A demonstration of how GoReleaser can help us to make software supply chain more secure by using bunch of tools such as cosign, syft, grype, slsa-provenance
-
Updated
Feb 10, 2022 - Go
A demonstration of how GoReleaser can help us to make software supply chain more secure by using bunch of tools such as cosign, syft, grype, slsa-provenance
Enterprise-grade AWS infrastructure deployed with Terraform: ECS Fargate, Multi-AZ RDS PostgreSQL, Application Load Balancer, WAF security, Route53 DNS. Full DevSecOps pipeline with 6 security scanners, container signing, SBOM generation, and Infracost integration.
Automated, secure Docker pipeline with image scanning and cloud/K8s deployment.
Production-ready CI/CD standardization framework for regulated environments (PCI-DSS, SOC2). Immutable pipelines with mandatory security gates, GitOps promotion, and audit-ready evidence generation. Supports Jenkins & GitLab CI, OpenShift/Kubernetes.
Example of GitHub Actions, goreleaser and cosign to release a Go based CLI program.
Custom Caddy (xcaddy) with HE DNS & CloudFront trusted proxies. Docker/Compose + cosign.
Security by Design reference: JWT/mTLS auth, RBAC, DevSecOps pipeline (SAST/DAST/SBOM/Cosign), Kubernetes hardening. Production-grade patterns.
Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the registry came from your GitHub action.
Docker image for Cosign using alpine linux as base image.
Example of using Sigstore/Cosign to secure Helm chart supply chain
This project includes containerization, Kubernetes deployment, Helm chart management, security policy enforcement, image signing, monitoring setup, and CI/CD pipeline automation.
A Github Actions pipeline that builds safer containers
Minimal Alpine-based Docker image for kubectl with automatic updates, Cosign signing, and security scanning
This is the main Git repo
Secure multi-cloud CI/CD with GitHub Actions — automated linting, testing, security scans, signing and deployments to AWS EKS & Azure AKS.
Add a description, image, and links to the cosign topic page so that developers can more easily learn about it.
To associate your repository with the cosign topic, visit your repo's landing page and select "manage topics."