- Published on
- Exercise 7
Bonus challenge - Supply chain shmozzle
- Authors
- Name
Whew - it's the last day of this weeks scheduled engagement 🥱. Tomorrow you're on leave to play the new Factorio Space Age expansion and you can't wait!
Brushing aside thoughts of grandiose factories you review the task list for today. Top of the list is ironically a core component of software factories, addressing a supply chain security requirement from Brent about introducing capability to sign artifacts on premises and store this metadata in a secure tamper proof ledger.
As part of the $5m AUD deal the sales team included Red Hat Trusted Artifact Signer (RHTAS) to enhance software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries, and Git commits.
Brent is keen to get this up and running ASAP as the bank have planned to implement this capability for the prior 6 years in various forms, but always been "busy" with other things.
Nothing to it but to do it!
7.1 - Deploy the signing platform
Brent's JIRA ticket explains that the signing platform should be deployed to the prd-acme-rhtas
namespace on the production cluster.
Note Teams are free to use any OIDC provider from the options of Red Hat Single Sign-on (SSO), Google, Amazon Secure Token Service (STS), or GitHub. Think carefully which option you pick as this will impact how long it takes to complete the exercise...
![]() |
---|
Installing the Red Hat Trusted Artifact Signer operator |
Documentation you may find helpful is:
- https://docs.redhat.com/en/documentation/red_hat_trusted_artifact_signer/1/html-single/deployment_guide/index#installing-trusted-artifact-signer-using-the-operator-lifecycle-manager_deploy
- https://developers.redhat.com/learning/learn:install-sign-verify-using-red-hat-trusted-artifact-signer/resource/resources:install-and-deploy-red-hat-trusted-artifact-signer
7.2 - Sign a container image
To test the platform out you join a quick call with Brent to walk him through how to sign a local container image with cosign
and then inspect the hash in the Rekor immutable ledger web interface.
![]() |
---|
Searching for a record in Rekor |
Documentation you may find helpful is:
7.3 - Check your work
If you've successfully deployed a secure signing platform and showed Brent how it worked please post in #event-anz-ocp-security-hackathon
with the message:
Please review [team name] solution for exercise 7, our Rekor record is [url].
This exercise is worth 25
points. The event team will reply in slack to confirm your updated team total score. Congratulations if you have reached this point you have completed the entire hackathon! 🎉