-
Notifications
You must be signed in to change notification settings - Fork 274
Description
This is a tracking issue for incorporating Hardware Attested Platforms, aka Trusted Computing into SLSA. The main idea is to provide greater trust in the build by using trusted computing features like Trusted Execution Environments (TEEs) of modern CPUs to reduce the risk of tampering and to increase transparency.
Workstream shepherd: Marcela Melara (@marcelamelara), Pavel Iakovenko (@paveliak)
Working proposal: #1051
Proposal doc: here
Related: We might want to merge with #977 (Build L4, discussing reproducible builds) and/or #985 (about hardening operations) as discussed in below.
Sub-issues:
- content: draft: Add attested build environment track #1115
- Add detailed requirements description
- Describe implementation options
- Describe the verification model
- Transfer image-attestation demo to slsa-framework org #1110
- What is the best term to describe a build runtime environment's storage? #1107
- Attesting to the builds environments of distributed builds #1122
In the 2023-09-13 Supply Chain Integrity meeting, @marcelamelara and I presented on a potential new SLSA track, using cryptographic primitives provided by hardware to validate build environments.
Slides: https://docs.google.com/presentation/d/11cycDxYaoZpuG144pR6atI1_zk2CfZOWlNO_f_HhhyE
Doc: https://docs.google.com/document/d/1l7IKAli-K-uof8VkLuiqV5-hMGS_ecDmBcuc07-ILeQ/edit
Recording: TBD pending upload to YouTube
Some points for discussion, seeding some from the SCI meeting:
- Is this a new track or an extension of other tracks?
- I've labeled this as the Build Platform Operations track, however the Future Directions page defines a set of requirements that are likely only verifiable through audit, whereas the attestations defined above are verifiable at runtime. Is this the appropriate track to be defining these in or is there yet another track to distinguish these?
Metadata
Metadata
Assignees
Labels
Type
Projects
Status
Status