Microsoft's Artifact Signing service, now generally available, integrates with the CNCF's Notary Project to provide a managed, scalable solution for securing container images and OCI artifacts. This combination addresses the operational complexity of certificate management while maintaining open standards, offering a strategic path for enterprises to implement verifiable software supply chain security.
The security of container images has become a non-negotiable requirement for protecting modern cloud-native applications. As organizations increasingly rely on containerized workloads, the need to ensure that images moving through development pipelines are authentic, untampered, and produced by trusted publishers has moved from a best practice to a foundational security control.
Microsoft's recent announcement of the general availability of Artifact Signing—formerly known as Trusted Signing—represents a significant step in making this capability more accessible. What makes this development particularly strategic is its integration with the Notary Project, the Cloud Native Computing Foundation (CNCF) standard for signing and verifying Open Container Initiative (OCI) artifacts. This combination creates a powerful synergy between an open, interoperable framework and a managed, enterprise-grade signing service.
What Changed: From Preview to Production-Grade Signing
Artifact Signing has transitioned from a preview offering to a fully supported, generally available service. For teams that previously experimented with container image signing using the preview version, the core workflows remain unchanged. The service continues to provide short-lived certificates, verified Azure identities, and role-based access control (RBAC) to manage signing operations without the traditional overhead of certificate lifecycle management.
The key evolution is the shift in terminology and documentation. "Trusted Signing" has been rebranded to "Artifact Signing" to better reflect its broader scope beyond just container images. The service now explicitly positions itself as part of a comprehensive approach to artifact integrity, aligning with the Notary Project's vision of securing all OCI artifacts, including container images, Helm charts, and other cloud-native components.
Provider Comparison: Notary Project vs. Alternative Approaches
The Notary Project, as a CNCF standard, offers several strategic advantages over proprietary or vendor-specific signing solutions:
Interoperability: Unlike vendor-locked solutions, Notary Project's specifications are open and vendor-neutral. This means artifacts signed using Notation (the Notary Project's signing tool) can be verified across different registries, cloud providers, and deployment environments. Organizations aren't locked into a single ecosystem.
Ecosystem Integration: The Notary Project has gained significant traction within the cloud-native community. It integrates natively with container registries like Azure Container Registry (ACR), Docker Hub, and others. Tools like Ratify enable enforcement in CI/CD pipelines and Kubernetes environments, creating a consistent verification experience from build to runtime.
Standardization: As a CNCF project, Notary Project follows established OCI standards, ensuring compatibility with the broader container ecosystem. This contrasts with more fragmented approaches where different tools might use incompatible signing formats.
When compared to alternative commercial solutions, Artifact Signing's managed approach reduces operational complexity. Traditional code signing requires organizations to manage certificate authorities, private keys, revocation lists, and compliance requirements—a significant operational burden. Artifact Signing abstracts this complexity by providing short-lived certificates tied to Azure identities, with Microsoft handling the underlying certificate infrastructure.
Business Impact: From Compliance to Operational Efficiency
The integration of Notary Project and Artifact Signing addresses several critical business requirements:
Supply Chain Security: With increasing regulatory pressure (such as the U.S. Executive Order on Improving the Nation's Cybersecurity) and industry standards (like SLSA), organizations need verifiable proof of artifact provenance. The combination provides cryptographically verifiable signatures that prove who built an artifact and when, creating an auditable trail.
Operational Efficiency: The managed nature of Artifact Signing eliminates the need for dedicated personnel to manage certificate infrastructure. Teams can focus on building and deploying applications rather than maintaining signing infrastructure. The short-lived certificate model reduces the risk associated with long-lived credentials while simplifying rotation processes.
Risk Reduction: By ensuring only signed artifacts can be deployed, organizations significantly reduce the risk of supply chain attacks. This is particularly important in multi-cloud environments where artifacts might move between different providers and need consistent verification.
Cost Considerations: While Artifact Signing introduces a service cost, it should be evaluated against the total cost of ownership of managing a self-hosted signing infrastructure. For many organizations, especially those without dedicated security teams, the managed service provides better cost predictability and reduced overhead.
Implementation Considerations and Trade-offs
Adopting this integrated approach requires careful planning:
Pipeline Integration: Organizations need to integrate signing into their CI/CD pipelines. The Notation CLI provides the primary interface for signing operations, while Ratify enables verification at various stages. This requires updating pipeline definitions to include signing steps and verification checks.
