@@ -149,9 +149,11 @@ traceability:
149149 comprehensive list of software artifacts included in the image or used during
150150 its build process, formatted using the
151151 [ in-toto SPDX predicate standard] ( https://github.com/in-toto/attestation/blob/main/spec/predicates/spdx.md ) .
152- - ** [ Provenance] ( https://docs.docker.com/build/metadata/attestations/slsa-provenance/ ) :**
153- Metadata detailing how the image was built, following the [ SLSA Provenance] ( https://slsa.dev )
154- framework.
152+ - ** Provenance:** Metadata detailing the build process, generated via the
153+ [ SLSA GitHub Generator Github action] ( https://github.com/slsa-framework/slsa-github-generator ) .
154+ This provides [ SLSA Level 3 assurance] ( https://slsa.dev/spec/v1.0/levels )
155+ that the artifact was built on a trusted, isolated GitHub Actions runner
156+ directly from the project's source.
155157
156158You can retrieve the SBOM for a specific image and platform using the following
157159command:
@@ -164,13 +166,26 @@ docker buildx imagetools inspect <IMAGE> \
164166This command outputs the SBOM in JSON format, providing a detailed view of the
165167software components and build dependencies.
166168
167- For the provenance, use:
169+ For the build-level provenance, use:
168170
169171``` shell
170172docker buildx imagetools inspect < IMAGE> \
171173 --format ' {{ json (index .Provenance "<PLATFORM>").SLSA }}'
172174```
173175
176+ #### Verifying SLSA provenance
177+
178+ You can verify SLSA Level 3 provenance using
179+ [ ` slsa-verifier ` ] ( https://github.com/slsa-framework/slsa-verifier ) .
180+
181+ To verify a container image, pass its digest reference:
182+
183+ ``` shell
184+ slsa-verifier verify-image \
185+ ghcr.io/cloudnative-pg/cloudnative-pg@sha256:< DIGEST> \
186+ --source-uri github.com/cloudnative-pg/cloudnative-pg
187+ ```
188+
174189### Guidelines and Frameworks for Container Security
175190
176191The following guidelines and frameworks have been considered for ensuring
0 commit comments