Level-up Container Security: 4 Open-Source Tools for Secure Software Supply Chain

This page summarizes the projects mentioned and recommended in the original post on dev.to

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • copacetic

    🧵 CLI tool for directly patching container images using reports from vulnerability scanners

  • Copacetic, another open-source gem, works in tandem with Trivy to tackle vulnerabilities in container images.

  • ratify

    Artifact Ratification Framework

  • Ratify is an admission controller. It's available both as a binary and as a Kubernetes tool installed via a Helm Chart. It ensures that only signed images are deployed. It's an invaluable tool for safeguarding your AKS cluster by preventing unsigned container images from being deployed.

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • secure-supply-chain-on-aks

    Learn how to use open-source tools to secure your container deployments on Azure Kubernetes Service.

  • Learn how to add these tools to your existing pipelines, with this step-by-step workshop!

  • notation

    A CLI tool to sign and verify artifacts (by notaryproject)

  • Notation is another command-line too that lets you digitally sign artifacts. And those signatures essentaily become the stamps of approval for the different things in your software supply chain. For example, container images.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts