Главная
Study mode:
on
1
Intro
2
Sigstore Ecosystem
3
Where are the keys?
4
Compromise
5
Trust in Services
6
Key management requirements
7
TUF introduction - continued
8
TUF - Example deployment
9
Pictures of where TUF is used
10
Sigstore Community Root
11
Initial Root Trust
12
Ceremony Operations
13
Root Management
14
Sigstore TUF Target Layout
15
Sigstore Client Usage
16
Client integration
17
Client Ecosystem
18
Find out more
Description:
Explore the security and trustworthiness of Sigstore's keyless code signing service in this 27-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Delve into the Sigstore ecosystem, examining how it protects public infrastructure while adhering to core principles of openness. Learn about the trust root, key management requirements, and the implementation of The Update Framework (TUF). Witness a live demonstration simulating a real-life compromise of critical components to test Sigstore's resilience. Gain insights into the Sigstore Community Root, initial trust establishment, ceremony operations, and root management. Discover the Sigstore TUF target layout, client usage, integration, and ecosystem. Equip yourself with knowledge to understand and trust Sigstore signatures for enhanced software supply chain security.

No Keys? No Problem - Why You Can Trust Sigstore Signatures

CNCF [Cloud Native Computing Foundation]
Add to list