Development
Available

Docker Integration

TigerTrust provides container image signing and verification capabilities for Docker environments. Sign images with enterprise certificates, verify image integrity, and enforce signing policies across your container supply chain.

Key Features

Image Signing
Registry Integration
Trust Verification
Policy Enforcement
Notary Integration
Cosign Support
SBOM Signing

Benefits

Cryptographic signing of container images
Verification of image integrity and origin
Enforcement of signing policies in registries
Integration with popular signing tools
Secure software supply chain

Common Use Cases

Signing container images with enterprise certificates

Enforcing image signing policies

Verifying image integrity before deployment

Securing the software supply chain

Docker Container Signing with TigerTrust

TigerTrust provides enterprise-grade container image signing for Docker environments. Sign images with enterprise code signing certificates, verify image integrity, and enforce signing policies to secure your software supply chain.

Image Signing

Sign container images with TigerTrust:

# Sign a Docker image tigertrust docker sign \ --image myapp:v1.0.0 \ --certificate code-signing-cert \ --registry ghcr.io/myorg # Output ✓ Image signed: ghcr.io/myorg/myapp:v1.0.0 Digest: sha256:abc123... Signature: sha256:def456... Certificate: CN=MyOrg Code Signing

Cosign Integration

TigerTrust integrates with Sigstore Cosign:

# Sign with Cosign using TigerTrust certificate tigertrust cosign sign \ --certificate code-signing-cert \ ghcr.io/myorg/myapp:v1.0.0 # Verify signature cosign verify \ --certificate-identity "[email protected]" \ --certificate-oidc-issuer "https://tigertrust.io" \ ghcr.io/myorg/myapp:v1.0.0

Registry Integration

Configure automatic signing for registries:

# TigerTrust registry signing policy registries: - name: production-registry url: ghcr.io/myorg signing: enabled: true certificate: enterprise-code-signing auto_sign: true sign_on_push: true - name: staging-registry url: registry.staging.example.com signing: enabled: true certificate: staging-code-signing require_signature: true

Policy Enforcement

Enforce signing policies:

# Container signing policy policy: name: container-signing-policy rules: - name: production-images registries: - "ghcr.io/myorg/*" - "*.prod.example.com/*" requirements: signed: required certificate_issuer: "CN=MyOrg CA" timestamp: required max_age_days: 30 - name: base-images images: - "*/base-*:*" requirements: signed: required trusted_roots: - enterprise-root-ca - public-ca-bundle

Verification in CI/CD

Verify images before deployment:

# GitHub Actions verification - name: Verify container signature uses: tigertrust/verify-action@v1 with: image: ghcr.io/myorg/myapp:${{ github.sha }} policy: production-policy fail-on-unsigned: true # Kubernetes admission webhook - name: Deploy verified image run: | kubectl apply -f deployment.yaml # TigerTrust admission controller verifies signature

SBOM Signing

Sign Software Bill of Materials:

# Generate and sign SBOM tigertrust sbom generate \ --image myapp:v1.0.0 \ --format spdx \ --sign \ --certificate sbom-signing-cert \ --output myapp-sbom.json # Attach SBOM to image tigertrust sbom attach \ --image ghcr.io/myorg/myapp:v1.0.0 \ --sbom myapp-sbom.json

Kubernetes Admission Controller

Enforce signing in Kubernetes:

apiVersion: tigertrust.io/v1 kind: ImagePolicy metadata: name: require-signed-images spec: namespaces: - production - staging rules: - images: ["*"] require: signed: true - images: ["ghcr.io/myorg/*"] require: signed: true certificate: issuer: "CN=MyOrg Code Signing CA" action: onViolation: reject audit: true

Multi-Architecture Support

Sign multi-architecture images:

# Sign manifest list tigertrust docker sign \ --manifest myapp:v1.0.0 \ --certificate code-signing-cert \ --platforms linux/amd64,linux/arm64 # Verify specific platform tigertrust docker verify \ --image myapp:v1.0.0 \ --platform linux/arm64

Supply Chain Security

Complete supply chain visibility:

  • Track image provenance
  • Verify build attestations
  • Validate source code signatures
  • Audit signing history

Secure your container supply chain with TigerTrust's Docker integration.

Getting Started

1

Configure TigerTrust signing certificates

2

Set up registry integration

3

Configure signing policies

4

Enable verification in your deployment pipeline

5

Set up SBOM generation and signing

Ready to Integrate Docker?

Get started with TigerTrust and automate your certificate lifecycle management today.