Post Summary: Secure Supply Chain

Introduction to a Secure Supply Chain

Read More ...

Step 1 - Listen to Events

Read More ...

Step 2 - Pipelines

Read More ...

Step 3 - SonarQube

Read More ...

Step 4 - Verify Git Commit

Read More ...

Step 5 - Build and Sign Image

Read More ...

Step 6 - Scanning with ACS

Read More ...

Step 7 - Generating a SBOM

Read More ...

Step 8 - Updating Kubernetes Manifests

Read More ...

Step 9 - Linting Kubernetes Manifests

Read More ...

Step 10 - The Example Application

Read More ...

Step 11 - ACS Deployment Check

Read More ...

Step 12 - Verify TLog Signature

Read More ...

Step 13 - Bring it to Production

Read More ...