Image Signature Verification Policy
This guide demonstrates how to configure Kyverno to verify that container images are properly signed before they can run in a Kubernetes cluster. Think of it like checking an ID card - only images with valid "signatures" are allowed in.
TOC
What is Image Signature Verification?
Image signature verification is like having a security guard check IDs at the door. It ensures:
- Images are authentic: They come from who they claim to come from
- Images are untampered: No one has modified them after signing
- Only trusted images run: Unsigned or improperly signed images are blocked
- Audit trail: Track which images were verified and when
Quick Start
1. Generate Keys
2. Sign Images
3. Create Basic Verification Policy
4. Test It
Common Use Cases
Scenario 1: Multiple Teams Need to Sign Critical Images
For critical applications, both the development team AND security team might need to sign images:
Scenario 2: Different Rules for Different Environments
Production needs strict verification, development can be more relaxed:
Scenario 3: Using Certificates Instead of Keys
For enterprise environments, X.509 certificates might be used: