Use Policy to Verify Image Signature
Alauda Security Service lets you verify the integrity of container images by checking their signatures against trusted signers that you configure in the platform. You can then use a policy to alert on or block unsigned images and images that fail signature verification.
TOC
Supported Signature Verification MethodsPrerequisitesConfigure a Signature IntegrationUsing Cosign Public KeysUsing Cosign CertificatesConfiguring Transparency Log ValidationUsing Keyless VerificationCreate and Enforce Image Signature Verification PoliciesPrerequisitesProcedureVerify Image Signatures by UsingroxctlSupported Signature Verification Methods
Supported signature verification methods include:
- Cosign public keys
- Cosign certificates
- Transparency log validation by using Rekor
- Keyless verification
Note:
- Alauda Security Service supports Cosign signature verification by using Cosign public keys, Cosign certificates, or both.
- Alauda Security Service supports communication with the transparency log Rekor.
- Alauda Security Service supports keyless verification.
- At least one Cosign verification method must be configured for signature verification.
- For all deployed and watched images:
- Signatures are fetched and verified every 4 hours.
- Signatures are verified whenever you update signature integration verification data.
Prerequisites
- You must have a PEM-encoded Cosign public key or the required certificate identity and issuer. For more details, see Cosign overview and Cosign certificate verification.
Configure a Signature Integration
Using Cosign Public Keys
- In the Alauda Security Service portal, go to Platform Configuration > Integrations.
- Scroll to Signature Integrations and click Signature.
- Click New integration.
- Enter a name for the integration.
- Expand Cosign public keys and click Add new public key.
- Enter:
- Public key name
- Public key value in PEM format
- (Optional) Add more public keys as needed.
- Click Save.
Using Cosign Certificates
- In the Alauda Security Service portal, go to Platform Configuration > Integrations.
- Scroll to Signature Integrations and click Signature.
- Click New integration.
- Enter a name for the integration.
- Expand Cosign certificates and click Add new certificate verification.
- Enter the required identity-matching fields:
- Certificate OIDC issuer
- Certificate identity
- (Optional) Enter certificate materials as needed:
- Certificate chain (PEM encoded)
- Intermediate certificate (PEM encoded)
- (Optional) Enable Enable certificate transparency log validation.
- (Optional) If transparency log validation is enabled, provide Certificate transparency log public key when you need to validate against a specific transparency log key. If left empty, the UI indicates that the public Sigstore instance key is used.
- (Optional) Add more certificate verifications as needed.
- Click Save.
Configuring Transparency Log Validation
The current UI exposes signature transparency log settings in a dedicated Transparency log section.
- In the signature integration, expand Transparency log.
- Select Enable transparency log validation.
- In Rekor URL, keep the default public Rekor instance or provide the URL for your own Rekor service.
- (Optional) Select Validate in offline mode if you want proof validation to avoid falling back to online confirmation from the transparency log service.
- (Optional) In Rekor public key, provide the PEM-encoded public key for the Rekor transparency log. If left empty, the UI indicates that the public Sigstore instance key is used.
- Click Save.
Note: The UI indicates that transparency log validation is required when signatures contain short-lived certificates issued by Fulcio.
Using Keyless Verification
Keyless verification is supported by using certificate-based verification.
To use keyless verification:
- Create a signature integration with at least one certificate verification.
- Configure the Certificate OIDC issuer and Certificate identity values that match the signer.
- If required by your environment, enable certificate transparency log validation and configure the Transparency log section for Rekor validation.
- Save the integration and reference it from your policy.
Create and Enforce Image Signature Verification Policies
Prerequisites
- At least one signature integration must be configured.
- To enforce the policy at deployment time, the admission controller must be enabled for the target cluster.
Procedure
- In the Alauda Security Service portal, go to Platform Configuration > Policy Management.
- Create a new policy or edit an existing custom policy.
- In the policy flow, open the Rules step.
- Add the Not verified by trusted image signers criterion to the policy.
- Click Select.
- Choose one or more trusted image signers from the configured signature integrations.
- Click Save.
- In Policy behavior, choose the response for matching images:
- use alerting only if you want visibility without blocking
- use deploy-time enforcement if you want to block unsigned or unverified images
- Save the policy.
To prevent the use of unsigned images, enable the Contact Image Scanners feature in the cluster configuration. Then configure the policy with deploy-time enforcement by selecting Inform and enforce.
Verify Image Signatures by Using roxctl
To verify image integrity, scan an image that includes a digest:
Review the output for signature verification data. If transparency log validation is enabled for the signature integration, verify that the output also contains the Rekor bundle with proof of inclusion in the transparency log.
For more information, refer to the official Cosign documentation.