Enforceable Supply Chain Security Policy with OPA Gatekeeper and Ratify
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Explore how to establish trust for container images and enforce security policies in the software supply chain using OPA Gatekeeper and Ratify in this 36-minute conference talk. Learn about mitigating container supply chain threats through techniques such as image signing and verification, policy enforcement, SBOM generation, provenance attestation, and vulnerability scanning. Discover how Ratify, built as an external data provider for Gatekeeper, enables the enforcement of security policies by verifying image signatures, vulnerability reports, and SBOMs. Watch a demonstration on implementing admission control policies to ensure only compliant images are deployed, resulting in a more secure container supply chain. Gain insights into safeguarding your software ecosystem against rising threats and enhancing overall security posture.
Syllabus
Enforceable Supply Chain Security Policy with OPA Gatekeeper and Ratify - Feynman Zhou & Dahu Kuang
Taught by
CNCF [Cloud Native Computing Foundation]