Webinar: Focus on Real Vulnerability Risk

Better Together:
Kusari and Cloudsmith

Kusari secures the build, and Cloudsmith secures the distribution. Together, they provide an end-to-end, policy-driven workflow that transforms security from a reactive chore into a proactive, automated discipline.

Continuous confidence for everyone in the chain

Developers

Devs get fast, actionable feedback from Kusari and trust that anything they pull from Cloudsmith is pre-vetted.

DevOps

DevOps teams can trust their CI pipeline and their artifact repository, which in turn enables true GitOps and automated deployment confidence.

Security & Compliance

Security teams have an end-to-end, auditable trail from source code to production deployment, all governed by automated, enforceable policies.

1. Deeper software provenance:

Kusari acts as your software detective. It traces every component back to its source, eliminating "mystery blobs" and ensuring that a typosquatted package or a compromised dependency is stopped dead in its tracks.


2. More intelligent triaging:

Instead of drowning you in "1,200" CVE alerts, Kusari’s context-aware analysis pinpoints the handful that are actual, reachable threats in your application, allowing developers to focus on what’s critical.

3. Evidence generation:

Kusari acts as a court reporter for your build. It automatically generates a tamper-proof evidence packet containing a signed SBOM, a vulnerability report (VEX), and a provenance attestation. This packet is the immutable proof of what went into your build and its security posture at that moment.

4. Continuous monitoring:

Kusari isn’t done when the build completes. It constantly checks your dependency graph for newly-discovered vulnerabilities. When the next zero-day hits, you can get right to work patching it instead of wondering which versions of which applications are affected.

Kusari is the guardian of your development pipeline

Think of Kusari as the meticulous inspector on your assembly line: operating  "left" in your development lifecycle, right inside your CI/CD pipeline, to ensure that only verified, secure, and compliant code ever gets built into an artifact. Cloudsmith then consumes those software artifacts as a central store.

Kusari ensures you build the right thing.
But what happens to the artifact after it's built?

Cloudsmith is your secure vault for all software artifacts

Think of Cloudsmith as the secure, intelligent warehouse where your finished goods are stored and distributed. It takes the trusted artifacts and the rich evidence packet generated by Kusari, and adds the critical "last mile" of security and control.

1. Policy-as-code enforcement:

Cloudsmith uses the SBOM and vulnerability data from Kusari to enforce powerful, automated rules. Using its Rego-based policy engine, you can prevent developers or systems from downloading and deploying artifacts that violate your standards, whether it’s based on CVSS score, the presence of a critical vulnerability, or a non-compliant license.


2. A single source of truth:

The artifact and its corresponding Kusari-generated security evidence (SBOM, VEX) live together inside Cloudsmith. This creates a single, auditable source of truth. When a compliance auditor asks for proof, it’s all in one place, tied directly to the versioned package.

3. Control what’s consumed in the SSC:

When a new zero-day vulnerability (like Log4j) is discovered, or a piece of malware in an NPM package (like Shai-Hulud), the security team can instantly answer Kusari's question, "Where is this running?" and then use Cloudsmith to immediately block or quarantine every affected artifact across all repositories, preventing any further insecure deployments.

Cloudsmith ensures you only use the right thing.

Kusari tells you what matters in your source code. 
Cloudsmith uses that intelligence to control your artifacts.

Kusari

Build-time assurance

A developer commits code.
Kusari verifies the provenance of every dependency, checks it against policy, and generates a signed attestation packet for the clean build.
Bad builds fail fast, right in the CI pipeline.

Cloudsmith

Storage & Distribution Control

The approved artifact and its security packet are pushed to Cloudsmith
Cloudsmith’s policies act as a final gatekeeper, using that rich data to control visibility, access, and deployment, ensuring only vetted packages are consumed.

Together, they empower you to ship with evidence rather than blind trust.

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.