Introduction
Containers have transformed the way we develop, deploy, and manage software. By packaging applications along with their dependencies, containers make it easy to run apps consistently anywhere—from your laptop all the way up to massive cloud deployments. They offer unmatched speed, flexibility, and portability, enabling rapid scaling and updates.
Organizations running hundreds of self-hosted Kubernetes clusters and thousands of nodes rely on a complex ecosystem—including CI/CD pipelines, container registries, and deployment tools—that expands the attack surface. Each stage in the container lifecycle, from source code to deployment, presents opportunities for attackers to inject malicious payloads or compromise images.
Exploits like those involving exposed Docker APIs can lead to lateral movement within clusters and unauthorized deployment of cryptojacking workloads. Without strict controls and continuous monitoring, even indirect access points like Helm charts or internal registries can be used to compromise production environments.
While containers offer significant operational efficiency and are widely adopted—often supported by trusted open-source communities and industry-leading technology companies—even reputable sources can unintentionally distribute container images containing vulnerabilities, exposed secrets, or malicious code. Techniques such as Image Signature Verification allow you to verify the authenticity and integrity of container images, ensuring only secure, reliable containers are deployed. This practice effectively reduces risks and the surface of attack and enhances confidence in both your applications and infrastructure.
Understanding Image Signature Verification
Image signature verification is a critical process that ensures the integrity and authenticity of container images across the software supply chain. By validating image signatures, organizations can verify that images originate from trusted sources and have not been altered.
Implementing image signing at build time and verification at runtime establishes a strong chain of trust—ensuring only authorized, unmodified images are deployed. Each image is signed with a private key and later verified using a corresponding public key, preventing attackers from injecting malicious or unauthorized content into production environments.
Unsigned or tampered images would be flagged and blocked before deployment, significantly reducing the risk of compromise and reinforcing security from development to runtime.
When to Verify?
At the Kubernetes Control Plane (Admission Webhooks)
- Purpose: Blocks deployment of unverified images at cluster entry.
- Outcome: Enforces policy before workloads are created.
Our Solution for Container Image Signature Verification
Our container image signature verification solution is designed to enhance software supply chain security by ensuring only trusted images are deployed into your container environments. It offers a flexible and robust policy-based approach that integrates seamlessly into existing container security workflows.
Policy-Driven Verification at Deployment
Integrated into the admission control phase, our solution allows you to enforce signature verification as part of your container security policies. You can configure image validation rules during deployment to ensure compliance before workloads are admitted into the cluster.
Granular Control & Flexibility
Define verification methods, manage signature attestors e.g. key pairs,and set match /exclusion rules based on image sources, names, or labels. This flexibility allows tailored policies for different environments, use cases, or risk profiles.
Support for Multi-Key Verification
Enable multiple signature validations per image to satisfy the needs of Dev, Security, and Operations teams. Each team can independently sign off on an image, ensuring accountability and reducing deployment risk.
Enforcement-First Approach
Enforce policy rules to block unauthorized or unsigned images from being deployed, preventing supply chain threats and reducing the attack surface of your production environment. Non-compliant images are rejected before reaching runtime.
Flexible Policy Management
Configuration is available through a web console UI for ease of use or Policy-as-Code (YAML/JSON) for DevSecOps pipelines. This enables both interactive management and CI/CD integration.
Visibility & Auditability
Gain full visibility into verification events with logs, metrics, and alerts to support compliance audits and incident investigation.
Our solution brings together security, usability, and operational efficiency, helping organizations adopt a zero-trust approach to container deployments and build trust in their software supply chain.
Customer Benefits
Stronger Supply Chain Security
Customers can prevent the deployment of tampered or untrusted container images, reducing the risk of software supply chain attacks and ensuring that only verified code runs in production.
Policy Flexibility Across Teams
With support for multiple signatures per image and customizable rules, organizations can tailor policies to meet the unique needs of Dev, Sec, and Ops teams—enhancing collaboration without sacrificing security.
Faster Incident Response and Compliance Readiness
Built-in logging and audit trails improve visibility and accountability, helping customers quickly trace security incidents and simplify compliance with standards like NIST, ISO 27001, PCI DSS, and HIPAA.
Seamless Integration into CI/CD Pipelines
Whether managed via web UI or policy-as-code, the solution supports automated enforcement in DevOps workflows, enabling secure deployments without slowing down innovation.
Reduced Risk to Production Environments
Enforced blocking of unauthorized images ensures that misconfigurations or attacks (e.g., cryptojacking, lateral movement via unverified images) are stopped before they impact critical systems.
Conclusion
Image signing and runtime verification are essential safeguards in securing the software supply chain and reducing the risk of container compromise. At Trend Micro, we developed a custom image verification solution that verifies signatures at the Container lifecycle—an approach we detail in this talk, including how we sign and encode image payloads for deployment integrity.
Implementing image signature verification strengthens container security by ensuring only trusted, untampered images are deployed. By adopting tools and building a robust end-to-end verification process, organizations can significantly improve their security posture and maintain trust across containerized environments.