Registry Configuration: Azure Container Registry supports Notary Project signatures natively. For other registries, compatibility should be verified. The signature storage mechanism (as OCI artifacts) ensures broad compatibility, but specific registry features might vary.
Kubernetes Enforcement: In Kubernetes environments, Ratify can be deployed as an admission controller to enforce signature verification before pods are scheduled. This runtime enforcement complements the build-time signing, creating defense in depth.
Key Management: While Artifact Signing manages certificate lifecycle, organizations still need to secure their signing identities. Azure RBAC should be configured carefully to ensure only authorized pipelines and users can sign artifacts. The principle of least privilege should guide access configuration.
Multi-Cloud Considerations: For organizations using multiple cloud providers, the Notary Project's open standard provides consistency. However, Artifact Signing is an Azure service. Organizations using other clouds might need to evaluate whether to use Azure as their signing authority or implement alternative solutions for non-Azure workloads.
Practical Example: End-to-End Workflow
Consider a typical container image workflow:
- Build: A CI pipeline builds a container image and pushes it to Azure Container Registry.
- Sign: Using the Notation CLI with Artifact Signing credentials, the pipeline signs the image with a short-lived certificate tied to the pipeline's Azure identity.
- Store: The signature is stored as an OCI artifact alongside the image in the registry.
- Verify: Before deployment, Ratify verifies the signature against the Notary Project trust policy.
- Deploy: Only verified images are allowed to be deployed to Kubernetes clusters.
This workflow provides cryptographic proof of image provenance without requiring manual certificate management. The short-lived certificates (typically valid for hours or days) reduce the attack window compared to traditional certificates that might remain valid for years.
Strategic Recommendations
For organizations evaluating this approach:
Start with Critical Workloads: Begin by signing and verifying your most critical or sensitive container images. This allows teams to build expertise without overhauling entire pipelines.
Integrate Gradually: Use Ratify in "audit mode" first to understand what would be blocked without actually disrupting deployments. This helps identify unsigned artifacts and build remediation plans.
Leverage Azure Integration: If you're already using Azure services, the integration with Azure identities and RBAC provides a cohesive security model. Consider using Azure Key Vault for additional secrets management alongside Artifact Signing.
Plan for Multi-Cloud: If you operate across multiple clouds, design your signing strategy to be portable. Use the Notary Project's open specifications as your foundation, and consider whether Artifact Signing should be your primary signing authority or part of a hybrid approach.
Monitor and Audit: Implement logging and monitoring for signing operations. Azure Monitor can track signing activities, providing audit trails for compliance requirements.
The Broader Context: Software Supply Chain Security
This release comes at a critical time for software supply chain security. High-profile attacks like SolarWinds and the Log4j vulnerability have highlighted the risks of unverified software components. The U.S. Executive Order 14028 mandates that federal agencies implement specific software supply chain security practices, and similar regulations are emerging globally.
The Notary Project and Artifact Signing provide a concrete way to meet these requirements. By creating verifiable provenance for artifacts, organizations can demonstrate due diligence in securing their software supply chains.
Getting Started
Microsoft provides comprehensive documentation for implementing this solution:
- Sign container images using Notation CLI
- Sign container images in CI/CD pipelines
- Verify container images in CI/CD pipelines
- Verify container images in AKS
- Extend signing and verification to all OCI artifacts in registries
For organizations using Windows applications, Microsoft also offers Simplifying Code Signing for Windows Apps: Artifact Signing (GA), extending the same managed signing approach to traditional application binaries.
Conclusion
The general availability of Artifact Signing, combined with the Notary Project's open standard, represents a maturation of container security tooling. It moves image signing from a complex, specialized capability to a manageable platform feature. For cloud-native teams, this integration provides a practical path to implement verifiable software supply chain security without sacrificing operational efficiency.
The strategic value lies not just in the technical capability, but in the reduction of operational complexity. By abstracting certificate management while maintaining open standards, Microsoft has created a solution that balances enterprise requirements with cloud-native flexibility. As supply chain security requirements continue to evolve, this combination provides a foundation that can adapt to future needs while meeting current compliance mandates.

Featured image: Microsoft's Artifact Signing service provides a managed approach to securing container images and OCI artifacts.

Comments
Please log in or register to join the discussion