Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Artifact Attestations #947

Closed
github-product-roadmap opened this issue Mar 27, 2024 · 1 comment
Closed

Artifact Attestations #947

github-product-roadmap opened this issue Mar 27, 2024 · 1 comment
Labels
actions Feature: GitHub Actions beta Feature phase: Beta github enterprise Product SKU: GitHub Enterprise shipped Shipped

Comments

@github-product-roadmap
Copy link
Collaborator

github-product-roadmap commented Mar 27, 2024

Summary

The SLSA framework defines a gradually increasing set of security measures designed to ensure the integrity of software artifacts throughout the supply chain. Once an organization reaches SLSA Build Level 2, they’ve implemented a substantial set of best practices to help secure their software supply chain.

Summary

Sigstore and SLSA (Supply chain levels for Software Artifacts) are two initiatives designed to ehance the security of the software supply chain.

The Sigstore project provides infrastructure for keyless signing, verifying, and protecting software. By using cryptographic signatures, Sigstore enables developers and users to verify the integrity an dorigin of software artifacts, thus preventing insertion of malicious code during the sofware development and distribution process. In addition to the tooling the project sponsors graciously host a public good instance with transparency log to enable the broader community to adopt signing as part of their workflow.

Supply-chain Levels for Software Artifacts (SLSA) is a security framework that helps ensure the security and integrity of your software supply chain. In particular it defines a build provenance attestation to describe how an artifact of set of artifacts was produced. The build provenance contains information such as the repository, commit, and workflow where the artifact was produced which you may not want published to a public log.

Intended Outcome

Artifact Attestations enables you to realize all of the benefits of Sigstore and SLSA while keeping your information private.

How will it work?

Customers will be able to:

  • Use first party GitHub Actions to generate and sign build provenance attestations for any artifact.
  • Store those attestations securely in the GitHub attestation store.
  • Download and verify attestations using the GitHub Cli.
@github github locked and limited conversation to collaborators Mar 27, 2024
@github-product-roadmap github-product-roadmap added actions Feature: GitHub Actions beta Feature phase: Beta github enterprise Product SKU: GitHub Enterprise labels Mar 27, 2024
@ankneis ankneis changed the title Enterprise Build Provenance Artifact Attestations Mar 29, 2024
@ankneis ankneis added the shipped Shipped label May 3, 2024
@ankneis
Copy link
Collaborator

ankneis commented May 3, 2024

@ankneis ankneis closed this as completed May 3, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
actions Feature: GitHub Actions beta Feature phase: Beta github enterprise Product SKU: GitHub Enterprise shipped Shipped
Projects
Status: Q2 2024 – Apr-Jun
Development

No branches or pull requests

2 participants