Reference workflows, scripts, and templates for hardening CI/CD pipelines with Sigstore, SLSA, and SBOMs.
-
Updated
Mar 14, 2026 - Shell
Reference workflows, scripts, and templates for hardening CI/CD pipelines with Sigstore, SLSA, and SBOMs.
Enterprise-grade AWS infrastructure deployed with Terraform: ECS Fargate, Multi-AZ RDS PostgreSQL, Application Load Balancer, WAF security, Route53 DNS. Full DevSecOps pipeline with 6 security scanners, container signing, SBOM generation, and Infracost integration.
Example of using Sigstore/Cosign to secure Helm chart supply chain
This project includes containerization, Kubernetes deployment, Helm chart management, security policy enforcement, image signing, monitoring setup, and CI/CD pipeline automation.
A Github Actions pipeline that builds safer containers
pwrApp - Dash application for mcce
This is the main Git repo
FastAPI fraud detection API demonstrating a verifiable container supply chain with Cosign signing, SBOM generation, and hardened Distroless Docker runtime.
Docker image for Cosign using alpine linux as base image.
A Sigstore KMS plugin for Alibaba Cloud KMS
Production-like DevSecOps platform on local Kubernetes (k3d, 3 clusters): GitOps, progressive delivery, policy-as-code, secure supply chain, Vault/ESO secrets, Step-CA PKI, and SLO-driven observability.
Demo for my talk on Developer Experience (DX)
☕ Streamline JVM workloads with hardened OCI images preinstalled with Temurin JDK 25 and JDK 26, ensuring security and performance for your applications.
AWS Pipelines utilizing Cosign to sign and verify containerized images.
Add a description, image, and links to the cosign topic page so that developers can more easily learn about it.
To associate your repository with the cosign topic, visit your repo's landing page and select "manage topics."