Skip to content

Commit c8f9156

Browse files
committed
KEP-3027: Link to roadmap
Rework the motivations of the kep to remark the parallels with our roadmap and vision as suggested by Sascha Grunert. Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
1 parent 53980cd commit c8f9156

File tree

1 file changed

+20
-7
lines changed
  • keps/sig-release/3027-slsa-compliance

1 file changed

+20
-7
lines changed

keps/sig-release/3027-slsa-compliance/README.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ The main goal of this enhancement is to provide downstream consumers of our
159159
artifacts the highest assurance about the integrity of each Kubernetes release.
160160

161161
SLSA defines several levels of hardening, each touching more aspects of the
162-
release process beyond the techincal implementation required. This document is
162+
release process that go beyond its technical implementation. This document is
163163
meant to serve as a guide to reach the highest possible levels after
164164
consensus has been reached about their viability.
165165

@@ -190,13 +190,26 @@ distribute our artifacts downstream. The project releases end-user artifacts
190190
like binaries and container images, but also source code that is actively reused
191191
further down the distribution stream.
192192

193-
As the world hardens its software supply chains, the Kubernetes project needs
194-
to do its part to achieve a secure supply chain from end to end. This proposal
193+
All current work done by SIG Release on the Kubernetes supply chain centers
194+
around three focus areas: Artifact Consumption, Introspection, and Security.
195+
These areas are explained in more detail in our [_Roadmap for 2021 and Beyond_
196+
document](https://github.com/kubernetes/sig-release/blob/master/roadmap.md).
197+
198+
As the world hardens its software distribution methods, the Kubernetes project needs
199+
to do its part to achieve a secure supply chain from end to end: from the
200+
top base images to the final artifacts downloaded by end users. This proposal
195201
provides a path to achieve increasing levels of security, integrity, and availability
196-
in our releases by improvements to our release process to make it comply with the
202+
in our releases by engineering new features to our processes. The objective is
203+
to achieve the highest possible compliance with the
197204
[SLSA framework](https://slsa.dev/) (Supply-chain Levels for Software Artifacts).
198205

199-
SLSA is a project under the [OpenSSF](https://openssf.org/)'s [Digital Identity
206+
We consider SLSA compliance to be an effort in line with the three objectives outlined
207+
in our roadmap: Artifacts can be consumed easier and with more trust.
208+
Improvements to code and process will secure the supply chain and each release
209+
will produce software bills of materials, provenance attestations and signatures
210+
which will yield much better introspection to the journey from code to binary.
211+
212+
The SLSA framework is a project under the [OpenSSF](https://openssf.org/)'s [Digital Identity
200213
Attestation Working Group](https://github.com/ossf/wg-digital-identity-attestation).
201214
The framework defines numbered levels of compliance that harden software supply
202215
chains by recommending concrete steps to address, each of increasing technical
@@ -247,7 +260,7 @@ to software supply chains. However, changes to reach level 4 may not be feasible
247260

248261
If the changes that need to be conducted are deemed too disruptive or even destructive
249262
to other areas of the project (development velocity, contributor experience, policy,
250-
etc), the community may decide the current SLSA level to be unimplementable. In that
263+
etc), the community may declare a specific SLSA level to be unimplementable. In that
251264
scenario, we would work on the rest of the SLSA requirements and consider this KEP
252265
complete.
253266

@@ -373,7 +386,7 @@ only provenance metadata needs to be produced:
373386
#### SLSA Level 2: Tamper Resistance of the Build Service
374387

375388
Level 2 calls for digital signatures of the metadata captured and passed
376-
around the release process in the provenance attestations.
389+
around the release process in the provenance attestations.
377390

378391
#### SLSA Level 3: Extra Resistance to Specific Threats
379392

0 commit comments

Comments
 (0)