Giter Club home page Giter Club logo

microsoft / secure-software-supply-chain-on-aks Goto Github PK

View Code? Open in Web Editor NEW
3.0 3.0 4.0 628 KB

An example approach to securing containerized workloads within AKS using Notation.

License: MIT License

Dockerfile 3.35% Shell 45.11% C# 4.30% Go 18.61% Java 19.73% JavaScript 8.90%
azure-container-registry azure-key-vault azure-kubernetes-service gatekeeper notation ratify secure-software-supply-chain secure-supply-chain signing signing-certificates

secure-software-supply-chain-on-aks's Introduction

Assure workload integrity in AKS with secure software supply chain

Open in GitHub Codespaces Open in Dev Container

Overview

This repo offers a step-by-step guide on how to establish centralized control for risk management by creating software supply chain components and employing policies. This walkthrough covers the following aspects of the secure software supply chain:

  • Generation of the software bill of materials (SBOM) by analyzing source code, dependencies, and container image packages using Microsoft's SBOM tool.
  • Production of vulnerability reports using Aquasec's Trivy.
  • Signing of both the container image and security artifacts using Notation.
  • Bundling of the signatures, security artifacts, and container image (the software release) using ORAS .
  • Enforcement of policies through Gatekeeper and Ratify as part of the admission control process.

Architecture

The following architecture will be provisioned and configured upon successful completion of the walkthrough. For a more detailed breakdown see provisioned infrastructure.

Solution infrastructure, described further on the page linked above

Getting started

Fork repository

This walkthrough requires the user have certain permissions at the repository level. Fork the repository and work within the fork to make sure all steps can be performed.

Walkthrough environment

It is highly recommended to leverage the supplied Visual Studio Code development container or GitHub Codespaces when working with this walkthrough. The devcontainer, which is also used by Codespaces, includes all the required tooling with no additional steps or configuration.

If not utilizing the devcontainer or Codespaces, review the list of required utilities and verify each is installed and configured.

Pipeline options

When working with this walkthrough, there are two pipeline options for building images and artifacts: Azure Pipelines and GitHub Actions. Each option requires a slightly different configuration.

Please ensure the walkthrough environment is up and running before continuing with either pipeline option.

Starting with the desired pipeline option, this guide is composed of five steps:

  1. Infrastructure configuration
  2. Inspect container images and artifacts
  3. Policy definition and assignment
  4. Workload deployment and policy enforcement
  5. Teardown

Continue with Azure Pipelines

Continue with GitHub Actions

Additional references

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

secure-software-supply-chain-on-aks's People

Contributors

cmaclaughlin avatar dependabot[bot] avatar microsoft-github-operations[bot] avatar microsoftopensource avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.