We detect compromised artifact, not compromised infra directly

parent fe67d8ff
Pipeline #55197 passed with stage
in 2 minutes and 58 seconds
......@@ -22,10 +22,10 @@ publish artifacts yourself, the other levels come into play.
| |B|S|G| |
|-|-|-|-|-|
|v|v|v|v|everything is set up so distributors can secure their pipeline|
| |v|v|v|compromised build infrastructure will be detected|
| |v|v|v|artifacts tainted by compromised build infrastructure will be detected|
| |v|v|v|end-users can verify the artifacts (by rebuilding)|
| | |v|v|end-users can verify the artifacts (by checking trusted attestations)|
| | | |v|compromised distribution infrastructure will be detected|
| | | |v|artifacts tainted by compromised distribution infrastructure will be detected|
## Requirements
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment