Skip to content

Commit 855bed7

Browse files
committed
feat: add Cosign comparison
1 parent 64daf39 commit 855bed7

2 files changed

Lines changed: 11 additions & 14 deletions

File tree

marketing/content/securesbom_vs_cosign.md renamed to marketing/content/securesbom_vs_sigstore.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,75 +5,72 @@ date: 2025-10-20
55
draft: false
66
---
77

8-
# SecureSBOM vs Sigstore
9-
108
A detailed comparison of **SecureSBOM** and **Sigstore**, two solutions addressing software supply chain integrity through signing and verification technologies.
11-
While **Sigstore** focuses primarily on open-source ecosystems and OCI artifacts, **SecureSBOM** is built for enterprise-grade SBOM signing, verification, and compliance.
9+
While **Sigstore** focuses primarily on open-source projects and OCI artifacts, **SecureSBOM** is built for enterprise-grade SBOM signing, verification, and compliance.
1210

1311
---
1412

1513
## 🧩 Primary Use Case
1614

1715
| Tool | Description |
1816
|------|--------------|
19-
| **Sigstore** | Open Source Software, OCI-Focused (SBOMs attached as a container artifact). |
2017
| **SecureSBOM** | Business / Enterprise Software, purpose-built for SBOM signing and verification. |
18+
| **Sigstore** | Open Source Software, OCI-Focused (SBOMs attached as a container artifact). |
2119

2220
---
2321

2422
## 📘 SBOM Support
2523

2624
| Tool | Description |
2725
|------|--------------|
28-
| **Sigstore** | Treats all SBOMs as simple blobs. Supports **detached signatures only** for both SPDX and CycloneDX. |
2926
| **SecureSBOM** | Integrates directly with the **CycloneDX SBOM format** — supports **embedded signatures**, **property exclusion**, and also supports **SPDX detached signatures**. |
27+
| **Sigstore** | Treats all SBOMs as simple blobs. Supports **detached signatures only** for both SPDX and CycloneDX. |
3028

3129
---
3230

3331
## 🔐 Key Management
3432

3533
| Tool | Description |
3634
|------|--------------|
35+
| **SecureSBOM** | **Automated** key lifecycle management using **HSMs**. Ideal for enterprise compliance and long-term trust. |
3736
| **Sigstore** | Ephemeral, short-lived keys/certificates from **Fulcio** with **OIDC authentication** — or manual key management (local or via cloud providers like GCP/AWS). |
38-
| **SecureSBOM** | **Automated** key lifecycle management using **cloud HSMs**. Ideal for enterprise compliance and long-term trust. |
3937

4038
---
4139

4240
## 🪪 Authentication
4341

4442
| Tool | Description |
4543
|------|--------------|
46-
| **Sigstore** | OIDC (for keyless signing) or manual authentication for self-managed keys. |
4744
| **SecureSBOM** | Authenticated via **API Key**, enabling fine-grained access control and multi-tenant isolation. |
45+
| **Sigstore** | OIDC (for keyless signing) or external, self-managed authentication mechanisms. |
4846

4947
---
5048

5149
## 🔍 Transparency
5250

5351
| Tool | Description |
5452
|------|--------------|
55-
| **Sigstore** | Public Record via **Rekor** (Certificate Transparency Logs). Verification relies on transparency records and public keys. |
5653
| **SecureSBOM** | **Private Record** system — verification performed using the **associated public key**, keeping enterprise signing activity confidential. |
54+
| **Sigstore** | Public record via public transparency logs. Verification relies on public keys and the public transparency logs. |
5755

5856
---
5957

6058
## 🧠 Summary
6159

62-
- **Sigstore** simplifies signing for open-source contributors and CI/CD pipelines relying on OIDC identity proof and public transparency.
63-
- **SecureSBOM** focuses on enterprise adoption, providing stronger SBOM format integration, private key isolation, HSM-backed signing, and internal verification capabilities.
60+
- **SecureSBOM** focuses on enterprise adoption, providing stronger SBOM format integration, private key isolation, HSM-backed signing, and internal verification capabilities.
61+
- **Sigstore** simplifies signing for open-source projects and CI/CD pipelines relying on OIDC identity proof and public transparency.
6462

6563
---
6664

6765
### ✅ Ideal Fit
6866

6967
| Use Case | Recommended Solution |
7068
|-----------|----------------------|
71-
| Open Source Ecosystems | **Sigstore** |
7269
| Enterprise Software & Supply Chain Security | **SecureSBOM** |
70+
| Open Source Projects | **Sigstore** |
7371

7472
---
7573

7674
Want to learn more?
7775
- [SecureSBOM Overview](/securesbom)
7876
- [Sigstore Project](https://sigstore.dev)
79-

marketing/hugo.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,8 @@ googleAnalytics = "G-CR0HB4HF2K"
6363

6464
[[menu.main]]
6565
identifier = "securesbom_vs_cosign"
66-
name = "SecureSBOM vs Cosign"
67-
url = "/securesbom_vs_cosign/"
66+
name = "SecureSBOM vs Sigstore"
67+
url = "/securesbom_vs_sigstore/"
6868
weight = 2
6969

7070
# ToDo - Add this back in when we have a better grasp of our professional services

0 commit comments

Comments
 (0)