layout | title | parent | nav_order |
---|---|---|---|
page |
Distributing with OCI Registries |
Supply Chains |
1 |
As we think of SCITT providing a ledger, attesting to transparency and trust, these are new, developing capabilities that will take time to evolve, and be deployed across all cloud providers, for each software vendor, or company that builds software to run in their environment.
There are existing capabilities that can be used today, that are production supported services, based on standards that run on all cloud providers and are available as on-premise products and projects.
Using the supply chain above, we can see the use of:
- OCI Distribution based registries{:target="_blank"} for securely storing and distributing all types of artifacts.
- COSE based signatures{:target="_blank"}: for sealing artifacts with verifiable identities.
- Creation: The output of a build environment publishes the container images, or other packages, to an OCI Distribution{:target="_blank"} based registry. This includes an SBOM and internal build evidence that would be maintained. All published artifacts are signed with a COSE{:target="_blank"} based signature, using
notation sign
assuring there's a verifiable identity associated with each artifact. - Verification: Subsequent verification processes may write claims to the registry, with a verifiable COSE based signature.
- Distribution: The publisher (Wabbit Networks) may choose to publish a subset of the related artifacts as the internal claims are maintained for forensics should any issues arise.
- Consumer Distribution: The consumer (ACME Rockets) subscribes to the
net-monitor:v1
published artifact, and copies all the related artifacts usingoras copy
{:target="_blank"}.
See Artifact Updates for subsequent updates, such as newly discovered vulnerabilities, redirects and revocation. - Consumer Verification: As part of the ACME Rockets verification steps additional scans may be applied to consumed artifacts and updates. Additional claims are added, attesting to the allowed usage within the ACME Rockets environment. The additional claims are signed by ACME Rockets, which may supersede any claims made by the publisher (Wabbit Networks).
- Consumption: As a consumer deploys their software, they'll want to verify the artifacts are intended for the particular environment. Using
notation verify <artifact>
, a consumer can assure it's from a trusted identity, approved for consumption in the target environment.
TODO: add claims verification usingoras discover/pull
- Archival: As ACME Rockets upgrades
net-monitor:v1
to a newer version, or simply phases out the usage of thenet-monitor:v1
software, a copy is made to the archival registry. Additional claims are added for when the artifact was in production, providing information to security scans that may identify potential exploits that must be investigated. The artifacts in the archive registry are maintained for whatever policy is required. As that policy expires, the artifacts and evidence may be purged.
ACME Rockets, like most companies, want their private software environments to remain private, even though they may be running on public clouds. By leveraging cloud provider OCI Distribution based registries, consumers benefit from private network support, as well as regional availability and global replication for locality and reliability.
Up Next: