Our new tool uses sigstore to bundle a YAML manifest as a signed image and push it into an Open Container Initiative (OCI) registry.
The signed image is then pulled from the registry while verifying a resource. A command-line interface tool is in the form of a kubectl subcommand plugin, and the manifest in the signed image defines the expected state of resources.
By inspecting the resources on the cluster against those in the signed manifest, we check that the resources are unchanged. An administrator can then use this command to verify that the state of the cluster is as expected.
In strictly controlled clusters, the deployment to the cluster should be limited to verified manifest configurations, preventing any unauthorized changes from the signed manifest.
Integrity Shield does just that, providing preventive control based on signature verification. Integrity Shield is currently in tech preview for Red Hat Advanced Cluster Management for Kubernetes, and it will be extended to use sigstore signing in future releases.