid SBOM before rollout
FAQ
Q: Is SBOM enough?
A: No—use provenance and signature verification to ensure integrity, plus runtime controls.