Why Supply Chain Security Matters#
Your container image contains hundreds of dependencies you did not write. A compromised base image or malicious package runs with your application’s full permissions. Supply chain attacks target the build process because it is often less guarded than runtime.
The goal is to answer three questions for every artifact: what is in it (SBOM), who built it (signing), and how was it built (provenance).
SBOM Generation#
A Software Bill of Materials lists every dependency in an artifact. Two tools dominate.