Security

Sigstore

Sigstore is a provenance store that is immutable and read-only. Sigstore's immutability provides guarantees that any data entered into sigstore cannot be tampered or amended after entry. This makes sigstore particularly conducive for the transparency of software...

read more

Thoth

Project Thoth is developed in the AI Center of Excellence at Red Hat and it aims at providing recommendations on Python software stacks, runtime environments, and deployment configurations to developers and DevOps engineers through different types of integrations...

read more

Keylime

Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Keylime enables users to monitor remote nodes using a hardware based cryptographic root of trust. Project Site https://keylime.dev Project Source Code...

read more

Enarx

Enarx is an application deployment system enabling applications to run within Trusted Execution Environments (TEEs) without rewriting for particular platforms or SDKs. It handles attestation and delivery into a run-time “Keep” based on WebAssembly, offering developers...

read more

Tekton Chains

Chains is a security subsystem of the Kubernetes Tekton CI/CD pipeline. Chains will enable Tekton continuous delivery to securely capture metadata about PipelineRun and TaskRun execution for post-run auditing. This can then be used for binary provenance and verifiable...

read more