Security
Last updated
Was this helpful?
Last updated
Was this helpful?
This document outlines an overview of security considerations for micro-apps
services, components, artifacts, as well as configuration options for Kubernetes cluster.
Safeguarding artifact integrity across any software supply chain.
Adopt Framework Level 4 guideline for DevSecOps
Signed container images with Cosign
Software Bill of Materials (SBOM) with Syft
Static Code Analysis with
Vulnerabilities scanning with
Software Composition Analysis (SCA) with and
Risk and compliance as code () via with Or
Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on Google Kubernetes Engine (GKE). With Binary Authorization, you can require images to be signed by trusted authorities during the development process and then enforce signature validation when deploying. By enforcing validation, you can gain tighter control over your container environment by ensuring only verified images are integrated into the build-and-release process.
To verify the authenticity of container images, install cosign and run:
Single Repository:
All Repositories:
Signing Commits
Signing Commits
The spdx.json
file is available for download on the GitHub release page e.g.:
all Linux capabilities are dropped
the root filesystem is set to read-only
the seccomp profile is set to the runtime default
run as non-root is enabled
the filesystem group is set to 1337
the user and group ID is set to 65534
properly adheres to Kubernetes security model including RBAC
implement policy-as-code via OPA, Kyverno admission controllers
All container images are signed using Cosign and GitHub OIDC
enable Keyless Git/commits signing with your own GitHub / OIDC identity.
For the micro-apps project we publish a Software Bill of Materials (SBOM) with each release. The SBOM is generated with in the format.
The deployments are configured in conformance with the Kubernetes :