Achieving SLSA 3 Compliance with GitHub Actions and Sigstore for Go modules
Blog post from GitHub
In response to increasing concerns about supply chain security, particularly following incidents like the Log4j vulnerability and Solarwinds attack, GitHub has introduced new tools and workflows to enhance software build security and meet the SLSA Level 3 compliance standard. This involves leveraging GitHub Actions and Sigstore's tools to automatically generate non-forgeable provenance metadata, ensuring the authenticity and origin of software artifacts. These measures allow developers to verify not only the authenticity of the software they receive but also details about its build environment. The Sigstore project comprises tools such as Cosign, Fulcio, and Rekor, which help in signing software, issuing short-lived certificates, and maintaining a secure log of signing events. This initiative aligns with the NIST framework, emphasizing the need for provenance verification to bolster security against supply chain attacks. By integrating these tools with GitHub Actions, developers can achieve a higher level of transparency and security in their build processes without managing their own signing keys, providing a significant advancement in ensuring the integrity of software development workflows.