Security Standards & Attestations
This repository contains machine-readable security standards and attestation schemas for our build and deployment pipelines. These standards enable automated compliance verification and supply chain security through CycloneDX attestations.
If you need help implementing these standards or building secure CI/CD pipelines please contact us.
Quick Navigation
Standards (Requirements)
Security requirements that define what must be achieved:
-
ARBOM v1
Requirements for Arbitrary Risk Bill of Materials - cryptographic attestation for arbitrary data blobs.
Individual requirements are addressable via fragment identifiers (e.g.,v1.json#arbom-hash-verification) -
Build Provenance v1
Requirements for establishing verifiable provenance of container image builds.
Individual requirements are addressable via fragment identifiers (e.g.,v1.json#github-actions-build) -
Static Analysis v1
Requirements for static application security testing (SAST) of containerized applications. -
Catalog Integrity v1
Requirements for structure and creation of a deployment catalog -
Catalog Approval v1
Requirements for human approval for advancing protected environments of containerized applications. -
Container Vulnerability Scan v1
Requirements for vulnerability scans of containerized applications.
BOM Schemas
JSON schemas that validate custom BOM formats
- ARBOM Schema v1
JSON Schema for ARBOM - ARbitrary (blob) BOM - document validation and structure compliance.
Attestation Schemas
JSON schemas that validate attestations generated in CI/CD pipelines:
-
Build Provenance Attestation v1
Schema for build provenance attestations in CycloneDX format. -
Static Analysis Attestation v1
Schema for static application security testing attestations in CycloneDX format. -
Catalog Integrity Attestation v1
Schema for catalog integrity attestation. -
Catalog Approval Attestation v1
Schema for human catalog approval attestations in CycloneDX format. -
Container Vulnerability Scan v1
Schema for vulnerability scan attestations in CycloneDX format. -
Publish Approval Attestation v1
Schema for publishing approval attestations in CycloneDX format.
How It Works
- Standards define security requirements with unique identifiers
- CI/CD pipelines generate attestations that reference these standards via URLs
- Attestation schemas validate the structure and content of generated attestations
- Cosign cryptographically signs and attaches attestations to container images
- Deployment policies verify attestations before allowing deployment
Architecture
Standards and attestations follow REST principles:
- Each requirement is addressable via URI (e.g.,
https://sec.hypermedia.au/standards/build-provenance/v1#github-actions-build) - Attestations link to requirements using these URIs
- Conformance scores (0.0 to 1.0) indicate how well requirements are met
