Skip to content

Commit 8e2f492

Browse files
authored
Merge pull request #446 from st3penta/resources-blog-post
Create a blog post about Conforma conference talks
2 parents cf7136d + db42a0a commit 8e2f492

File tree

3 files changed

+80
-1
lines changed

3 files changed

+80
-1
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ help:
33
@grep '[[:space:]]##[[:space:]]' Makefile | sed 's/^\(.*\):.*##\(.*\)$$/#\2\nmake \1\n/'
44

55
hugo-server: ## Run hugo server for website hacking
6-
@cd website && hugo server
6+
@cd website && hugo server --buildFuture
77

88
preview: preview-antora hugo-server ## Run hugo server for website hacking with pre-built antora docs
99

website/archetypes/default.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,17 @@
11
---
22
title: "{{ replace .Name "-" " " | title }}"
33
date: {{ .Date }}
4+
author: "Your Name"
45
draft: true
56
---
67

8+
Brief introduction or summary of your post. This should be a concise overview that gives readers an idea of what they'll learn from reading the full post.
9+
10+
<!--more-->
11+
12+
{{< conforma-name-preamble >}}
13+
14+
## Introduction
15+
16+
Start your main content here.
17+
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: "Learning About Conforma: Essential Resources and Presentations"
3+
date: 2025-07-23T13:00:41+02:00
4+
author: "Stefano Pentassuglia"
5+
---
6+
7+
Whether you're just getting started with supply chain security or looking to deepen your understanding of policy enforcement in container workflows, these resources provide valuable insights from industry experts and real-world implementations.
8+
9+
These conference presentations, demos, and educational videos showcase how organizations are using Conforma to secure their software supply chains.
10+
11+
<!--more-->
12+
13+
## Conference Presentations & Talks
14+
15+
### 1. Enforcing Organization Policies with Conforma
16+
**Speaker:** Zoran Regvart, Red Hat
17+
**Format:** Conference Presentation
18+
**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=OmnF_Bm4KOU)
19+
20+
This comprehensive session explores how Conforma leverages Sigstore signatures, in-toto attestations, and other tamper-proof sources to enforce organizational policies. The presentation focuses on the Tekton ecosystem and covers:
21+
22+
- The critical importance of ensuring container images meet organizational policies
23+
- How Conforma enforces policies using secure, tamper-proof sources
24+
- Configuring policies to validate that specific Tekton Tasks (like code scanners) have been executed during the container image build process
25+
26+
*Perfect for those familiar with Sigstore who want to understand how to go beyond simple signature checks to comprehensive image validation.*
27+
28+
### 2. Policy-Driven Supply Chain Security with Conforma
29+
**Speaker:** Mark Reynolds, Red Hat
30+
**Event:** DevConf.US 2024
31+
**Format:** Conference Talk with Live Demo
32+
**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=JgXXAjRuHfo&list=PLU1vS0speL2a-MgC0CmlLi8-cC1VwRjvB&index=78)
33+
34+
This talk demonstrates how Conforma serves as a decision engine for enforcing provenance, regulatory compliance, and security requirements. Key highlights include:
35+
36+
- User-friendly policy configuration and requirements definition
37+
- Image signature verification and attestation validation
38+
- CVE alert checking and security compliance
39+
- Integration with Open Policy Agent's Rego rule system for extensible policy evaluation
40+
41+
The session includes a live demonstration of building an image, verifying it using the conforma CLI, and customizing enforcement policies.
42+
43+
### 3. Building Trust Through Proactive Security
44+
**Speakers:** Przemyslaw Roguski & Ralph Bean, Red Hat
45+
**Event:** Open Source Summit North America 2025
46+
**Format:** Conference Session with Hands-on Demo
47+
**Link:** [Session Details](https://ossna2025.sched.com/event/1zfp2/building-trust-through-proactive-security-key-parts-of-the-trusted-software-supply-chain-przemyslaw-roguski-ralph-bean-red-hat)
48+
49+
This comprehensive session covers Red Hat's Secure Software Development Lifecycle (SDLC) framework and includes:
50+
51+
- Proactive vs. reactive security measures
52+
- SDLC objectives and implementation strategies
53+
- Automated testing and open-source SDLC solutions
54+
- Proactive vulnerability management during build phases
55+
- Secure software building with attestation data production (CSAF/VEX and SBOM)
56+
- Future of AI testing in supply chain security
57+
58+
*Features Ralph's hands-on demonstration showing how conforma works within Konflux in practice.*
59+
60+
### 4. Achieving Simplicity and Security with Konflux
61+
**Format:** TechGenie Presentation
62+
**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=sR8U5-UPGQs)
63+
64+
This presentation showcases how Konflux integrates with Conforma to provide both simplicity and security in software development workflows.
65+
66+
## Next Steps
67+
68+
Ready to get hands-on? Visit our [contribution guide](/contribute/) to learn how you can get involved with the Conforma project.

0 commit comments

Comments
 (0)