@@ -159,7 +159,7 @@ The main goal of this enhancement is to provide downstream consumers of our
159
159
artifacts the highest assurance about the integrity of each Kubernetes release.
160
160
161
161
SLSA defines several levels of hardening, each touching more aspects of the
162
- release process beyond the techincal implementation required . This document is
162
+ release process that go beyond its technical implementation. This document is
163
163
meant to serve as a guide to reach the highest possible levels after
164
164
consensus has been reached about their viability.
165
165
@@ -190,13 +190,26 @@ distribute our artifacts downstream. The project releases end-user artifacts
190
190
like binaries and container images, but also source code that is actively reused
191
191
further down the distribution stream.
192
192
193
- As the world hardens its software supply chains, the Kubernetes project needs
194
- to do its part to achieve a secure supply chain from end to end. This proposal
193
+ All current work done by SIG Release on the Kubernetes supply chain centers
194
+ around three focus areas: Artifact Consumption, Introspection, and Security.
195
+ These areas are explained in more detail in our [ _ Roadmap for 2021 and Beyond_
196
+ document] ( https://github.com/kubernetes/sig-release/blob/master/roadmap.md ) .
197
+
198
+ As the world hardens its software distribution methods, the Kubernetes project needs
199
+ to do its part to achieve a secure supply chain from end to end: from the
200
+ top base images to the final artifacts downloaded by end users. This proposal
195
201
provides a path to achieve increasing levels of security, integrity, and availability
196
- in our releases by improvements to our release process to make it comply with the
202
+ in our releases by engineering new features to our processes. The objective is
203
+ to achieve the highest possible compliance with the
197
204
[ SLSA framework] ( https://slsa.dev/ ) (Supply-chain Levels for Software Artifacts).
198
205
199
- SLSA is a project under the [ OpenSSF] ( https://openssf.org/ ) 's [ Digital Identity
206
+ We consider SLSA compliance to be an effort in line with the three objectives outlined
207
+ in our roadmap: Artifacts can be consumed easier and with more trust.
208
+ Improvements to code and process will secure the supply chain and each release
209
+ will produce software bills of materials, provenance attestations and signatures
210
+ which will yield much better introspection to the journey from code to binary.
211
+
212
+ The SLSA framework is a project under the [ OpenSSF] ( https://openssf.org/ ) 's [ Digital Identity
200
213
Attestation Working Group] ( https://github.com/ossf/wg-digital-identity-attestation ) .
201
214
The framework defines numbered levels of compliance that harden software supply
202
215
chains by recommending concrete steps to address, each of increasing technical
@@ -247,7 +260,7 @@ to software supply chains. However, changes to reach level 4 may not be feasible
247
260
248
261
If the changes that need to be conducted are deemed too disruptive or even destructive
249
262
to other areas of the project (development velocity, contributor experience, policy,
250
- etc), the community may decide the current SLSA level to be unimplementable. In that
263
+ etc), the community may declare a specific SLSA level to be unimplementable. In that
251
264
scenario, we would work on the rest of the SLSA requirements and consider this KEP
252
265
complete.
253
266
@@ -373,7 +386,7 @@ only provenance metadata needs to be produced:
373
386
#### SLSA Level 2: Tamper Resistance of the Build Service
374
387
375
388
Level 2 calls for digital signatures of the metadata captured and passed
376
- around the release process in the provenance attestations.
389
+ around the release process in the provenance attestations.
377
390
378
391
#### SLSA Level 3: Extra Resistance to Specific Threats
379
392
0 commit comments