Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Software Supply Chain Integrity #11

Open
lrvick opened this issue Dec 16, 2024 · 0 comments
Open

Software Supply Chain Integrity #11

lrvick opened this issue Dec 16, 2024 · 0 comments

Comments

@lrvick
Copy link

lrvick commented Dec 16, 2024

NitroHSM looks awesome, but currently it seems to be lacking basic Software Supply Chain integrity practices that would make it viable for use in environments with threat models that can't afford to risk trusting any single individual.

Given all the great steps you take to avoid physical supply chain attacks with tamper evident seals, it seems only logical to have a tamper evident software supply chain.

Some example practices that might close the gap:

  1. Sign all commits with hardware-anchored PGP key that is easily validated to a real identity (keyoxide, etc)
  2. Begin code review practices, where reviewer also signs merge commits or a signed tag with their own hardware backed PGP key
  3. Have all firmware/containers build reproducibly with a full-source-bootstrapped toolchain
    • Shameless plug for Stagex though other options exist
  4. Have release proposer sign artifact hashes, and release approver sign matching set
  5. Support hardware anchored Remote Attestation that certifies the software hashes running on a NetHSM match expected reproducibly built, bootstrapped, and multi-signed artifacts generated from this repo.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant