If provenance is not evaluated, it is merely metadata. Enforcement is what transforms integrity into control.
April 27, 2026
.png)
Generating provenance is a start. Enforcing provenance is what changes risk posture. Security and platform leaders must ensure that deployment decisions are made by policy — not assumption.
In their three-part blog series, Michael Lieberman and Gaurav Saxena highlight their views in shaping the future of software and walk through modern cloud-native tooling including how Sigstore, in-toto, and Kubernetes admission control makes software trust keyless, auditable, machine-verifiable, and enforceable.
Gaurav, a friend of Kusari, is an engineering leader in the field of platform and cloud engineering with over 20 years of experience in the software industry. His technical expertise includes Stream-based architectures, Kubernetes, Service Mesh, Software Supply Chain Security, and Observability.
Signing proves identity. Provenance proves process. SLSA defines what trustworthy builds look like and how to verify them.
The technologies we’re highlighting in this blog series are not experimental research projects. Sigstore and in-toto are hosted under the OpenSSF and Cloud Native Computing Foundation (CNCF), respectively. And, in-toto has reached graduated project status — signaling production maturity and broad industry adoption.
Their growth reflects a larger trend within the cloud-native community: supply chain security is now treated as foundational infrastructure, not an add-on feature.
SLSA adoption also is growing, and independent analysis and community discussions have highlighted that generating provenance alone is not enough. Many organizations struggle with operationalizing verification and aligning teams around enforceable policy.
This is precisely why enforcement mechanisms — such as Kubernetes admission control combined with policy engines like Kyverno — are critical. Without verification gates, provenance risks becoming documentation rather than protection.
At higher maturity, organizations aim for SLSA Level 3 for builds. This requires:
Each build emits a provenance attestation that includes:
This provenance becomes a machine-checkable contract. It doesn’t just describe what happened. It defines what must be true for deployment to proceed.
For example:
If any of these conditions fail, the artifact is not trusted and should not be deployed.
Community discussions and independent analysis have highlighted a recurring challenge: generating provenance is easier than operationalizing verification.
Many organizations can produce attestations. Fewer enforce them.
Without enforcement, provenance risks becoming documentation rather than protection.
For security leaders, this is the difference between maturity on paper and measurable risk reduction.
While SLSA focuses on build guarantees, in-toto models the entire software supply chain.
An in-toto layout defines:
Each step generates signed link metadata capturing inputs, outputs and hashes.
Verification ensures:
This mirrors manufacturing route cards and trace records. In manufacturing terms, the layout is the route card. The link metadata is the trace record for each station in the assembly line.
in-toto can also carry attestations such as:
This transforms attestations into structured, verifiable record of the entire digital assembly line.
The final control point is deployment.
Using a Kubernetes admission controller integrated with a policy engine such as Kyverno, organizations can enforce:
Policies can require elements such as:
If provenance is missing (or claims an untrusted builder), the admission controller rejects the deployment. No exception review. No manual override by default.
Trust is established with enforced policy, not human review.
The result is software batch traceability.
For any running container image digest, teams can recover:
This is similar to how manufacturers retrieve batch records and inspection documents for a physical component.
Incident response becomes evidence retrieval — not historical reconstruction.
The open source community — through OpenSSF, SLSA, Sigstore, and in-toto — has defined shared expectations for verifiable software production.
The ecosystem direction is clear:
For security and platform leaders, you’re making hard tradeoffs in the face of regulatory scrutiny; balancing delivery velocity against risk, developer experience against governance, innovation against audit findings. Fortunately, the path forward doesn’t require inventing something new.
In this series, we’ve looked at three shifts:
The common thread is that trust is moving ever closer to being measurable and verifiable; it can no longer be assumed because the code was scanned. The regulations like the EU Cyber Resilience Act are going to require all of us to prove how our software is built.
The encouraging part is the industry has converged around clear building blocks to build systems with trust in mind from the start:
Organizations that embrace this shift will reduce risk, operate with more clarity and accountability, and reduce friction based on a shared understanding of what “trusted software” actually means.
No older posts
No newer posts